Loading…
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
Wei, Kang, Li, Jun, Ding, Ming, Ma, Chuan, Yang, Howard H., Farokhi, Farhad, Jin, Shi, Quek, Tony Q. S., Vincent Poor, H.
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
Loading…
Deep Residual Network for Steganalysis of Digital Images
Boroumand, Mehdi, Mo Chen, Fridrich, Jessica
Published in IEEE transactions on information forensics and security (01.05.2019)
Published in IEEE transactions on information forensics and security (01.05.2019)
Get full text
Journal Article
Loading…
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong, Aono, Yoshinori, Hayashi, Takuya, Lihua Wang, Moriai, Shiho
Published in IEEE transactions on information forensics and security (01.05.2018)
Published in IEEE transactions on information forensics and security (01.05.2018)
Get full text
Journal Article
Loading…
A Light CNN for Deep Face Representation With Noisy Labels
Wu, Xiang, He, Ran, Sun, Zhenan, Tan, Tieniu
Published in IEEE transactions on information forensics and security (01.11.2018)
Published in IEEE transactions on information forensics and security (01.11.2018)
Get full text
Journal Article
Loading…
VerifyNet: Secure and Verifiable Federated Learning
Xu, Guowen, Li, Hongwei, Liu, Sen, Yang, Kan, Lin, Xiaodong
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
Loading…
Noiseprint: A CNN-Based Camera Model Fingerprint
Cozzolino, Davide, Verdoliva, Luisa
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
Loading…
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection
Wang, Huanting, Ye, Guixin, Tang, Zhanyong, Tan, Shin Hwei, Huang, Songfang, Fang, Dingyi, Feng, Yansong, Bian, Lizhong, Wang, Zheng
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Deep Learning Hierarchical Representations for Image Steganalysis
Ye, Jian, Ni, Jiangqun, Yi, Yang
Published in IEEE transactions on information forensics and security (01.11.2017)
Published in IEEE transactions on information forensics and security (01.11.2017)
Get full text
Journal Article
Loading…
AnomalyNet: An Anomaly Detection Network for Video Surveillance
Zhou, Joey Tianyi, Du, Jiawei, Zhu, Hongyuan, Peng, Xi, Liu, Yong, Goh, Rick Siow Mong
Published in IEEE transactions on information forensics and security (01.10.2019)
Published in IEEE transactions on information forensics and security (01.10.2019)
Get full text
Journal Article
Loading…
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
TaeGuen Kim, BooJoong Kang, Mina Rho, Sezer, Sakir, Im, Eul Gyu
Published in IEEE transactions on information forensics and security (01.03.2019)
Published in IEEE transactions on information forensics and security (01.03.2019)
Get full text
Journal Article
Loading…
Loading…
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake
Yang, Wenyuan, Zhou, Xiaoyu, Chen, Zhikai, Guo, Bofei, Ba, Zhongjie, Xia, Zhihua, Cao, Xiaochun, Ren, Kui
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Loading…
Loading…