Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

CNN-based adversarial embedding for image steganography

W Tang, B Li, S Tan, M Barni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Steganographic schemes are commonly designed in a way to preserve image statistics or
steganalytic features. Since most of the state-of-the-art steganalytic methods employ a …

Adversarial multimedia forensics: Overview and challenges ahead

M Barni, MC Stamm, B Tondi - 2018 26th European signal …, 2018 - ieeexplore.ieee.org
In recent decades, a significant research effort has been devoted to the development of
forensic tools for retrieving information and detecting possible tampering of multimedia …

Audio steganography based on iterative adversarial attacks against convolutional neural networks

J Wu, B Chen, W Luo, Y Fang - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …

Differential game-based strategies for preventing malware propagation in wireless sensor networks

S Shen, H Li, R Han, AV Vasilakos… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to propagating malware because of special
characteristics of sensor nodes. Considering the fact that sensor nodes periodically enter …

Adam and the ants: on the influence of the optimization algorithm on the detectability of DNN watermarks

B Cortiñas-Lorenzo, F Pérez-González - Entropy, 2020 - mdpi.com
As training Deep Neural Networks (DNNs) becomes more expensive, the interest in
protecting the ownership of the models with watermarking techniques increases. Uchida et …

DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies

V Matta, M Di Mauro, M Longo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …

Second-order statistics analysis to cope with contrast enhancement counter-forensics

A De Rosa, M Fontani, M Massai… - IEEE Signal …, 2015 - ieeexplore.ieee.org
Image forensic analysis for the detection of contrast enhancement and other histogram-
based processing, usually relies on the study of first-order statistics derived from image …

Privacy against a hypothesis testing adversary

Z Li, TJ Oechtering, D Gündüz - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data
distribution is studied. The original data sequence is assumed to come from one of the two …

Botnet identification in DDoS attacks with multiple emulation dictionaries

M Cirillo, M Di Mauro, V Matta… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …