ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1811.01629
  4. Cited By
On the Transferability of Adversarial Examples Against CNN-Based Image
  Forensics

On the Transferability of Adversarial Examples Against CNN-Based Image Forensics

5 November 2018
Mauro Barni
Kassem Kallas
Ehsan Nowroozi
B. Tondi
    AAML
ArXiv (abs)PDFHTML

Papers citing "On the Transferability of Adversarial Examples Against CNN-Based Image Forensics"

21 / 21 papers shown
Frequency Bias Matters: Diving into Robust and Generalized Deep Image Forgery Detection
Frequency Bias Matters: Diving into Robust and Generalized Deep Image Forgery DetectionIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025
Chi Liu
Tianqing Zhu
Wanlei Zhou
Wei Zhao
AAML
135
0
0
25 Nov 2025
Deepfake Media Forensics: State of the Art and Challenges Ahead
Deepfake Media Forensics: State of the Art and Challenges AheadInternational Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2024
Irene Amerini
Mauro Barni
Sebastiano Battiato
Paolo Bestagini
Giulia Boato
...
Davide Salvi
Stefano Tubaro
Claudia Melis Tonti
Massimo Villari
D. Vitulano
AAML
371
15
0
01 Aug 2024
Transferable Adversarial Attack on Image Tampering Localization
Transferable Adversarial Attack on Image Tampering LocalizationJournal of Visual Communication and Image Representation (JVCIR), 2023
Yuqi Wang
Gang Cao
Zijie Lou
Haochen Zhu
AAML
226
6
0
19 Sep 2023
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of
  Printed Documents
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Ehsan Nowroozi
Yoosef Habibi
Mauro Conti
CVBM
214
3
0
06 Apr 2023
How to choose your best allies for a transferable attack?
How to choose your best allies for a transferable attack?IEEE International Conference on Computer Vision (ICCV), 2023
Thibault Maho
Seyed-Mohsen Moosavi-Dezfooli
Teddy Furon
AAML
288
1
0
05 Apr 2023
Attacking Image Splicing Detection and Localization Algorithms Using
  Synthetic Traces
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic TracesIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Shengbang Fang
Matthew C. Stamm
AAML
236
8
0
22 Nov 2022
Resisting Deep Learning Models Against Adversarial Attack
  Transferability via Feature Randomization
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature RandomizationIEEE Transactions on Services Computing (IEEE TSC), 2022
Ehsan Nowroozi
Mohammadreza Mohammadi
Pargol Golmohammadi
Yassine Mekdad
Mauro Conti
Selcuk Uluagac
AAMLSILM
191
21
0
11 Sep 2022
Making DeepFakes more spurious: evading deep face forgery detection via
  trace removal attack
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attackIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Chi Liu
Huajie Chen
Tianqing Zhu
Jun Zhang
Wanlei Zhou
AAML
146
38
0
22 Mar 2022
Demystifying the Transferability of Adversarial Attacks in Computer
  Networks
Demystifying the Transferability of Adversarial Attacks in Computer NetworksIEEE Transactions on Network and Service Management (TNSM), 2021
Ehsan Nowroozi
Yassine Mekdad
Mohammad Hajian Berenjestanaki
Mauro Conti
Abdeslam El Fergougui
AAML
384
39
0
09 Oct 2021
Making Generated Images Hard To Spot: A Transferable Attack On Synthetic
  Image Detectors
Making Generated Images Hard To Spot: A Transferable Attack On Synthetic Image Detectors
Xinwei Zhao
Matthew C. Stamm
AAML
266
6
0
25 Apr 2021
The Effect of Class Definitions on the Transferability of Adversarial
  Attacks Against Forensic CNNs
The Effect of Class Definitions on the Transferability of Adversarial Attacks Against Forensic CNNsMedia Watermarking, Security, and Forensics (MWSF), 2020
Xinwei Zhao
Matthew C. Stamm
AAML
91
5
0
26 Jan 2021
A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative
  Adversarial Network
A Transferable Anti-Forensic Attack on Forensic CNNs Using A Generative Adversarial Network
Xinwei Zhao
Chen Chen
Matthew C. Stamm
GANAAML
135
4
0
23 Jan 2021
Perception Matters: Exploring Imperceptible and Transferable
  Anti-forensics for GAN-generated Fake Face Imagery Detection
Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery DetectionPattern Recognition Letters (Pattern Recognit. Lett.), 2020
Yongwei Wang
Xin Ding
Li Ding
Rabab Ward
Z. J. Wang
AAML
129
27
0
29 Oct 2020
A Survey of Machine Learning Techniques in Adversarial Image Forensics
A Survey of Machine Learning Techniques in Adversarial Image ForensicsComputers & security (CS), 2020
Ehsan Nowroozi
Ali Dehghantanha
R. Parizi
K. Choo
AAML
154
80
0
19 Oct 2020
Adversarial Attacks for Multi-view Deep Models
Adversarial Attacks for Multi-view Deep Models
Xuli Sun
Shiliang Sun
AAML
103
0
0
19 Jun 2020
Increased-confidence adversarial examples for deep learning
  counter-forensics
Increased-confidence adversarial examples for deep learning counter-forensics
Wenjie Li
B. Tondi
R. Ni
Mauro Barni
AAML
178
2
0
12 May 2020
Printing and Scanning Attack for Image Counter Forensics
Printing and Scanning Attack for Image Counter Forensics
Hailey James
O. Gupta
D. Raviv
AAML
119
4
0
27 Apr 2020
Adversarial Attack on Deep Learning-Based Splice Localization
Adversarial Attack on Deep Learning-Based Splice Localization
Andras Rozsa
Zheng Zhong
Terrance E. Boult
AAML
157
7
0
17 Apr 2020
Media Forensics and DeepFakes: an overview
Media Forensics and DeepFakes: an overviewIEEE Journal on Selected Topics in Signal Processing (JSTSP), 2020
L. Verdoliva
386
679
0
18 Jan 2020
SpoC: Spoofing Camera Fingerprints
SpoC: Spoofing Camera Fingerprints
D. Cozzolino
Justus Thies
Andreas Rossler
Matthias Nießner
L. Verdoliva
304
41
0
27 Nov 2019
Effectiveness of random deep feature selection for securing image
  manipulation detectors against adversarial examples
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examplesIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2019
Mauro Barni
Ehsan Nowroozi
B. Tondi
Bowen Zhang
AAML
194
17
0
25 Oct 2019
1
Page 1 of 1