A new backdoor attack in cnns by training set corruption without label poisoning M Barni, K Kallas, B Tondi 2019 IEEE International Conference on Image Processing (ICIP), 101-105, 2019 | 325 | 2019 |
Aligned and non-aligned double JPEG detection using convolutional neural networks M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, ... Journal of Visual Communication and Image Representation 49, 153-163, 2017 | 232 | 2017 |
The Source Identification Game: an Information-Theoretic Perspective M Barni, B Tondi IEEE, Transaction on Information Forensic and Security, 0 | 116* | |
A universal technique to hide traces of histogram-based image manipulations M Barni, M Fontani, B Tondi Proceedings of the on Multimedia and security, 97-104, 2012 | 81 | 2012 |
CNN detection of GAN-generated face images based on cross-band co-occurrences analysis M Barni, K Kallas, E Nowroozi, B Tondi 2020 IEEE international workshop on information forensics and security (WIFS …, 2020 | 80 | 2020 |
Adversarial multimedia forensics: Overview and challenges ahead M Barni, MC Stamm, B Tondi 2018 26th European signal processing conference (EUSIPCO), 962-966, 2018 | 64 | 2018 |
Copy move source-target disambiguation through multi-branch CNNs M Barni, QT Phan, B Tondi IEEE Transactions on Information Forensics and Security 16, 1825-1840, 2020 | 61 | 2020 |
CNN-based detection of generic contrast adjustment with JPEG post-processing M Barni, A Costanzo, E Nowroozi, B Tondi 2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018 | 61 | 2018 |
An overview of backdoor attacks against deep neural networks and possible defences W Guo, B Tondi, M Barni IEEE Open Journal of Signal Processing 3, 261-287, 2022 | 50 | 2022 |
Spread-Transform Dither Modulation Watermarking of Deep Neural Network Y Li, B Tondi, M Barni Elsevier Journal of Information Security and Applications, 2021 | 49 | 2021 |
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability B Zhang, B Tondi, M Barni Computer vision and image understanding 197, 102988, 2020 | 49 | 2020 |
GAN generation of synthetic multispectral satellite images L Abady, M Barni, A Garzelli, B Tondi Image and signal processing for remote sensing XXVI 11533, 122-133, 2020 | 46 | 2020 |
Binary Hypothesis Testing Game with Training Data M Barni, B Tondi IEEE, Transaction on Information Theory, 2014 | 43 | 2014 |
Supervised gan watermarking for intellectual property protection J Fei, Z Xia, B Tondi, M Barni 2022 IEEE International Workshop on Information Forensics and Security (WIFS …, 2022 | 37 | 2022 |
On the transferability of adversarial examples against CNN-based image forensics M Barni, K Kallas, E Nowroozi, B Tondi ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019 | 37 | 2019 |
Secure detection of image manipulation by means of random feature selection Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019 | 36 | 2019 |
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples M Barni, E Nowroozi, B Tondi 2017 25th European signal processing conference (EUSIPCO), 281-285, 2017 | 33 | 2017 |
A gradient-based pixel-domain attack against SVM detection of global image manipulations Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni 2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017 | 32 | 2017 |
Primary quantization matrix estimation of double compressed JPEG images via CNN Y Niu, B Tondi, Y Zhao, M Barni IEEE Signal Processing Letters 27, 191-195, 2019 | 31 | 2019 |
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder M Barni, Z Chen, B Tondi 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 30 | 2016 |