

{"id":216,"date":"2017-04-18T09:25:51","date_gmt":"2017-04-18T07:25:51","guid":{"rendered":"https:\/\/project.inria.fr\/wifs2017\/?page_id=216"},"modified":"2017-11-16T10:25:26","modified_gmt":"2017-11-16T09:25:26","slug":"program-highlights","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/wifs2017\/program\/program-highlights\/","title":{"rendered":"Program of the week"},"content":{"rendered":"<h3><strong>Monday 4th of December<\/strong><\/h3>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">9h &#8211; 10h:<\/span>Registration<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">10h &#8211; 13h:<\/span><strong>Tutorial<\/strong> (+ coffe break)\n<ul>\n<li>\u00a0<a href=\"https:\/\/project.inria.fr\/wifs2017\/tutorial-on-understanding-deep-neural-networks-and-their-predictions\/\">Methods for Understanding Deep Neural Networks and their Predictions<\/a>, Gr\u00e9goire Montavon (<em>TU Berlin, Germany<\/em>)<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">13h &#8211; 14h30:<\/span>Lunch<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">14h30-17h30:<\/span><strong>Tutorials<\/strong> (+ coffe break)\n<ul>\n<li><a href=\"https:\/\/project.inria.fr\/wifs2017\/program\/tutorials\/tutorial-on-biometric-spoofing-and-anti-spoofing-a-k-a-presentation-attack-detection\/\" target=\"_blank\" rel=\"noopener\">Biometric Spoofing and Anti-Spoofing aka Presentation Attack Detection<\/a>, S\u00e9bastien Marcel (<em>Idiap research institute, Switzerland<\/em>)<\/li>\n<li><a href=\"https:\/\/project.inria.fr\/wifs2017\/tutorial-on-security-and-privacy-in-machine-learning\/\">Security and Privacy in Machine Learning<\/a>, Nicolas Papernot (<em>Pennsylvania State University, USA<\/em>)<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">17h30 &#8211; 18h:<\/span>Registration<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">18h &#8211; 19h30:<\/span><strong>Social Event #1:<\/strong> Wine &amp; Cheese party<\/li>\n<\/ul>\n<h3><strong>Tuesday 5th of December<\/strong><\/h3>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">8h &#8211; 8h45:<\/span>Registration<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">8h45 &#8211; 9h:<\/span>Welcome<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">9h &#8211; 10h30:<\/span><strong>Session on Biometric Traits <\/strong>(chair: Karthik Nandakumar, <em>IBM<\/em>)\n<ul>\n<li><em>Towards Measuring Uniqueness of Human Voice,\u00a0<\/em>S. Tandgan, H. Sencar, B. Tavl\u0131<\/li>\n<li><em>Benchmarking Keystroke Authentication Algorithms,\u00a0<\/em>J. Huang, D. Hou, S. Schuckers, T. \u00a0Law, A. \u00a0Sherwin<\/li>\n<li><em>Sensitivity Analysis in Keystroke Dynamics using Convolutional Neural Networks,\u00a0<\/em>H. Ceker, S. Upadhyaya<\/li>\n<li><em>Enhanced Free-Text Keystroke Continuous Authentication based on Dynamics of Wrist Motion,\u00a0<\/em>B. Li, H. Sun, Y. Gao, V. Phoha, Z. Jin<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">10h30 &#8211; 11h:<\/span>Coffee break<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">11h &#8211; 12h30:<\/span><strong>Session on\u00a0Physical Layer Security\u00a0<\/strong>(chair: Prof. Slava Voloshynovskiy, <em>Univ. Geneva<\/em>)\n<ul>\n<li><em>Secure identification under jamming attacks<\/em>,\u00a0H. Boche, C. Deppe<\/li>\n<li><em>Extended Beamforming by Sum and Difference Composite Co-Array for Radio Surveillance<\/em>,\u00a0S. Iwazaki, K. Ichige<\/li>\n<li><em>Energy Obfuscation for Compressive Encryption and Processing,\u00a0<\/em>M. Testa, T. Bianchi, E. Magli<\/li>\n<li><em>Robust Secure Storage of Data Sources with Perfect Secrecy,\u00a0<\/em>S. Baur, H. Boche<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">12h30 &#8211; 14h:<\/span>Lunch<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">14h &#8211; 15h:<\/span><strong>Keynote<\/strong>\n<ul>\n<li>Denis Teyssou (AFP): <a href=\"https:\/\/project.inria.fr\/wifs2017\/program\/keynotes\/\"><em>A\u00a0state of the art in journalism about fake image and video detection<\/em><\/a><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">15h &#8211; 16h:<\/span><strong>Special Session on<\/strong>\u00a0<strong><a href=\"https:\/\/project.inria.fr\/wifs2017\/social-networks-and-user-generated-content-verification\/\">Social Networks and User-Generated Content Verification<\/a><\/strong><span style=\"font-family: 'Source Sans Pro';\">,<br \/>\n(chairs: Ewa Kijak<\/span><span style=\"font-family: 'Source Sans Pro';\">\u00a0and Vincent Claveau,<em> IRISA<\/em>)<\/span><\/p>\n<ul>\n<li><em>It\u2019s Always April Fools\u2019 Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features<\/em>,\u00a0M. Conti, D. Lain, R. Lazzeretti, G. Lovisotto, W. Quattrociocchi<\/li>\n<li><em>Tracing images back to their social network of origin: a CNN-based approach<\/em>,\u00a0I. Amerini, T. Uricchio, R. Caldelli<\/li>\n<li><em>Design of Projection Matrices for PRNU Compression<\/em>,\u00a0L. Bondi, F. Perez-Gonzalez, P. Bestagini, \u00a0S. Tubaro<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">16h &#8211; 16h30:<\/span>Coffee break<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">16h30 &#8211; 18h:<\/span><strong>Session on\u00a0Attacks on Machine Learning and other Forensics\u00a0<\/strong>(chair: Dr. Luisa Verdoliva,\u00a0<em>Univ. di Napoli<\/em>)\n<ul>\n<li><em>The Vulnerability of Learning to Adversarial Perturbation Increases with Intrinsic Dimensionality,\u00a0<\/em>L. Amsaleg, J. Bailey, D. Barbe, S. Erfani, M. E. Houle, V. Nguyen, M. Radovanovic<\/li>\n<li><em>A gradient-based pixel-domain attack against SVM detection of global image manipulations,\u00a0<\/em>B. Tondi, M. Barni, C. Zhipeng, X. Li, R. Ni, Y. Zhao<\/li>\n<li><em>Retrieving Dates in Smart Card Dumps is as Hard as Finding a Needle in a Haystack,\u00a0<\/em>T. Gougeon, G. Avoine, C. Rosenberger, M. Barbier, P. Lacharme<\/li>\n<li><em>Audio Phylogenetic Analysis using Geometric Transforms,<\/em>\u00a0S. Verde, S. Milani, P. Bestagini, S. Tubaro<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">19h &#8211; 20h:<\/span><strong>Social Event #2:<\/strong> Welcome party at the <em>Grand Salon de la Mairie de Rennes<\/em><\/li>\n<\/ul>\n<h3><strong>Wednesday 6th of December<\/strong><\/h3>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">9h15 &#8211; 10h30:<\/span><strong>Session on Biometric Systems <\/strong>(chair: Prof. Patrizio Campisi, <em>Univ. Roma Tre<\/em>)\n<ul>\n<li><em>Single Use Biometric Tokens for Non-repudiable Multi-party Transactions,\u00a0<\/em>K. Nandakumar, N. Ratha, S. Pankanti, S. Darnell<\/li>\n<li><em>Latent Fingerprint Segmentation Based on Convolutional Neural Networks,\u00a0<\/em>Y. Zhu, X. Yin, X. Jia, \u00a0J. Hu<\/li>\n<li><em>A two factor transformation for speaker verification through L1 comparison,\u00a0<\/em>A. Jimenez, B. Raj<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">10h30 &#8211; 11h:<\/span>Coffee break<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">11h &#8211; 14h:<\/span><a href=\"https:\/\/project.inria.fr\/wifs2017\/program\/demo-sessions\/\" target=\"_blank\" rel=\"noopener\"><strong>IEEE TIFS Articles, On-going Works and Demos session<\/strong><\/a>\u00a0(chair: Gwena\u00ebl Do\u00ebrr)<\/li>\n<li>+ finger food buffet<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">14h &#8211; 22h:<\/span><strong>Social Event #3:<\/strong>\n<ul>\n<li>Visite du <em>Mont Saint Michel<\/em><\/li>\n<li>Gala dinner<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><strong>Thursday 7th of December<\/strong><\/h3>\n<ul>\n<li><span style=\"width: 100px; display: inline-block;\">9h &#8211; 10h30:<\/span><strong>Session on Image Forensics <\/strong>(chair: Wei Fan,\u00a0<em>Dartmouth College<\/em>)\n<ul>\n<li><em>Photo Forensics from JPEG Dimples,\u00a0<\/em>S. Agarwal, H. Farid<\/li>\n<li><em>Object Insertion and Removal in Images with Mirror Reflection,\u00a0<\/em>Z. Sun, A. Hoogs<\/li>\n<li><em>Distinguishing Computer Graphics from Natural Images Using Convolution Neural Networks,\u00a0<\/em>N. Rahmouni, V. Nozick, J. Yamagishi, I. Echizen<\/li>\n<li><em>Image Carving with Missing Headers and Missing Fragments,\u00a0<\/em>E. Durmus, M. Mohanty, S. Taspinar<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">10h30 &#8211; 11h:<\/span>Coffee break<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">11h &#8211; 12h:<\/span><strong>Keynote<\/strong>:\n<ul>\n<li>Emmanuelle Anceaume (CNRS\/IRISA): <a href=\"https:\/\/project.inria.fr\/wifs2017\/program\/keynotes\/\">&#8220;<i>A primer on blockchain technology and the bitcoin cryptocurrency<\/i>&#8220;<\/a><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">12h &#8211; 13h30:<\/span>Lunch<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">13h30 &#8211; 15h:<\/span><strong>Special Session on\u00a0<a href=\"https:\/\/project.inria.fr\/wifs2017\/physical-object-identification-and-authentication\/\">Physical Object Identification and Authentication<\/a><\/strong><br \/>\n(chairs: Slava Voloshynovskiy, <em>Univ. Geneva<\/em>, and Boris Skoric, <em>TU Eindhoven<\/em>)<\/p>\n<ul>\n<li><em>On the feasibility of classification-based product package authentication<\/em>,\u00a0R. \u00a0Schraml, A. Uhl, C. Kauba, L. Debiasi<\/li>\n<li><em>Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals,\u00a0<\/em>G. Lenzini, S. Ouchani, P. Roenne, P. Ryan, Y. Geng, J. Lagerwall, J. Hyun Noh<\/li>\n<li><em>Privacy Preserving Identification Using Sparse Approximation with Ambiguization<\/em>,\u00a0B. Razeghi, S. Voloshynovskiy, D. Kostadinov, O. Taran<\/li>\n<li><em>Linking Received Packet to the Transmitted Through Physical-Fingerprinting of Controller Area Network,\u00a0<\/em>O. Avatefipour, A. \u00a0Hafeez, M. Tayyab, H. Malik<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">15h &#8211; 15h30:<\/span>Coffee break<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">15h30 &#8211; 17h:<\/span><strong>Session on Privacy Enhancing Technique <\/strong>(chair: Bin Li,\u00a0<em>Shenzhen University<\/em>)\n<ul>\n<li><em>An Approach for Gait Anonymization using Deep Learning,\u00a0<\/em>N.-D. Tieu, H. Nguyen, H.-Q. Nguyen-Son, J. Yamagishi, I. Echizen<\/li>\n<li><i>Minutia-pair spectral representations for fingerprint template protection, <\/i>T.\u00a0Stanko<i>,\u00a0<\/i>B. Skoric<\/li>\n<li><em>A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid,\u00a0<\/em>F. Knirsch, \u00a0D. Engel, Z. Erkin<\/li>\n<li><em>AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption,\u00a0<\/em>L. Helsloot, G. Tillem, Z. Erkin<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"width: 100px; display: inline-block;\">17h &#8211; &#8230;:<\/span>Kiss and fly<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Monday 4th of December 9h &#8211; 10h:Registration 10h &#8211; 13h:Tutorial (+ coffe break) \u00a0Methods for Understanding Deep Neural Networks and their Predictions, Gr\u00e9goire Montavon (TU Berlin, Germany) 13h &#8211; 14h30:Lunch 14h30-17h30:Tutorials (+ coffe break) Biometric Spoofing and Anti-Spoofing aka Presentation Attack Detection, S\u00e9bastien Marcel (Idiap research institute, Switzerland) Security and\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/wifs2017\/program\/program-highlights\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1161,"featured_media":0,"parent":522,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-216","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/users\/1161"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/comments?post=216"}],"version-history":[{"count":47,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/216\/revisions"}],"predecessor-version":[{"id":600,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/216\/revisions\/600"}],"up":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/522"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/media?parent=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}