Sfoglia per Autore  Pasquini, Cecilia

Opzioni
Mostrati risultati da 1 a 14 di 14
Titolo Data di pubblicazione Autore(i) File
Towards the verification of image integrity in online news 1-gen-2015 Pasquini, C.; Brunetta, C.; Vinci, A. F.; Conotter, V.; Boato, G.
Information-theoretic bounds of resampling forensics: New evidence for traces beyond cyclostationarity 1-gen-2017 Pasquini, C.; Boehme, B.
Detecting Morphing Attacks through Face Geometry Features 1-gen-2020 Autherith, S.; Pasquini, C.
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition 1-gen-2020 Pasquini, C.; Boehme, R.
On the Difficulty of Hiding Keys in Neural Networks 1-gen-2020 Kupek, T.; Pasquini, C.; Boehme, R.
Detection of manipulated face videos over social networks: A large-scale study 1-gen-2021 Marcon, F.; Pasquini, C.; Boato, G.
Dynamic texture analysis for detecting fake faces in video sequences 1-gen-2021 Bonomi, M.; Pasquini, C.; Boato, G.
Media forensics on social media platforms: a survey 1-gen-2021 Pasquini, C.; Amerini, I.; Boato, G.
More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner] 1-gen-2022 Lago, F.; Pasquini, C.; Bohme, R.; Dumont, H.; Goffaux, V.; Boato, G.
Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos 1-gen-2022 Montibeller, A.; Pasquini, C.; Boato, G.; Dell'Anna, S.; Perez-Gonzalez, F.
TrueFace: a Dataset for the Detection of Synthetic Face Images from Social Networks 1-gen-2022 Boato, G.; Pasquini, C.; Stefani, A. L.; Verde, S.; Miorandi, D.
2023 Chairs' Welcome 1-gen-2023 Moreira, D.; Bharati, A.; Pasquini, C.; Yousfi, Y.
Identifying Synthetic Faces through GAN Inversion and Biometric Traits Analysis 1-gen-2023 Pasquini, C.; Laiti, F.; Lobba, D.; Ambrosi, G.; Boato, G.; De Natale, F.
Multi-clue reconstruction of sharing chains for social media images 1-gen-2023 Verde, S.; Pasquini, C.; Lago, F.; Goller, A.; De Natale, F.; Piva, A.; Boato, G.
Mostrati risultati da 1 a 14 di 14
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile