

{"id":457,"date":"2017-09-19T09:43:10","date_gmt":"2017-09-19T07:43:10","guid":{"rendered":"https:\/\/project.inria.fr\/wifs2017\/?p=457"},"modified":"2017-10-03T15:45:10","modified_gmt":"2017-10-03T13:45:10","slug":"accepted-papers","status":"publish","type":"post","link":"https:\/\/project.inria.fr\/wifs2017\/accepted-papers\/","title":{"rendered":"Accepted papers"},"content":{"rendered":"<p>Thank you very much to the reviewers and the area chairs! Here is the list of accepted papers:<\/p>\n<ul>\n<li>#6, &#8220;Minutia-pair spectral representations for fingerprint template protection&#8221;,\u00a0<em>Boris Skoric, Technische Universiteit Eindhoven<\/em><\/li>\n<li>#8, &#8220;Retrieving Dates in Smart Card Dumps is as Hard as Finding a Needle in a Haystack&#8221;,\u00a0<em>Thomas Gougeon, ENSICAEN; Gildas Avoine, INSA Rennes; Christophe Rosenberger, ENSICAEN; Morgan Barbier, ENSICAEN; Patrick Lacharme, ENSICAEN<\/em><\/li>\n<li>#10, &#8220;Photo Forensics from JPEG Dimples&#8221;,\u00a0<em>Shruti Agarwal, Dartmouth College; Hany Farid, Dartmouth College<\/em><\/li>\n<li>#12, &#8220;Object Insertion and Removal in Images with Mirror Reflection&#8221;, \u00a0<em>Zhaohui Sun, Kitware Inc; Anthony Hoogs, Kitware<\/em><\/li>\n<li>#13, &#8220;A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid&#8221;, <em>Fabian Knirsch, Salzburg University of Applied Sciences; Dominik Engel, Salzburg University of Applied Sciences; Zekeriya Erkin, TU Delft<\/em><\/li>\n<li>#18, &#8220;Distinguishing Computer Graphics from Natural Images Using Convolution Neural Networks&#8221;, <em>Nicolas Rahmouni, Ecole polytechnique; Vincent Nozick, JFLI; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics<\/em><\/li>\n<li>#20, &#8220;Secure identification under jamming attacks&#8221;, <em>Holger Boche, Technische Universit\u00e4t M\u00fcnchen; Christian Deppe, Universit\u00e4t Bielefeld<\/em><\/li>\n<li>#28, &#8220;Energy Obfuscation for Compressive Encryption and Processing&#8221;, <em>Matteo Testa, Politecnico di Torino; Tiziano Bianchi, Politecnico di Torino; Enrico Magli, POLITO<\/em><\/li>\n<li># 39 &#8220;Audio Phylogenetic Analysis using Geometric Transforms&#8221;, <em>Sebastiano Verde, University of Padova; Simone Milani, University of Padova; Paolo Bestagini, Politecnico di Milano; Stefano Tubaro, Politecnico di Milano, Italy<\/em><\/li>\n<li>#42, &#8220;The Vulnerability of Learning to Adversarial Perturbation Increases with Intrinsic Dimensionality&#8221;, <em>Laurent Amsaleg, CNRS-IRISA; James Bailey, THE UNIVERSITY OF MELBOURNE; Dominique Barbe, ENS Rennes; Sarah Erfani, U. Melbourne; Michael E. Houle, NII; Vinh Nguyen, Monash University; Milos Radovanovic, U. Novi Sad<\/em><\/li>\n<li>#45, &#8220;Design of Projection Matrices for PRNU Compression&#8221;, <em>Luca Bondi, Politecnico di Milano; Fernando Perez-Gonzalez, Universidad de Vigo; Paolo Bestagini, Politecnico di Milano; Stefano Tubaro, Politecnico di Milano, Italy<\/em><\/li>\n<li>#46, &#8220;It\u2019s Always April Fools\u2019 Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features&#8221;, <em>Mauro Conti, University of Padua; Daniele \u00a0Lain, University of Padua; Riccardo Lazzeretti, University of Padua; Giulio Lovisotto, University of Oxford; Walter Quattrociocchi, IMT School for Advanced Studies Lucca<\/em><\/li>\n<li>#50, &#8220;Single Use Biometric Tokens for Non-repudiable Multi-party Transactions&#8221;, <em>Karthik Nandakumar, \u00a0IBM Research, Singapore; Nalini Ratha, IBM; sharath pankanti, ibm; Shelby Darnell, IBM<\/em><\/li>\n<li>#54, &#8220;Latent Fingerprint Segmentation Based on Convolutional Neural Networks&#8221;, <em>Yanming Zhu, University of New South Wales; Xuefei Yin, University of New South Wales; Xiuping Jia, The University of New South Wales, Australia; Jiankun Hu, University of New South Wales<\/em><\/li>\n<li>#60, &#8220;An Approach for Gait Anonymization using Deep Learning&#8221;, <em>Ngoc-Dung Tieu, The Graduate University for Advanced Studies; Huy Nguyen, SOKENDAI; Hoang-Quoc Nguyen-Son, National Institute of Informatics; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics<\/em><\/li>\n<li>#61, &#8220;Extended Beamforming by Sum and Difference Composite Co-Array for Radio Surveillance&#8221;, <em>Sho Iwazaki, Yokohama National University; Koichi Ichige, Yokohama National University<\/em><\/li>\n<li>#71, &#8220;On the feasibility of classification-based product package authentication&#8221;, <em>Rudi \u00a0Schraml, University of Salzburg; Andreas Uhl, University of Salzburg; Christof Kauba, University of Salzburg; Luca Debiasi, University of Salzburg<\/em><\/li>\n<li>#74, &#8220;Tracing images back to their social network of origin: a CNN-based approach&#8221;, <em>Irene Amerini, Media Integration and Communication Center, University of Florence; Tiberio Uricchio, University of Florence; Roberto Caldelli, CNIT, National Interuniversity Consortium for Telecommunications<\/em><\/li>\n<li>#78, &#8220;A two factor transformation for speaker verification through l1 comparison&#8221;, <em>Abelino Jimenez, Carnegie Mellon Univerisity; Bhiksha Raj, Carnegie Mellon University<\/em><\/li>\n<li>#79, &#8220;AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption&#8221;, <em>Leon Helsloot, Delft University of Technology; Gamze Tillem, Delft University of Technology; Zekeriya Erkin, TU Delft<\/em><\/li>\n<li>#82, &#8220;Privacy Preserving Identification Using Sparse Approximation with Ambiguization&#8221;, <em><em>Behrooz Razeghi<\/em><\/em>, S. Voloshynovskiy, D. Kostadinov, O. Taran,\u00a0<em>University of Geneva<\/em><\/li>\n<li>#85, &#8220;Image Carving with Missing Headers and Missing Fragments&#8221;, <em>Emre \u00a0Durmus, New York University; Manoranjan Mohanty, New York University Abu Dhabi; Samet Taspinar, New York University Abu Dhabi; Erkam \u00a0Uzun, Georgia Institute of Technology; Nasir Memon, New York University<\/em><\/li>\n<li>#86, &#8220;Towards Measuring Uniqueness of Human Voice&#8221;, <em>Sinan Tandgan, TOBB ETU; H\u00fcsrev Sencar, TOBB ETU; B\u00fclent Tavl\u0131, TOBB Ekonomi ve Teknololoji \u00dcniversitesi<\/em><\/li>\n<li>#91, &#8220;Sensitivity Analysis in Keystroke Dynamics using Convolutional Neural Networks&#8221;, <em>Hayreddin Ceker, University at Buffalo; Shambhu Upadhyaya, University at Buffalo<\/em><\/li>\n<li>#92, &#8220;A gradient-based pixel-domain attack against SVM detection of global image manipulations&#8221;, <em>Benedetta Tondi, University of Siena; Mauro Barni, University of Siena; Chen Zhipeng, Beijing University; Xiaolong Li, Beijing Jiaotong University, Institute of Information Science; rongrong ni, BJTU; Yao Zhao, Beijing Jiaotong University<\/em><\/li>\n<li>#93, &#8220;Robust Secure Storage of Data Sources with Perfect Secrecy&#8221;, <em>Sebastian Baur, Technische Universit\u00e4t M\u00fcnchen; Holger Boche, Technische Universit\u00e4t M\u00fcnchen<\/em><\/li>\n<li>#94, &#8220;Benchmarking Keystroke Authentication Algorithms&#8221;, <em>Jiaju Huang, Clarkson University; Daqing Hou, Clarkson University; Stephanie Schuckers, Clarkson University; Timothy \u00a0Law , Clarkson University; Adam \u00a0Sherwin , Clarkson University<\/em><\/li>\n<li>#102, &#8220;Enhanced Free-Text Keystroke Continuous Authentication based on Dynamics of Wrist Motion&#8221;, <em>Borui Li, Binghamton University, SUNY; Han Sun, Binghamton University, SUNY; Yang Gao, Binghamton University, SUNY; Vir Phoha, Syracuse, NY USA; Zhanpeng Jin, ECE Apartment of SUNY at Binghamton<\/em><\/li>\n<li>#108, &#8220;Linking Received Packet to the Transmitted Through Physical-Fingerprinting of Controller Area Network&#8221;, <em>Omid Avatefipour, University of Michigan &#8211; Dearborn; Azeem \u00a0Hafeez , University of Michigan &#8211; Dearborn; Muhammad Tayyab, University of Michigan &#8211; Dearborn; Hafiz Malik, University of Michigan &#8211; Dearborn<\/em><\/li>\n<li>#109, &#8220;Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals&#8221; <em>Gabriele Lenzini, University of Luxembourg; Samir Ouchani, n.a.; Peter Roenne, University of Luxembourg; Peter Ryan, Universit\u00e9 du Luxembourg, Luxembourg; Yong Geng, University of Luxembourg; Jan Lagerwall, University of Luxembourg; Jung HYUN NOH, University of Luxembourg<\/em><\/li>\n<\/ul>\n<p>I will soon build up the program of the conference based on this list.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thank you very much to the reviewers and the area chairs! Here is the list of accepted papers: #6, &#8220;Minutia-pair spectral representations for fingerprint template protection&#8221;,\u00a0Boris Skoric, Technische Universiteit Eindhoven #8, &#8220;Retrieving Dates in Smart Card Dumps is as Hard as Finding a Needle in a Haystack&#8221;,\u00a0Thomas Gougeon, ENSICAEN; Gildas\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/wifs2017\/accepted-papers\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1161,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-457","post","type-post","status-publish","format-standard","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/posts\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/users\/1161"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":10,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/posts\/457\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/posts\/457\/revisions\/535"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/media?parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/categories?post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/tags?post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}