Export 9 results:
Author [ Title] Type Year Filters: Keyword is adversarial signal processing [Clear All Filters]
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, “Attack detectors for data aggregation in clustered sensor networks”, in European Signal Processing Conf. (EUSIPCO), Nice, France, 2015, pp. 2098-2102. attack_detection.pdf (353.81 KB)
, “An attack on antenna subset modulation for millimeter-wave communication”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brisbane, Australia, 2015, pp. 2914-2918.
, “Design of data-injection adversarial attacks against spatial field detectors”, in IEEE Workshop on Statistical Signal Processing (SSP), Palma de Mallorca, Spain, 2016. AttackDesignWSNv2.pdf (304.21 KB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Detecting Misreporting Attacks to the Proportional Fair Scheduler”, in IEEE Workshop on Information Forensics and Security (WIFS), Atlanta, USA, 2014. GlobalSIP_2014.pdf (326.68 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017. TPP17_ICASSP17.pdf (403.53 KB)
,