ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
Latest Publications
TOTAL DOCUMENTS
31
(FIVE YEARS 31)
H-INDEX
1
(FIVE YEARS 1)
Published By IEEE
9781728199306
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360891
◽
2020
◽
Author(s):
Alberto Pedrouzo-Ulloa
◽
Juan Ramon Troncoso-Pastoriza
◽
Nicolas Gama
◽
Mariya Georgieva
◽
Fernando Perez-Gonzalez
Keyword(s):
Linear Function
◽
Function Evaluation
◽
Hadamard Transforms
Download Full-text
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360895
◽
2020
◽
Author(s):
Pierre-Olivier Brissaud
◽
Jerome Francois
◽
Isabelle Chrisment
◽
Thibault Cholez
◽
Olivier Bettan
Keyword(s):
Traffic Monitoring
◽
Time And Space
Download Full-text
An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360892
◽
2020
◽
Author(s):
Kaizaburo Chubachi
Keyword(s):
Ensemble Model
◽
Image Steganalysis
Download Full-text
ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360896
◽
2020
◽
Author(s):
Remi Cogranne
◽
Quentin Giboulot
◽
Patrick Bas
Keyword(s):
Academic Research
◽
Realistic Images
Download Full-text
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360911
◽
2020
◽
Author(s):
Sharad Joshi
◽
Pawel Korus
◽
Nitin Khanna
◽
Nasir Memon
Keyword(s):
Empirical Evaluation
Download Full-text
Fast Monte Carlo Dropout and Error Correction for Radio Transmitter Classification
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360887
◽
2020
◽
Author(s):
Liangping Ma
◽
John Kaewell
Keyword(s):
Monte Carlo
◽
Error Correction
◽
Radio Transmitter
Download Full-text
Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360910
◽
2020
◽
Author(s):
Pu Sun
◽
Yuezun Li
◽
Honggang Qi
◽
Siwei Lyu
Download Full-text
Threshold audio secret sharing schemes encrypting audio secrets
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360907
◽
2020
◽
Author(s):
Tetsuro Ishizuka
◽
Yodai Watanabe
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
Download Full-text
Fuzzing Framework for ESP32 Microcontrollers
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360889
◽
2020
◽
Author(s):
Matthias Borsig
◽
Sven Nitzsche
◽
Max Eisele
◽
Roland Groll
◽
Jurgen Becker
◽
...
Download Full-text
On Perfect Obfuscation: Local Information Geometry Analysis
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
◽
10.1109/wifs49906.2020.9360888
◽
2020
◽
Author(s):
Behrooz Razeghi
◽
Flavio. P. Calmon
◽
Deniz Gunduz
◽
Slava Voloshynovskiy
Keyword(s):
Information Geometry
◽
Local Information
◽
Geometry Analysis
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close