Benedetta Tondi
Orcid: 0000-0002-7518-046X
According to our database1,
Benedetta Tondi
authored at least 80 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
8
1
2
6
8
3
4
2
2
1
1
2
2
5
3
2
3
4
5
3
2
2
4
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
EURASIP J. Image Video Process., December, 2024
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
IEEE Trans. Inf. Forensics Secur., 2024
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A siamese-based verification system for open-set architecture attribution of synthetic images.
Pattern Recognit. Lett., 2024
An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images.
CoRR, 2022
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022
Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
2021
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Master Key backdoor for universal impersonation attack against DNN-based face verification.
Pattern Recognit. Lett., 2021
J. Inf. Secur. Appl., 2021
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture.
EURASIP J. Inf. Secur., 2021
CoRR, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Springer, ISBN: 978-981-32-9000-6, 2021
2020
IEEE Signal Process. Lett., 2020
CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework.
Signal Process. Image Commun., 2020
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.
Secur. Commun. Networks, 2020
Improving the security of image manipulation detection through one-and-a-half-class multiple classification.
Multim. Tools Appl., 2020
Found. Trends Commun. Inf. Theory, 2020
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability.
Comput. Vis. Image Underst., 2020
Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.
CoRR, 2020
CoRR, 2020
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
CoRR, 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Proceedings of the 21st IEEE International Workshop on Multimedia Signal Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
IEEE Trans. Inf. Theory, 2018
IEEE Signal Process. Lett., 2018
Inf. Fusion, 2018
CoRR, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Vis. Commun. Image Represent., 2017
A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples.
Proceedings of the 25th European Signal Processing Conference, 2017
2016
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Inf. Forensics Secur., 2016
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Inf. Forensics Secur., 2016
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
2015
Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
CoRR, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. Digit. Crime Forensics, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
2012
Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Multimedia and Security Workshop, 2012