Rudy Becarelli

According to our database1, Rudy Becarelli authored at least 16 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Adversarial image detection in deep neural networks.
Multim. Tools Appl., 2019

Detecting Adversarial Inputs by Looking in the Black Box.
ERCIM News, 2019

Exploiting CNN Layer Activations to Improve Adversarial Image Classification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Adversarial Examples Detection in Features Distance Spaces.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

2017
Image Origin Classification Based on Social Network Provenance.
IEEE Trans. Inf. Forensics Secur., 2017

Smartphone Fingerprinting Combining Features of On-Board Sensors.
IEEE Trans. Inf. Forensics Secur., 2017

Media trustworthiness verification and event assessment through an integrated framework: a case-study.
Multim. Tools Appl., 2017

Detecting adversarial example attacks to deep neural networks.
Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing, 2017

2016
Trustworthiness in social networks.
PhD thesis, 2016

2015
Acquisition source identification through a blind image classification.
IET Image Process., 2015

2014
Splicing forgeries localization through the use of first digit features.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

2010
A DVB-MHP web browser to pursue convergence between Digital Terrestrial Television and Internet.
Multim. Tools Appl., 2010

Electronic Voting by Means of Digital Terrestrial Television The Infrastructure, Security Issues and a Real Test-bed.
Int. J. E Adopt., 2010

Reversible Watermarking Techniques: An Overview and a Classification.
EURASIP J. Inf. Secur., 2010

2009
Integration between Digital Terrestrial Television and Internet by Means of a DVB-MHP Web Browser.
Proceedings of the WEBIST 2009, 2009

2005
Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005


  Loading...