TONDI, BENEDETTA
TONDI, BENEDETTA
Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche
A CycleGAN Watermarking Method for Ownership Verification
2024-01-01 Lin, D.; Tondi, B.; Li, B.; Barni, M.
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines
2016-01-01 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta
A GPU-accelerated algorithm for copy move detection in large-scale satellite images
2023-01-01 Barni, Mauro; Costanzo, Andrea; Dimitri, Giovanna Maria; Tondi, Benedetta
A gradient-based pixel-domain attack against SVM detection of global image manipulations
2017-01-01 Chen, Zhipeng; Tondi, Benedetta; Li, Xiaolong; Ni, Rongrong; Zhao, Yao; Barni, Mauro
A Master Key backdoor for universal impersonation attack against DNN-based face verification
2021-01-01 Guo, Wei; Tondi, Benedetta; Barni, Mauro
A message passing approach for decision fusion in adversarial multi-sensor networks
2018-01-01 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks
2017-01-01 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning
2019-01-01 Barni, M.; Kallas, K.; Tondi, B.
A Siamese Based System for City Verification
2023-01-01 Alamayreh, Omran; Wang, Jun; Dimitri, Giovanna Maria; Tondi, Benedetta; Barni, Mauro
A siamese-based verification system for open-set architecture attribution of synthetic images
2024-01-01 Abady, Lydia; Wang, Jun; Tondi, Benedetta; Barni, Mauro
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection
2023-01-01 Guo, Wei; Tondi, Benedetta; Barni, Mauro
A Universal Attack Against Histogram-Based Image Forensics
2013-01-01 Barni, Mauro; Fontani, Marco; Tondi, Benedetta
A universal technique to hide traces of histogram-based manipulations
2012-01-01 Barni, Mauro; Fontani, Marco; Tondi, Benedetta
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach
2019-01-01 Barni, Mauro; Huang, Dequ; Li, Bin; Tondi, Benedetta
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability
2020-01-01 Zhang, B.; Tondi, B.; Barni, M.
Adversarial multimedia forensics: Overview and challenges ahead
2018-01-01 Barni, M.; Stamm, M. C.; Tondi, B.
Adversarial source identification game with corrupted training
2018-01-01 Barni, Mauro; Tondi, Benedetta
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder
2016-01-01 Barni, M; Chen, Z; Tondi, B
Aligned and non-aligned double JPEG detection using convolutional neural networks
2017-01-01 Barni, M.; Bondi, L.; Bonettini, N.; Bestagini, P.; Costanzo, A.; Maggini, M.; Tondi, B.; Tubaro, S.
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities
2022-01-01 Wang, J.; Alamayreh, O.; Tondi, B.; Barni, M.