Venue Date Description Slides
Adversarial Signal Processing Contact Forum Coding Theory and Cryptography Talks: VI, The Royal Flemish Academy of Belgium for Science and the Arts, Brussels, Belgium. Friday, October 2, 2015

The aim of this talk is to present the basic theory of adversarial signal processing, with motivating examples taken from the fields of watermarking, multimedia forensics, traffic analysis, intrusion detection, biometrics, cognitive radio, etc. We will focus on adversarial hypothesis testing, which is arguably the best understood topic. As a fundamental approach we will show how to use game theory to model the available strategies to both defender and adversary.

PDF icon Brussels_2015.pdf
Grissom in Awe: the CSI Effect and Media Forensics IEEE-EURASIP Summer School in Signal Processing, Cavalese-Italy Monday, September 5, 2016

We have all seen it on TV: by hectically typing on a computer keyboard, the CSI guys are able to enhance a low–quality image up to a point where the perpetrator’s face (including his moles and pimples) is clearly visible. Surely, it is an exaggeration, but it has already created a lot of trouble in court, as the jurors’ expectations from prosecutors have skyrocketed. This is called "The CSI Effect". Paradoxically, Grissom would be shocked to learn the latest advances in multimedia forensics, as there is often a level of analysis that brings about much more than meets his eye.

PDF icon Grissom_in_Awe_v3.pdf
Location privacy: Where do we stand and where are we going? Keynote Talk at First EAI International Conference on Security and Privacy in New Computing Environments, Guanzghou, China Thursday, December 15, 2016

Over time, users have become accustomed to sharing personal data when they install new apps in their smartphones. Declining to do so, normally aborts the installation process. Sadly, users have convinced themselves that the value of their data is much lower than that of the apps they install, “after all, they have nothing to hide”. And thus, in redefining their business models many companies have touted better services and applications which even come for free, in exchange for some loss of privacy.

PDF icon Location_Privacy_Keynote.pdf
Location Privacy: Threats and Opportunities (Tutorial) WIFS'18 (Hong Kong) Monday, December 10, 2018 PDF icon 2018_WIFS_LP_tutorial.pdf