Anomaly-Based Manipulation Detection in Satellite Images
暂无分享,去创建一个
Paolo Bestagini | Stefano Tubaro | Edward J. Delp | Sri Kalyan Yarlagadda | Fengqing Maggie Zhu | David Guera | Janos Horvath | E. Delp | S. Tubaro | F. Zhu | Paolo Bestagini | János Horváth | S. Yarlagadda | David Guera
[1] Jinghui Chen,et al. Closing the Generalization Gap of Adaptive Gradient Methods in Training Deep Neural Networks , 2018, IJCAI.
[2] Wei Hu,et al. Algorithmic Regularization in Learning Deep Homogeneous Models: Layers are Automatically Balanced , 2018, NeurIPS.
[3] Manuel Menezes de Oliveira Neto,et al. Digital Image Forensics vs. Image Composition: An Indirect Arms Race , 2016, ArXiv.
[4] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[5] Richard S. Zemel,et al. Aggregated Momentum: Stability Through Passive Damping , 2018, ICLR.
[6] Chandan Srivastava,et al. Support Vector Data Description , 2011 .
[7] Xiaohong Yuan,et al. Semi-Supervised Deep Neural Network for Network Intrusion Detection , 2016 .
[8] Paolo Bestagini,et al. Splicing Detection and Localization In Satellite Imagery Using Conditional GANs , 2019, 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[9] Edward J. Delp,et al. Deepfake Video Detection Using Recurrent Neural Networks , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[10] Gary Bécigneul,et al. Riemannian Adaptive Optimization Methods , 2018, ICLR.
[11] Sanjay Chawla,et al. Anomaly Detection using One-Class Neural Networks , 2018, ArXiv.
[12] Massimo Piccardi,et al. An Investigation of Recurrent Neural Architectures for Drug Name Recognition , 2016, Louhi@EMNLP.
[13] Patrick J. Flynn,et al. Image Provenance Analysis at Scale , 2018, IEEE Transactions on Image Processing.
[14] Jia Li,et al. Lifted Proximal Operator Machines , 2018, AAAI.
[15] Paolo Bestagini,et al. Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier , 2018, Media Watermarking, Security, and Forensics.
[16] Adam Van Etten,et al. You Only Look Twice: Rapid Multi-Scale Object Detection In Satellite Imagery , 2018, ArXiv.
[17] Anthony Tung Shuen Ho,et al. A semi-fragile pinned sine transform watermarking system for content authentication of satellite images , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..
[18] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[19] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[20] Scott Workman,et al. Wide-Area Image Geolocalization with Aerial Reference Imagery , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[21] Alexander Binder,et al. Deep One-Class Classification , 2018, ICML.
[22] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[23] Paolo Bestagini,et al. Reliability Map Estimation for CNN-Based Camera Model Attribution , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[24] Xin Jin,et al. Generative image inpainting with neural features , 2018, ICIMCS '18.
[25] Pierre Alliez,et al. Can semantic labeling methods generalize to any city? the inria aerial image labeling benchmark , 2017, 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).
[26] Zhe Gan,et al. AttnGAN: Fine-Grained Text to Image Generation with Attentional Generative Adversarial Networks , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[27] Shujun Li,et al. Forensic Camera Model Identification , 2015 .
[28] Sanjiv Kumar,et al. On the Convergence of Adam and Beyond , 2018 .
[29] Larry S. Davis,et al. Generate, Segment, and Refine: Towards Generic Manipulation Segmentation , 2018, AAAI.
[30] Mauro Barni,et al. Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[31] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[32] Jure Leskovec,et al. Hierarchical Graph Representation Learning with Differentiable Pooling , 2018, NeurIPS.
[33] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[34] Jiebo Luo,et al. DOTA: A Large-Scale Dataset for Object Detection in Aerial Images , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[35] Venkat Chandrasekaran,et al. Fitting Tractable Convex Sets to Support Function Evaluations , 2019, Discret. Comput. Geom..
[36] Paolo Bestagini,et al. Shadow Removal Detection and Localization for Forensics Analysis , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[37] Daniel Holden,et al. Robust solving of optical motion capture data by denoising , 2018, ACM Trans. Graph..
[38] Trung Le,et al. When Can Neural Networks Learn Connected Decision Regions? , 2019, ArXiv.
[39] Hiroki Nakahara,et al. Identification of inpainted satellite images using evalutionary artificial neural network (EANN) and k-nearest neighbor(KNN) algorithm , 2017, 2017 8th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).
[40] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).