Irene Amerini

Orcid: 0000-0002-6461-1391

Affiliations:
  • Sapienza University of Rome, Department of Computer, Control, and Management Engineering , Italy


According to our database1, Irene Amerini authored at least 72 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust COVID-19 Detection in CT Images with CLIP.
CoRR, 2024

METER: a mobile vision transformer architecture for monocular depth estimation.
CoRR, 2024

D4D: An RGBD diffusion model to boost monocular depth estimation.
CoRR, 2024

Lightweight 3-D Convolutional Occupancy Networks for Virtual Object Reconstruction.
IEEE Computer Graphics and Applications, 2024

2023
A deep-learning-based antifraud system for car-insurance claims.
Expert Syst. Appl., November, 2023

METER: A Mobile Vision Transformer Architecture for Monocular Depth Estimation.
IEEE Trans. Circuits Syst. Video Technol., October, 2023

Convolutional neural networks combined with feature selection for radio-frequency fingerprinting.
Comput. Intell., October, 2023

Lightweight and Energy-Aware Monocular Depth Estimation Models for IoT Embedded Devices: Challenges and Performances in Terrestrial and Underwater Scenarios.
Sensors, February, 2023

Media Forensics and the Challenge of Big Data (Dagstuhl Seminar 23021).
Dagstuhl Reports, January, 2023

Adversarial Data Poisoning for Fake News Detection: How to Make a Model Misclassify a Target News without Modifying It.
CoRR, 2023

Diffusion Models for Earth Observation Use-cases: from cloud removal to urban change detection.
CoRR, 2023

A survey on efficient vision transformers: algorithms, techniques, and performance benchmarking.
CoRR, 2023

Why Don't You Speak?: A Smartphone Application to Engage Museum Visitors Through Deepfakes Creation.
Proceedings of the 5th Workshop on analySis, 2023

On the use of Stable Diffusion for creating realistic faces: from generation to detection.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Deepfakes Audio Detection Leveraging Audio Spectrogram and Convolutional Neural Networks.
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023

Optimize Vision Transformer Architecture via Efficient Attention Modules: A Study on the Monocular Depth Estimation Task.
Proceedings of the Image Analysis and Processing - ICIAP 2023 Workshops, 2023

BHAC-MRI: Backdoor and Hybrid Attacks on MRI Brain Tumor Classification Using CNN.
Proceedings of the Image Analysis and Processing - ICIAP 2023, 2023

An Automated Ground-to-Aerial Viewpoint Localization for Content Verification.
Proceedings of the 24th International Conference on Digital Signal Processing, 2023

2022
Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension.
Comput. Networks, 2022

SPEED: Separable Pyramidal Pooling EncodEr-Decoder for Real-Time Monocular Depth Estimation on Low-Resource Settings.
IEEE Access, 2022

Microphone Identification based on Spectral Entropy with Convolutional Neural Network.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart.
Proceedings of the International Joint Conference on Neural Networks, 2022

DepthFake: A Depth-Based Strategy for Detecting Deepfake Videos.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

Image Watermarking Backdoor Attacks in CNN-Based Classification Tasks.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

2021
Optical Flow based CNN for detection of unlearnt deepfake manipulations.
Pattern Recognit. Lett., 2021

Identification of Social-Media Platform of Videos through the Use of Shared Features.
J. Imaging, 2021

Image and Video Forensics.
J. Imaging, 2021

Deep Learning for Multimedia Forensics.
Found. Trends Comput. Graph. Vis., 2021

Media forensics on social media platforms: a survey.
EURASIP J. Inf. Secur., 2021

Introduction to the special section on image processing in security applications (VSI-ipsa).
Comput. Electr. Eng., 2021

Learning Double-Compression Video Fingerprints Left From Social-Media Platforms.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
An Evaluation of Entropy Measures for Microphone Identification.
Entropy, 2020

IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference.
IEEE Access, 2020

Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Special issue on Deep Learning in Image and Video Forensics.
Signal Process. Image Commun., 2019

Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network.
IEEE Access, 2019

Social Network Identification Through Image Classification With CNN.
IEEE Access, 2019

Deepfake Video Detection through Optical Flow Based CNN.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Tracking Multiple Image Sharing on Social Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

WiCV 2019: The Sixth Women In Computer Vision Workshop.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

2018
PRNU-based Image Classification of Origin Social Network with CNN.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Image Origin Classification Based on Social Network Provenance.
IEEE Trans. Inf. Forensics Secur., 2017

Smartphone Fingerprinting Combining Features of On-Board Sensors.
IEEE Trans. Inf. Forensics Secur., 2017

Dealing with video source identification in social networks.
Signal Process. Image Commun., 2017

Media trustworthiness verification and event assessment through an integrated framework: a case-study.
Multim. Tools Appl., 2017

Tracing images back to their social network of origin: A CNN-based approach.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication.
Proceedings of the Media Watermarking, 2016

2015
Acquisition source identification through a blind image classification.
IET Image Process., 2015

SIFT match removal and keypoint preservation through dominant orientation shift.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Forensic Analysis of SIFT Keypoint Removal and Injection.
IEEE Trans. Inf. Forensics Secur., 2014

Blind image clustering based on the Normalized Cuts criterion for camera identification.
Signal Process. Image Commun., 2014

Splicing forgeries localization through the use of first digit features.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Copy-move forgery detection from printed images.
Proceedings of the Media Watermarking, 2014

Exploiting perceptual quality issues in countering SIFT-based Forensic methods.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Copy-move forgery detection and localization by means of robust clustering with J-Linkage.
Signal Process. Image Commun., 2013

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification.
EURASIP J. Image Video Process., 2013

Removal and injection of keypoints for SIFT-based copy-move counter-forensics.
EURASIP J. Inf. Secur., 2013

SIFT keypoint removal and injection for countering matching-based image forensics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
On the effectiveness of local warping against SIFT-based copy-move detection.
Proceedings of the 5th International Symposium on Communications, 2012

2011
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery.
IEEE Trans. Inf. Forensics Secur., 2011

An analysis on attacker actions in fingerprint-copy attack in source camera identification.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet.
Multim. Tools Appl., 2010

A DFT-Based Analysis to Discern Between Camera and Scanned Images.
Int. J. Digit. Crime Forensics, 2010

Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification.
Int. J. Digit. Crime Forensics, 2010

Fast image clustering of unknown source images.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Geometric tampering estimation by means of a SIFT-based forensic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser.
Proceedings of the WEBIST 2009, 2009

Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.
Proceedings of the Forensics in Telecommunications, 2009


  Loading...