IFS-P3: Multimedia Forensics and Cybersecurity
Tue, 16 Apr, 16:30 - 18:30 (UTC +9)
Location: Poster Zone 6A
Session Type: Poster
Session Chair: William Puech, Université Montpellier
Track: Information Forensics and Security
Click the to view the manuscript on IEEE Xplore Open Preview
 

IFS-P3.1: Towards Generic Deepfake Detection with Dynamic Curriculum

Wentang Song, Yuzhen Lin, Bin Li, Shenzhen University, China
 

IFS-P3.2: A One-Class Approach to Detect Super-Resolution Satellite Imagery with Spectral Features

Edoardo Daniele Cannas, Politecnico di Milano, Italy; Pablo Beaus, Universitat Politècnica de Catalunya, Spain; Paolo Bestagini, Politecnico di Milano, Italy; Ferran Marques, Universitat Politècnica de Catalunya, Spain; Stefano Tubaro, Politecnico di Milano, Italy
 

IFS-P3.3: A codec-based approach for video life-cycle characterization in social networks

Giulia Bertazzini, Daniele Baracchi, Dasara Shullani, Massimo Iuliani, Alessandro Piva, University of Florence, Italy
 

IFS-P3.4: AUDIO TRANSFORMER FOR SYNTHETIC SPEECH DETECTION VIA FORMANT MAGNITUDE AND PHASE ANALYSIS

Luca Cuccovillo, Milica Gerhardt, Patrick Aichroth, Fraunhofer Institute for Digital Media Technology IDMT, Germany
 

IFS-P3.5: INNOVATIVE METHODS FOR NON-DESTRUCTIVE INSPECTION OF HANDWRITTEN DOCUMENTS

Eleonora Breci, Luca Guarnera, Sebastiano Battiato, University of Catania, Italy
 

IFS-P3.6: EFFECTIVE IMAGE TAMPERING LOCALIZATION VIA ENHANCED TRANSFORMER AND CO-ATTENTION FUSION

Kun Guo, Haochen Zhu, Gang Cao, Communication University of China, China
 

IFS-P3.7: CROSS-MODALITY AND WITHIN-MODALITY REGULARIZATION FOR AUDIO-VISUAL DEEPFAKE DETECTION

Heqing Zou, Meng Shen, Yuchen Hu, Chen Chen, Eng Siong Chng, Deepu Rajan, Nanyang Technological University, Singapore
 

IFS-P3.8: DATA-FREE WATERMARK FOR DEEP NEURAL NETWORKS BY TRUNCATED ADVERSARIAL DISTILLATION

Chao-Bo Yan, Fang-Qi Li, Shi-Lin Wang, Shanghai Jiao Tong University, China
 

IFS-P3.9: FUR-API: DATASET AND BASELINES TOWARD REALISTIC API ANOMALY DETECTION

Yijun Liu, Honglan Yu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China; Key Lab of Cyberspace Security Defense, Beijing, China, China; Feifei Dai, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; Key Lab of Cyberspace Security Defense, Beijing, China, China; Xiaoyan Gu, Chenxu Cui, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China; Key Lab of Cyberspace Security Defense, Beijing, China, China; Bo Li, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; Key Lab of Cyberspace Security Defense, Beijing, China, China; Weiping Wang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China
 

IFS-P3.10: CONTROLLABLE SEMANTIC LINGUISTIC STEGANOGRAPHY VIA SUMMARIZATION GENERATION

Ruifan Zhang, Jianyi Liu, Ru Zhang, Beijing University of Posts and Telecommunications, China
 

IFS-P3.11: Security Equivalence Assessment Between Cloud Standards by Mapping of Control Items

Yuchen Wong, Chen Yan, Shengfang Zhai, Cong Li, Qingni Shen, Peking University, China
 

IFS-P3.12: HYSENSE: HYBRID EVENT OCCURRENCE DETECTION METHOD FOR IOT DEVICES

Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He, Institute of Software, Chinese Academy of Sciences, China