This paper is a first attempt to provide a unified framework for studying signal processing problems where designers have to cope with the presence of an adversary, including media forensics, watermarking, adversarial machine learning, biometric spoofing, etc. We focus on the binary decision problem and discuss which strategies the adversary can use to flip the decision output at minimal cost, including blind sensitivity attacks and hill-climbing attacks. As the defender can also play smarter by considering the presence of a rational adversary, we introduce a game-theoretic approach where some advances have been recently made. We conclude by discussing some trends raised by this game-theoretic formulation
Abstract—We introduce a theoretical framework in which to cast the source identification problem. Th...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
This paper is a first attempt to provide a unified framework for studying signal processing problems...
This paper is a first attempt to provide a unified framework for studying signal processing problems...
International audienceGame theory is a branch of mathematics aimed at modeling and studying the inte...
Every day we share our personal information through digital systems which are constantly exposed to ...
We consider surveillance problems to be a set of system- ad-versary interaction problems in which an...
Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in w...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Recent deployments of Stackelberg security games (SSG) have led to two competing approaches to handl...
International audienceGame theory has had a revolutionary impact on a large number of disciplines (i...
Abstract—We introduce a theoretical framework in which to cast the source identification problem. Th...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
This paper is a first attempt to provide a unified framework for studying signal processing problems...
This paper is a first attempt to provide a unified framework for studying signal processing problems...
International audienceGame theory is a branch of mathematics aimed at modeling and studying the inte...
Every day we share our personal information through digital systems which are constantly exposed to ...
We consider surveillance problems to be a set of system- ad-versary interaction problems in which an...
Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in w...
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy t...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Recent deployments of Stackelberg security games (SSG) have led to two competing approaches to handl...
International audienceGame theory has had a revolutionary impact on a large number of disciplines (i...
Abstract—We introduce a theoretical framework in which to cast the source identification problem. Th...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
The increased reliance on the Internet has made information and communication systems more vulnerabl...