TH
Publications
36
Views
16,413
Downloads
9,257
Supervised works
3
Items per page
1 - 36 of 36
Title Published in Access level OA Policy Year Views Downloads
Variational Information Bottleneck for Semi-Supervised ClassificationEntropy
accessLevelPublic
2020 240 118
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 226 222
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 200 199
Sparse ternary codes for similarity search have higher coding gain than dense binary codes
accessLevelPublic
2017 492 231
PharmaPack: mobile fine-grained recognition of pharma packages25th European Signal Processing Conference (EUSIPCO)
accessLevelPublic
2017 468 654
Physical object authentication: detection-theoretic comparison of natural and artificial randomnessIEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016
accessLevelRestricted
2016 181 1
Local active content fingerprint: solutions for general linear feature mapsInternational Conference on Pattern recognition, ICPR 2016
accessLevelPublic
2016 174 154
Local active content fingerprinting: Optimal solution under linear modulationIEEE International Conference on Image Processing, ICIP 2016
accessLevelPublic
2016 179 178
Forensic authentication of banknotes on mobile phonesIS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016
accessLevelPublic
2016 335 248
Fast content identification in high-dimensional feature spaces using Sparse Ternary CodesIEEE International Workshop on Information Forensics and Security, WIFS 2016
accessLevelRestricted
2016 186 0
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
accessLevelPublic
2015 528 299
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 469 1
Information-theoretic analysis of privacy-preserving identification
accessLevelPublic
2012 656 782
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 563 276
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 473 240
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft FingerprintingEighth International Conference on Computer Science and Information Technologies, CSIT 2011
accessLevelPublic
2011 406 100
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 544 256
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 504 93
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 488 281
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 553 264
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 464 231
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 516 224
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 488 242
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 574 914
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 574 349
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 504 299
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 553 394
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 545 233
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 510 239
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 487 186
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 551 184
Information-theoretic analysis of steganalysis in real imagesACM Multimedia and Security Workshop 2006
2006 512 0
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005)
accessLevelPublic
2005 773 516
Generalized radar/radiometry imaging problemsJournal of Telecommunications and Information Technology
accessLevelPublic
2001 537 208
Surface image formation based on sparse arrays with nonlinear signal processingIEEE Second International Conference "The detection of abandoned land mines"
accessLevelPublic
1998 522 231
Adaptive aperture formation matched with radiometry image spatial spectrumIEEE International Microwave and Radar Conference
accessLevelPublic
1998 438 210
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack