WIFS 2019 Accepted Papers

  • Patrick Bours and Halvor Kulsrud. Detection of Cyber Grooming in Online Conversation
  • Romain Giot and Anderson Rocha. Siamese Networks for Static Keystroke Dynamics Authentication
  • Pin-Hsun Lin, Christiane Kuhn, Thorsten Strufe and Eduard A. Jorswieck. Physical Layer Privacy in Broadcast Channels
  • Ahmad Zakaria, Marc Chaumont and Gérard Subsol. Pooled Steganalysis in JPEG: how to deal with the spreading strategy?
  • Linda Senigagliesi, Lorenzo Cintioni, Marco Baldi and Ennio Gambi. Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning
  • Jascha Kolberg, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth and Christoph Busch. Template Protection based on Homomorphic Encryption: Computational Efficient Application to Iris-Biometric Verification and Identification
  • Luca Debiasi, Simon Kirchgasser, Bernhard Prommegger, Andreas Uhl, Grudzien Artur and Kowalski Marcin. Biometric Template Protection in the Image Domain Using Non-invertible Grey-scale Transforms
  • Marzieh Gheisari, Teddy Furon and Laurent Amsaleg. Group Membership Verification: Sparse or Dense?
  • Hendrik Vogt, Chu Li, Christian Zenger and Aydin Sezgin. On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels
  • Vincent van der Meer, Hugo Jonker, Guy Dols, Harm Van Beek, Jeroen van den Bos and Marko Van Eekelen. File Fragmentation in the Wild: a Privacy-Friendly Approach
  • Lieneke Kusters and Frans Willems. Debiasing of SRAM PUFs: Selection and Balancing
  • Fabio Carrara, Roberto Caldelli, Fabrizio Falchi and Giuseppe Amato. On the Robustness to Adversarial Examples of Neural ODE Image Classifiers
  • Mauro Barni, Dequ Huang, Bin Li and Benedetta Tondi. Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach
  • Rohit Yadav, Iuliia Tkachenko, Alain Tremeau and Thierry Fournel. Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution
  • Clemens Seibold, Anna Hilsmann, Andrey Makrushin, Christian Kraetzer, Tom Neubert, Prof. Dr. Jana Dittmann and Peter Eisert. Visual Feature Space Analyses of Face Morphing Detectors to Predict Generalization Ability
  • Florian Wilde, Christoph Frisch and Michael Pehl. Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID
  • Matthias Kirchner and Cameron Johnson. SPN-CNN: Boosting Sensor-Based Source Camera Attribution With Deep Learning
  • Behrooz Razeghi, Taras Stanko, Boris Škorić and Slava Voloshynovskiy. Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding
  • Sebastian Baur, Ning Cai, Moritz Wiese and Holger Boche. Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy
  • Andrey Garnaev and Wade Trappe. A Power Control Game Involving Jamming and Eavesdropping Defense
  • Caroline Mazini Rodrigues, Luis Pereira, Anderson Rocha and Zanoni Dias. Image Semantic Representation for Event Understanding
  • Alessandro Brighente, Francesco Formaggio, Gabriele Ruvoletto and Stefano Tomasin. Ranking-Based Attacks to In-Region Location Verification Systems
  • Holger Boche, Rafael F. Schaefer and H. Vincent Poor. Resource Allocation for Secure Communication Systems: Algorithmic Solvability
  • Francesco Marra, Cristiano Saltori, Giulia Boato and Luisa Verdoliva. Incremental learning for the detection and classification of GAN-generated images
  • Nitish Mital, Cong Ling and Deniz Gunduz. PolyMat Codes for Secure Distributed Multiple Matrix Multiplication
  • Xu Zhang, Svebor Karaman and Shih-Fu Chang. Detecting and Simulating Artifacts in GAN Fake Images
  • Clara Borrelli, Paolo Bestagini, Fabio Antonacci, Augusto Sarti and Stefano Tubaro. Automatic Reliability Estimation for Speech Audio Surveillance Recordings
  • Ecenaz Erdemir, Pier Luigi Dragotti and Deniz Gunduz. Privacy-Aware Location Sharing with Deep Reinforcement Learning

 

To be completed with conditionally accepted submissions.