ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
Latest Publications
TOTAL DOCUMENTS
37
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
9781509011384
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Effects of text filtering on authentication performance of keystroke biometrics
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823899
◽
2016
◽
Cited By ~ 7
Author(s):
Jiaju Huang
◽
Daqing Hou
◽
Stephanie Schuckers
◽
Shambhu Upadhyaya
Keyword(s):
Keystroke Biometrics
◽
Text Filtering
Download Full-text
Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823909
◽
2016
◽
Cited By ~ 3
Author(s):
Simone Milani
◽
Paolo Bestagini
◽
Stefano Tubaro
Keyword(s):
Phylogenetic Analysis
◽
Similar Images
Download Full-text
Table of contents
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823925
◽
2016
◽
Download Full-text
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823902
◽
2016
◽
Cited By ~ 10
Author(s):
Mauro Barni
◽
Zhipeng Chen
◽
Benedetta Tondi
Keyword(s):
Jpeg Compression
◽
Data Driven
◽
Double Jpeg Compression
Download Full-text
A residual feature-based replay attack detection approach for brainprint biometric systems
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823907
◽
2016
◽
Cited By ~ 4
Author(s):
Qiong Gui
◽
Wei Yang
◽
Zhanpeng Jin
◽
Maria V. Ruiz-Blondet
◽
Sarah Laszlo
Keyword(s):
Attack Detection
◽
Replay Attack
◽
Detection Approach
◽
Biometric Systems
◽
Feature Based
Download Full-text
Anti-forensic technique for median filtering using L1-L2 TV model
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823571
◽
2016
◽
Author(s):
Shishir Sharma
◽
A.V. Subramanyam
◽
Monika Jain
◽
Ambuj Mehrish
◽
Sabu Emmanuel
Keyword(s):
Median Filtering
◽
Tv Model
Download Full-text
On the usefulness of color for kinship verification from face images
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823901
◽
2016
◽
Cited By ~ 6
Author(s):
Xiaoting Wu
◽
Elhocine Boutellaa
◽
Miguel Bordallo Lopez
◽
Xiaoyi Feng
◽
Abdenour Hadid
Keyword(s):
Kinship Verification
◽
Face Images
Download Full-text
A Stackelberg game perspective on the conflict between machine learning and data obfuscation
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823893
◽
2016
◽
Cited By ~ 13
Author(s):
Jeffrey Pawlick
◽
Quanyan Zhu
Keyword(s):
Machine Learning
◽
Stackelberg Game
◽
Data Obfuscation
Download Full-text
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823895
◽
2016
◽
Cited By ~ 1
Author(s):
Gabriel Macia-Fernandez
◽
Jose Camacho
◽
Pedro Garcia-Teodoro
◽
Rafael A. Rodriguez-Gomez
Keyword(s):
Anomaly Detection
◽
Network Monitoring
◽
Multivariate Statistical
Download Full-text
Passive NAT detection using HTTP access logs
2016 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs.2016.7823896
◽
2016
◽
Cited By ~ 3
Author(s):
Tomas Komarek
◽
Martin Grill
◽
Tomas Pevny
Keyword(s):
Access Logs
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close