Benedetta Tondi

Orcid: 0000-0002-7518-046X

According to our database1, Benedetta Tondi authored at least 76 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example.
CoRR, 2024

2023
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs.
CoRR, 2023

A Siamese-based Verification System for Open-set Architecture Attribution of Synthetic Images.
CoRR, 2023

Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis.
CoRR, 2023

Robust Retraining-free GAN Fingerprinting via Personalized Normalization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Siamese Based System for City Verification.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images.
CoRR, 2022

Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution.
CoRR, 2022

A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection.
CoRR, 2022

Supervised GAN Watermarking for Intellectual Property Protection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022

Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

2021
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

Copy Move Source-Target Disambiguation Through Multi-Branch CNNs.
IEEE Trans. Inf. Forensics Secur., 2021

A Master Key backdoor for universal impersonation attack against DNN-based face verification.
Pattern Recognit. Lett., 2021

Spread-Transform Dither Modulation Watermarking of Deep Neural Network.
J. Inf. Secur. Appl., 2021

Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture.
EURASIP J. Inf. Secur., 2021

An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences.
CoRR, 2021

MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

DNN Watermarking: Four Challenges and a Funeral.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Information Fusion in Distributed Sensor Networks with Byzantines
Springer, ISBN: 978-981-32-9000-6, 2021

2020
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN.
IEEE Signal Process. Lett., 2020

CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework.
Signal Process. Image Commun., 2020

Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.
Secur. Commun. Networks, 2020

Improving the security of image manipulation detection through one-and-a-half-class multiple classification.
Multim. Tools Appl., 2020

Theoretical Foundations of Adversarial Binary Detection.
Found. Trends Commun. Inf. Theory, 2020

Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability.
Comput. Vis. Image Underst., 2020

Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks.
CoRR, 2020

On the adversarial robustness of DNNs based on error correcting output codes.
CoRR, 2020

CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Secure Detection of Image Manipulation by Means of Random Feature Selection.
IEEE Trans. Inf. Forensics Secur., 2019

Detection Games under Fully Active Adversaries.
Entropy, 2019

Attacking CNN-based anti-spoofing face authentication in the physical domain.
CoRR, 2019

Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Luminance-based video backdoor attack against anti-spoofing rebroadcast detection.
Proceedings of the 21st IEEE International Workshop on Multimedia Signal Processing, 2019

A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

On the Transferability of Adversarial Examples against CNN-based Image Forensics.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Adversarial Source Identification Game With Corrupted Training.
IEEE Trans. Inf. Theory, 2018

An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack.
IEEE Signal Process. Lett., 2018

A message passing approach for decision fusion in adversarial multi-sensor networks.
Inf. Fusion, 2018

CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing.
CoRR, 2018

Countering the Pooled Triangle Test for PRNU-based camera identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Detection of adaptive histogram equalization robust against JPEG compression.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Adversarial Multimedia Forensics: Overview and Challenges Ahead.
Proceedings of the 26th European Signal Processing Conference, 2018

Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Aligned and non-aligned double JPEG detection using convolutional neural networks.
J. Vis. Commun. Image Represent., 2017

A gradient-based pixel-domain attack against SVM detection of global image manipulations.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Threat Models and Games for Adversarial Multimedia Forensics.
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017

Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.
IEEE Trans. Inf. Forensics Secur., 2016

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines.
IEEE Trans. Inf. Forensics Secur., 2016

Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks.
CoRR, 2015

Detection games with a fully active attacker.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

2014
Binary Hypothesis Testing Game With Training Data.
IEEE Trans. Inf. Theory, 2014

Source distinguishability under corrupted training.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014

Universal Counterforensics of Multiple Compressed JPEG Images.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
The Source Identification Game: An Information-Theoretic Perspective.
IEEE Trans. Inf. Forensics Secur., 2013

A Universal Attack Against Histogram-Based Image Forensics.
Int. J. Digit. Crime Forensics, 2013

Multiple-observation hypothesis testing under adversarial conditions.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

The Security Margin: A measure of source distinguishability under adversarial conditions.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Optimum forensic and counter-forensic strategies for source identification with training data.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

A universal technique to hide traces of histogram-based image manipulations.
Proceedings of the Multimedia and Security Workshop, 2012


  Loading...