关注
Benedetta Tondi
Benedetta Tondi
Department of Information Engineering of the University of Siena
在 unisi.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A new backdoor attack in cnns by training set corruption without label poisoning
M Barni, K Kallas, B Tondi
2019 IEEE International Conference on Image Processing (ICIP), 101-105, 2019
3252019
Aligned and non-aligned double JPEG detection using convolutional neural networks
M Barni, L Bondi, N Bonettini, P Bestagini, A Costanzo, M Maggini, ...
Journal of Visual Communication and Image Representation 49, 153-163, 2017
2322017
The Source Identification Game: an Information-Theoretic Perspective
M Barni, B Tondi
IEEE, Transaction on Information Forensic and Security, 0
116*
A universal technique to hide traces of histogram-based image manipulations
M Barni, M Fontani, B Tondi
Proceedings of the on Multimedia and security, 97-104, 2012
812012
CNN detection of GAN-generated face images based on cross-band co-occurrences analysis
M Barni, K Kallas, E Nowroozi, B Tondi
2020 IEEE international workshop on information forensics and security (WIFS …, 2020
802020
Adversarial multimedia forensics: Overview and challenges ahead
M Barni, MC Stamm, B Tondi
2018 26th European signal processing conference (EUSIPCO), 962-966, 2018
642018
Copy move source-target disambiguation through multi-branch CNNs
M Barni, QT Phan, B Tondi
IEEE Transactions on Information Forensics and Security 16, 1825-1840, 2020
612020
CNN-based detection of generic contrast adjustment with JPEG post-processing
M Barni, A Costanzo, E Nowroozi, B Tondi
2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018
612018
An overview of backdoor attacks against deep neural networks and possible defences
W Guo, B Tondi, M Barni
IEEE Open Journal of Signal Processing 3, 261-287, 2022
502022
Spread-Transform Dither Modulation Watermarking of Deep Neural Network
Y Li, B Tondi, M Barni
Elsevier Journal of Information Security and Applications, 2021
492021
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
B Zhang, B Tondi, M Barni
Computer vision and image understanding 197, 102988, 2020
492020
GAN generation of synthetic multispectral satellite images
L Abady, M Barni, A Garzelli, B Tondi
Image and signal processing for remote sensing XXVI 11533, 122-133, 2020
462020
Binary Hypothesis Testing Game with Training Data
M Barni, B Tondi
IEEE, Transaction on Information Theory, 2014
432014
Supervised gan watermarking for intellectual property protection
J Fei, Z Xia, B Tondi, M Barni
2022 IEEE International Workshop on Information Forensics and Security (WIFS …, 2022
372022
On the transferability of adversarial examples against CNN-based image forensics
M Barni, K Kallas, E Nowroozi, B Tondi
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
372019
Secure detection of image manipulation by means of random feature selection
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
IEEE Transactions on Information Forensics and Security 14 (9), 2454-2469, 2019
362019
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples
M Barni, E Nowroozi, B Tondi
2017 25th European signal processing conference (EUSIPCO), 281-285, 2017
332017
A gradient-based pixel-domain attack against SVM detection of global image manipulations
Z Chen, B Tondi, X Li, R Ni, Y Zhao, M Barni
2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017
322017
Primary quantization matrix estimation of double compressed JPEG images via CNN
Y Niu, B Tondi, Y Zhao, M Barni
IEEE Signal Processing Letters 27, 191-195, 2019
312019
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
M Barni, Z Chen, B Tondi
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
302016
系统目前无法执行此操作,请稍后再试。
文章 1–20