A Survey of Machine Learning Techniques in Adversarial Image Forensics E Nowroozi, A Dehghantanha, RM Parizi, KKR Choo Computers & Security - Elsevier, 37, 2021 | 85 | 2021 |
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis M Barni, K Kallas, E Nowroozi, B Tondi IEEE International Workshop on Information Forensics and Security, 6, 2020 | 81 | 2020 |
CNN-based detection of generic contrast adjustment with JPEG post-processing M Barni, A Costanzo, E Nowroozi, B Tondi 2018 25th IEEE International Conference on Image Processing (ICIP), 3803-3807, 2018 | 61 | 2018 |
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics M Barni, K Kallas, E Nowroozi, B Tondi 44th International Conference on Acoustics, Speech, and Signal Processing …, 2018 | 37 | 2018 |
Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples M Barni, E Nowroozi, B Tondi 2017 25th European signal processing conference (EUSIPCO), 281-285, 2017 | 33 | 2017 |
Demystifying the Transferability of Adversarial Attacks in Computer Networks E Nowroozi, M Conti, Y Mekdad, M Hajian Berenjestanaki, ... IEEE Transactions on Network and Service Management, 12, 2022 | 23 | 2022 |
VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents A Ferreira, E Nowroozi, M Barni Journal of Imaging, 23, 2021 | 22 | 2021 |
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples M Barni, E Nowroozi, B Tondi, B Zhang ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 19 | 2020 |
Detection of adaptive histogram equalization robust against JPEG compression M Barni, E Nowroozi, B Tondi 2018 International Workshop on Biometrics and Forensics (IWBF), 1 - 8, 2018 | 17 | 2018 |
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework E Nowroozi, Abhishek, M Mohmmadi, M Conti IEEE Transactions on Network and Service Management, 2023 | 16 | 2023 |
Improving the security of image manipulation detection through one-and-a-half-class multiple classification M Barni, E Nowroozi, B Tondi Multimedia Tools and Applications, 1-26, 2019 | 15 | 2019 |
Detecting High-Quality GAN-Generated Face Images using Neural Networks E Nowroozi, Y Mekdad River Publishers Series in Security and Digital Forensics, Big Data …, 2022 | 12 | 2022 |
Impact of Media Forensics and Deepfake in Society E Nowroozi, S Seyedshoari, M Mohammadi, A Jolfaei Breakthroughs in Digital Biometrics and Forensics, 2022 - Springer, Cham, 2022 | 11 | 2022 |
Machine Learning Techniques for Image Forensics in Adversarial Setting E Nowroozi https://theses.eurasip.org/theses/859/machine-learning-techniques-for-image …, 2020 | 8 | 2020 |
Double JPEG Compression Detection Using Statistical Analysis E Nowroozi, A Zakerolhosseini Advances in Computer Science : an International Journal 4 (3), 70-76, 2015 | 8 | 2015 |
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization E Nowroozi, M Mohammadi, P Golmohammadi, Y Mekdad, M Conti, ... IEEE Transactions on Service Computing, 2023 | 6 | 2023 |
Cryptocurrency wallets: assessment and security E Nowroozi, S Seyedshoari, Y Mekdad, E Savas, M Conti Springer - Advances in Information Security, 2023 | 5 | 2023 |
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System M Conti, S Milani, E Nowroozi, G Orazi https://arxiv.org/abs/2106.15130, 2022 | 5 | 2022 |
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks E Nowroozi, M Mohammadi, E Savas, M Conti, Y Mekdad arXiv, 2022 | 4* | 2022 |
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks E Nowroozi, E Savas, MR Mohammadi, Y Mekdad, M Conti IEEE Transactions on Network and Service Management, 2023 | 3 | 2023 |