메뉴 건너뛰기




Volumn , Issue , 2013, Pages 8682-8686

Coping with the enemy: Advances in adversary-aware signal processing

Author keywords

adversary; binary decision; biometric spoofing; forensics; Game theory; reputation; watermarking

Indexed keywords

ADVERSARY; BINARY DECISION; FORENSICS; GAME-THEORETIC; REPUTATION; SENSITIVITY ATTACK; SIGNAL PROCESSING PROBLEMS; UNIFIED FRAMEWORK;

EID: 84890463324     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2013.6639361     Document Type: Conference Paper
Times cited : (63)

References (29)
  • 2
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An information-theoretic perspective
    • March
    • M. Barni and B. Tondi, "The source identification game: an information-theoretic perspective," IEEE Trans. Information Forensics and Security, vol. 8, no. 3, pp. 450-463, March 2013.
    • (2013) IEEE Trans. Information Forensics and Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2
  • 3
    • 84873623957 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • H. T. Sencar and N. Memon, Eds. Springer Berlin / Heidelberg
    • R. Bohme and M. Kirchner, "Counter-forensics: Attacking image forensics," in Digital Image Forensics, H. T. Sencar and N. Memon, Eds. Springer Berlin / Heidelberg, 2012.
    • (2012) Digital Image Forensics
    • Bohme, R.1    Kirchner, M.2
  • 9
    • 72949092882 scopus 로고    scopus 로고
    • Defending online reputation systems against collaborative unfair raters through signal modeling and trust
    • March
    • Y. Yang, Y. L. Sun, S. Kay, and Q. Yang, "Defending online reputation systems against collaborative unfair raters through signal modeling and trust," in Proc. of ACM Symp. on Applied Computing, March 2009.
    • (2009) Proc. of ACM Symp. on Applied Computing
    • Yang, Y.1    Sun, Y.L.2    Kay, S.3    Yang, Q.4
  • 10
    • 80052671835 scopus 로고    scopus 로고
    • Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
    • W. Wang, H. Li, Y. Sun, and Z. Han, "Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks," EURASIP J. on Advances in Signal Processing, vol. 2010, 2010.
    • (2010) EURASIP J. on Advances in Signal Processing, Vol. 2010
    • Wang, W.1    Li, H.2    Sun, Y.3    Han, Z.4
  • 12
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • J-P. M. G. Linnartz and M. Van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Information Hiding, LNCS Vol. 1525, 1998, pp. 258-272.
    • (1998) Proc. Information Hiding, LNCS , vol.1525 , pp. 258-272
    • Linnartz, J.-P.M.G.1    Van Dijk, M.2
  • 16
    • 0037851028 scopus 로고    scopus 로고
    • An asymmetric watermarking method
    • T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Trans. on Signal Processing, vol. 5, no. 4, pp. 981-995, 2003.
    • (2003) IEEE Trans. on Signal Processing , vol.5 , Issue.4 , pp. 981-995
    • Furon, T.1    Duhamel, P.2
  • 19
    • 78649284505 scopus 로고    scopus 로고
    • Anomaly detection in feedbackbased reputation systems through temporal and correlation analysis
    • August
    • Y. Liu and Y. Sun, "Anomaly detection in feedbackbased reputation systems through temporal and correlation analysis," in Proc. of 2nd IEEE Int. Conf. on Social Computing, August 2010.
    • (2010) Proc. of 2nd IEEE Int. Conf. on Social Computing
    • Liu, Y.1    Sun, Y.2
  • 24
    • 77950246678 scopus 로고    scopus 로고
    • Biometric system security
    • A.K. Jain, P. Flynn, and A.A. Ross, Eds.Springer
    • A. Adler, "Biometric system security," in Handbook of biometrics, A.K. Jain, P. Flynn, and A.A. Ross, Eds., pp. 381-402. Springer, 2008.
    • (2008) Handbook of Biometrics , pp. 381-402
    • Adler, A.1
  • 29
    • 84867821467 scopus 로고    scopus 로고
    • Afriat's test for detecting malicious agents
    • V. Krishnamurthy and W. Hoiles, "Afriat's test for detecting malicious agents," IEEE Signal Processing Letters, vol. 19, no. 12, pp. 801-804, 2012.
    • (2012) IEEE Signal Processing Letters , vol.19 , Issue.12 , pp. 801-804
    • Krishnamurthy, V.1    Hoiles, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.