Abstract is missing.
- Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?François-Xavier Standaert. 1 [doi]
- How Private is Machine Learning?Nicolas Carlini. 3 [doi]
- Tracing Data through Learning with WatermarkingAlexandre Sablayrolles. 5 [doi]
- PRNU-based Deepfake DetectionFlorian Lugstein, Simon Baier, Gregor Bachinger, Andreas Uhl. 7-12 [doi]
- Fake Speech Detection Using Residual Network with Transformer EncoderZhenyu Zhang, Xiaowei Yi, Xianfeng Zhao. 13-22 [doi]
- Meta and Media Data Stream Forensics in the Encrypted Domain of Video ConferencesRobert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann. 23-33 [doi]
- Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?Supriya Adhatarao, Cédric Lauradoux. 35-44 [doi]
- Angular Margin Softmax Loss and Its Variants for Double Compressed AMR Audio DetectionAykut Büker, Cemal Hanilçi. 45-50 [doi]
- FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated LearningChen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng. 51-62 [doi]
- Banners: Binarized Neural Networks with Replicated Secret SharingAlberto Ibarrondo, Hervé Chabanne, Melek Önen. 63-74 [doi]
- Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!Sayed Erfan Arefin, Abdul Serwadda. 75-80 [doi]
- iNNformant: Boundary Samples as Telltale WatermarksAlexander Schlögl, Tobias Kupek, Rainer Böhme. 81-86 [doi]
- Towards Match-on-Card Finger Vein RecognitionMichael Linortner, Andreas Uhl. 87-92 [doi]
- General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic InvestigationsAndrey Makrushin, Christof Kauba, Simon Kirchgasser, Stefan Seidlitz, Christian Kraetzer, Andreas Uhl, Jana Dittmann. 93-104 [doi]
- Optimizing Additive Approximations of Non-additive Distortion FunctionsSolène Bernard, Patrick Bas, Tomás Pevný, John Klein. 105-112 [doi]
- Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT DatasetKevin Lamshöft, Tom Neubert, Christian Krätzer, Claus Vielhauer, Jana Dittmann. 113-124 [doi]
- Revisiting Perturbed QuantizationJan Butora, Jessica J. Fridrich. 125-136 [doi]
- Fast Detection of Heterogeneous Parallel Steganography for Streaming VoiceHuili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, Yongfeng Huang. 137-142 [doi]
- How to Pretrain for SteganalysisJan Butora, Yassine Yousfi, Jessica J. Fridrich. 143-148 [doi]
- Improving EfficientNet for JPEG SteganalysisYassine Yousfi, Jan Butora, Jessica Fridrich, Clément Fuji Tsang. 149-157 [doi]
- Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret KeyApril Pyone Maung Maung, Hitoshi Kiya. 159-164 [doi]
- White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning ModelMinoru Kuribayashi, Takuro Tanaka, Shunta Suzuki, Tatsuya Yasui, Nobuo Funabiki. 165-170 [doi]
- A Protocol for Secure Verification of Watermarks Embedded into Machine Learning ModelsKatarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Hugo Beguinet, Hugo Senet. 171-176 [doi]
- On the Robustness of Backdoor-based Watermarking in Deep Neural NetworksMasoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, XinDa Li, Florian Kerschbaum. 177-188 [doi]
- DNN Watermarking: Four Challenges and a FuneralMauro Barni, Fernando Pérez-González, Benedetta Tondi. 189-196 [doi]