no code implementations • 6 Dec 2022 • Kassem Kallas, Teddy Furon
It is crucial to protect the intellectual property rights of DNN models prior to their deployment.
no code implementations • 22 Jun 2022 • Kassem Kallas, Teddy Furon
Protecting the Intellectual Property rights of DNN models is of primary importance prior to their deployment.
no code implementations • 25 Jul 2020 • Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi
Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images.
1 code implementation • 12 Feb 2019 • Mauro Barni, Kassem Kallas, Benedetta Tondi
In this paper we present a new backdoor attack without label poisoning Since the attack works by corrupting only samples of the target class, it has the additional advantage that it does not need to identify beforehand the class of the samples to be attacked at test time.
1 code implementation • 5 Nov 2018 • Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi
In this paper, we investigate if attack transferability also holds in image forensics applications.
Cryptography and Security