Abstract is missing.
- Towards Generalization in Deepfake DetectionLuisa Verdoliva. 1 [doi]
- Looking for Signals: A Systems Security PerspectiveChristopher Kruegel. 3 [doi]
- Intellectual Property (IP) Protection for Deep Learning and Federated Learning ModelsFarinaz Koushanfar. 5 [doi]
- FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake DetectionGen Li, Xianfeng Zhao, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang. 7-18 [doi]
- Know Your Library: How the libjpeg Version Influences Compression and Decompression ResultsMartin Benes, Nora Hofer, Rainer Böhme. 19-25 [doi]
- Identity-Referenced Deepfake Detection with Contrastive LearningDongyao Shen, Youjian Zhao, Chengbin Quan. 27-32 [doi]
- Sparse Trigger Pattern Guided Deep Learning Model WatermarkingChun-Shien Lu. 33-38 [doi]
- BlindSpot: Watermarking Through FairnessSofiane Lounici, Melek Önen, Orhan Ermis, Slim Trabelsi. 39-50 [doi]
- Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade VerificationÁrpád Berta, Gábor Danner, István Hegedüs, Márk Jelasity. 51-62 [doi]
- Covert Communications through Imperfect CancellationDaniel Chew, Christine Nguyen, Samuel Berhanu, Chris Baumgart, A. Brinton Cooper. 63-68 [doi]
- Covert Channels in Network Time SecurityKevin Lamshöft, Jana Dittmann. 69-79 [doi]
- Collusion-resistant Fingerprinting of Parallel Content ChannelsBasheer Joudeh, Boris Skoric. 81-89 [doi]
- Domain Adaptational Text Steganalysis Based on Transductive LearningYiming Xue, Boya Yang, Yaqian Deng, Wanli Peng, Juan Wen. 91-96 [doi]
- Few-shot Text Steganalysis Based on Attentional Meta-learnerJuan Wen, Ziwei Zhang, Yu Yang, Yiming Xue. 97-106 [doi]
- Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT ForensicsStefan Kiltz, Robert Altschaffel, Jana Dittmann. 107-112 [doi]
- Fighting the Reverse JPEG Compatibility Attack: Pick your SideJan Butora, Patrick Bas. 113-121 [doi]
- A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial DomainDenghao Li, Jianzong Wang, Lingwei Kong, Shijing Si, Zhangcheng Huang, Chenyu Huang, Jing Xiao 0006. 123-128 [doi]
- Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic EncryptionAlberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen. 129-139 [doi]
- AMR Steganalysis based on Adversarial Bi-GRU and Data DistillationZhijun Wu 001, Junjun Guo. 141-146 [doi]
- Capacity Laws for Steganography in a CrowdAndrew D. Ker. 147-156 [doi]
- Detector-Informed Batch Steganography and Pooled SteganalysisYassine Yousfi, Eli Dworetzky, Jessica J. Fridrich. 157-168 [doi]