Abstract is missing.
- Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel AttacksShan Jin, Riccardo Bettati. 1-6 [doi]
- Detecting Deep-Fake Videos from Appearance and BehaviorShruti Agarwal, Hany Farid, Tarek El-Gaaly, Ser-Nam Lim. 1-6 [doi]
- Electromagnetic Fault Injection as a New Forensic Approach for SoCsClément Gaine, Driss Aboulkassimi, Simon Pontié, Jean-Pierre Nikolovski, Jean-Max Dutertre. 1-6 [doi]
- Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging PipelinesSharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon. 1-6 [doi]
- Training Strategies and Data Augmentations in CNN-based DeepFake Video DetectionLuca Bondi, Edoardo Daniele Cannas, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- The Suitability of RSA for Bulk Data EncryptionPranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt, Richard J. Enbody. 1-6 [doi]
- Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signaturesIuliia Tkachenko, Alain Trémeau, Thierry Fournel. 1-6 [doi]
- Synchronization Minimizing Statistical Detectability for Side-Informed JPEG SteganographyQuentin Giboulot, Patrick Bas, Rémi Cogranne. 1-6 [doi]
- CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences AnalysisMauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi. 1-6 [doi]
- An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for IrisJuan E. Tapia, Marta Gomez-Barrero, Christoph Busch 0001. 1-6 [doi]
- ALASKA#2: Challenging Academic Research on Steganalysis with Realistic ImagesRémi Cogranne, Quentin Giboulot, Patrick Bas. 1-5 [doi]
- Speech Audio Splicing Detection and Localization Exploiting Reverberation CuesDavide Capoferri, Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti, Stefano Tubaro. 1-6 [doi]
- Training CNNs in Presence of JPEG Compression: Multimedia Forensics vs Computer VisionSara Mandelli, Nicolò Bonettini, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- Landmark Breaker: Obstructing DeepFake By Disturbing Landmark ExtractionPu Sun, Yuezun Li, Honggang Qi, Siwei Lyu. 1-6 [doi]
- On Perfect Obfuscation: Local Information Geometry AnalysisBehrooz Razeghi, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy. 1-6 [doi]
- Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and SpacePierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan. 1-6 [doi]
- Reliable JPEG Forensics via Model UncertaintyBenedikt Lorch, Anatol Maier, Christian Riess. 1-6 [doi]
- ImageNet Pre-trained CNNs for JPEG SteganalysisYassine Yousfi, Jan Butora, Eugene Khvedchenya, Jessica J. Fridrich. 1-6 [doi]
- Threshold audio secret sharing schemes encrypting audio secretsTetsuro Ishizuka, Yodai Watanabe. 1-5 [doi]
- Post-Quantum Secure Two-Party Computation for Iris Biometric Template ProtectionPia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, Christoph Busch 0001. 1-6 [doi]
- Fuzzing Framework for ESP32 MicrocontrollersMatthias Börsig, Sven Nitzsche, Max Eisele, Roland Gröll, Jürgen Becker 0001, Ingmar Baumgart. 1-6 [doi]
- AmpleDroid Recovering Large Object Files from Android Application MemorySneha Sudhakaran, Aisha Ali Gombe, Augustine Orgah, Andrew Case, Golden G. Richard III. 1-6 [doi]
- RF Waveform Synthesis Guided by Deep Reinforcement LearningT. Scott Brandes, Scott Kuzdeba, Jessee McClelland, Neil Bomberger, Andrew Radlbeck. 1-6 [doi]
- A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming GameAndrey Garnaev, Wade Trappe, Narayan B. Mandayam, H. Vincent Poor. 1-6 [doi]
- Fast Monte Carlo Dropout and Error Correction for Radio Transmitter ClassificationLiangping Ma, John Kaewell. 1-5 [doi]
- Texture-based Presentation Attack Detection for Automatic Speaker VerificationLázaro Janier González-Soler, Jose Patino 0001, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch 0001, Nicholas W. D. Evans. 1-6 [doi]
- Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function EvaluationAlberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González. 1-6 [doi]
- Multi-spectral Facial Landmark DetectionJin Keong, Xing-Bo Dong, Zhe Jin, Khawla Mallat, Jean-Luc Dugelay. 1-6 [doi]
- The Syndrome-Trellis Sampler for Generative SteganographyTamio-Vesa Nakajima, Andrew D. Ker. 1-6 [doi]
- Generative Autoregressive Ensembles for Satellite Imagery Manipulation DetectionDaniel Mas Montserrat, János Horváth, Sri Kalyan Yarlagadda, Fengqing Zhu, Edward J. Delp. 1-6 [doi]
- An Ensemble Model using CNNs on Different Domains for ALASKA2 Image SteganalysisKaizaburo Chubachi. 1-6 [doi]