Publisher
Springer Nature Switzerland
Reference39 articles.
1. Agarwal, S., Fan, W., Farid, H.: A diverse large-scale dataset for evaluating rebroadcast attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1997–2001 (2018). https://doi.org/10.1109/ICASSP.2018.8462205
2. Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: Dy, J., Krause, A. (eds.) International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 80, pp. 284–293. PMLR (2018)
3. Bibi, M., Hamid, A., Moetesum, M., Siddiqi, I.: Document forgery detection using printer source identification-a text-independent approach. In: International Conference on Document Analysis and Recognition Workshops, vol. 8, pp. 7–12 (2019)
4. Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317–331 (2018). https://doi.org/10.1016/j.patcog.2018.07.023
5. Bulan, O., Mao, J., Sharma, G.: Geometric distortion signatures for printer identification. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1401–1404 (2009)