Detection games with a fully active attacker
暂无分享,去创建一个
[1] K. J. Ray Liu,et al. Forensics vs. anti-forensics: A decision and game theoretic framework , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[2] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[3] Neri Merhav,et al. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources , 2008, IEEE Transactions on Information Theory.
[4] M. Melamed. Detection , 2021, SETI: Astronomy as a Contact Sport.
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[7] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[8] Ngo Van Long,et al. Iterated Strict Dominance in General Games , 2007, Games Econ. Behav..
[9] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[10] Imre Csisźar,et al. The Method of Types , 1998, IEEE Trans. Inf. Theory.
[11] O. F. Cook. The Method of Types , 1898 .
[12] Mauro Barni,et al. Binary Hypothesis Testing Game With Training Data , 2013, IEEE Transactions on Information Theory.
[13] Mauro Barni,et al. The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.
[14] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[15] Fernando Pérez-González,et al. Coping with the enemy: Advances in adversary-aware signal processing , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[17] B. Bernheim. Rationalizable Strategic Behavior , 1984 .
[18] Mauro Barni,et al. Source distinguishability under corrupted training , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[19] W. Hoeffding. Asymptotically Optimal Tests for Multinomial Distributions , 1965 .
[20] Neri Merhav,et al. On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.