TONDI, BENEDETTA

TONDI, BENEDETTA  

Dipartimento di Ingegneria dell'Informazione e Scienze Matematiche  

Mostra records
Risultati 1 - 20 di 69 (tempo di esecuzione: 0.0 secondi).
Titolo Data di pubblicazione Autore(i) File Abstract
A CycleGAN Watermarking Method for Ownership Verification 1-gen-2024 Lin, D.; Tondi, B.; Li, B.; Barni, M. -
A Game-Theoretic framework for optimum decision fusion in the presence of Byzantines 1-gen-2016 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta -
A GPU-accelerated algorithm for copy move detection in large-scale satellite images 1-gen-2023 Barni, Mauro; Costanzo, Andrea; Dimitri, Giovanna Maria; Tondi, Benedetta -
A gradient-based pixel-domain attack against SVM detection of global image manipulations 1-gen-2017 Chen, Zhipeng; Tondi, Benedetta; Li, Xiaolong; Ni, Rongrong; Zhao, Yao; Barni, Mauro -
A Master Key backdoor for universal impersonation attack against DNN-based face verification 1-gen-2021 Guo, Wei; Tondi, Benedetta; Barni, Mauro -
A message passing approach for decision fusion in adversarial multi-sensor networks 1-gen-2018 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta -
A Message Passing Approach for Decision Fusion of Hidden-Markov Observations in the presence of Synchronized Attacks 1-gen-2017 Abrardo, Andrea; Barni, Mauro; Kallas, Kassem; Tondi, Benedetta -
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning 1-gen-2019 Barni, M.; Kallas, K.; Tondi, B. -
A Siamese Based System for City Verification 1-gen-2023 Alamayreh, Omran; Wang, Jun; Dimitri, Giovanna Maria; Tondi, Benedetta; Barni, Mauro -
A siamese-based verification system for open-set architecture attribution of synthetic images 1-gen-2024 Abady, Lydia; Wang, Jun; Tondi, Benedetta; Barni, Mauro -
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection 1-gen-2023 Guo, Wei; Tondi, Benedetta; Barni, Mauro -
A Universal Attack Against Histogram-Based Image Forensics 1-gen-2013 Barni, Mauro; Fontani, Marco; Tondi, Benedetta -
A universal technique to hide traces of histogram-based manipulations 1-gen-2012 Barni, Mauro; Fontani, Marco; Tondi, Benedetta -
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach 1-gen-2019 Barni, Mauro; Huang, Dequ; Li, Bin; Tondi, Benedetta -
Adversarial examples for reply attacks against CNN-based face recognition with anti-spoofing capability 1-gen-2020 Zhang, B.; Tondi, B.; Barni, M. -
Adversarial multimedia forensics: Overview and challenges ahead 1-gen-2018 Barni, M.; Stamm, M. C.; Tondi, B. -
Adversarial source identification game with corrupted training 1-gen-2018 Barni, Mauro; Tondi, Benedetta -
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder 1-gen-2016 Barni, M; Chen, Z; Tondi, B -
Aligned and non-aligned double JPEG detection using convolutional neural networks 1-gen-2017 Barni, M.; Bondi, L.; Bonettini, N.; Bestagini, P.; Costanzo, A.; Maggini, M.; Tondi, B.; Tubaro, S. -
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities 1-gen-2022 Wang, J.; Alamayreh, O.; Tondi, B.; Barni, M. -