TH
Publications
36
Views
15 948
Downloads
8 783
Supervised works
3
Items per page
1 - 36 of 36
Title Published in Access level OA Policy Year Views Downloads
Variational Information Bottleneck for Semi-Supervised ClassificationEntropy
accessLevelPublic
2020 230 109
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 203 191
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 190 173
Sparse ternary codes for similarity search have higher coding gain than dense binary codes
accessLevelPublic
2017 475 217
PharmaPack: mobile fine-grained recognition of pharma packages25th European Signal Processing Conference (EUSIPCO)
accessLevelPublic
2017 451 643
Physical object authentication: detection-theoretic comparison of natural and artificial randomnessIEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016
accessLevelRestricted
2016 170 1
Local active content fingerprint: solutions for general linear feature mapsInternational Conference on Pattern recognition, ICPR 2016
accessLevelPublic
2016 164 138
Local active content fingerprinting: Optimal solution under linear modulationIEEE International Conference on Image Processing, ICIP 2016
accessLevelPublic
2016 171 158
Forensic authentication of banknotes on mobile phonesIS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016
accessLevelPublic
2016 305 220
Fast content identification in high-dimensional feature spaces using Sparse Ternary CodesIEEE International Workshop on Information Forensics and Security, WIFS 2016
accessLevelRestricted
2016 176 0
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
accessLevelPublic
2015 521 280
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 461 1
Information-theoretic analysis of privacy-preserving identification
accessLevelPublic
2012 638 772
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 548 262
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 469 228
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft FingerprintingEighth International Conference on Computer Science and Information Technologies, CSIT 2011
accessLevelPublic
2011 399 96
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 530 237
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 493 84
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 476 271
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 542 252
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 453 217
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 506 212
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 475 228
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 563 892
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 560 308
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 490 291
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 541 390
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 533 220
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 496 232
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 466 179
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 526 166
Information-theoretic analysis of steganalysis in real imagesACM Multimedia and Security Workshop 2006
2006 494 0
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005)
accessLevelPublic
2005 753 501
Generalized radar/radiometry imaging problemsJournal of Telecommunications and Information Technology
accessLevelPublic
2001 529 194
Surface image formation based on sparse arrays with nonlinear signal processingIEEE Second International Conference "The detection of abandoned land mines"
accessLevelPublic
1998 519 218
Adaptive aperture formation matched with radiometry image spatial spectrumIEEE International Microwave and Radar Conference
accessLevelPublic
1998 432 202
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack