2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6639361
|View full text |Cite
|
Sign up to set email alerts
|

Coping with the enemy: Advances in adversary-aware signal processing

Abstract: This paper is a first attempt to provide a unified framework for studying signal processing problems where designers have to cope with the presence of an adversary, including media forensics, watermarking, adversarial machine learning, biometric spoofing, etc. We focus on the binary decision problem and discuss which strategies the adversary can use to flip the decision output at minimal cost, including blind sensitivity attacks and hill-climbing attacks. As the defender can also play smarter by considering th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
39
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 27 publications
2
39
0
Order By: Relevance
“…Even in this case, it is possible that malevolent users provide a fake feedback to improve or decrease the reputation of the item under inspection [3], [4]. Other examples come from the emerging field of adversarial signal processing as exemplified in [5].…”
Section: Introductionmentioning
confidence: 99%
“…Even in this case, it is possible that malevolent users provide a fake feedback to improve or decrease the reputation of the item under inspection [3], [4]. Other examples come from the emerging field of adversarial signal processing as exemplified in [5].…”
Section: Introductionmentioning
confidence: 99%
“…Binary decision in an adversarial setup is one of the most recurrent problems in AdvSP, due to its importance in many application scenarios [1]. Among binary decision problems, source identification is one of the most studied subjects, since it lies at the heart of several security-oriented disciplines, like Multimedia forensics, anomaly detection, steganalysis and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Before providing the details, note that α k (·) is a density over Π, where Π is the set of all beliefs from (2). In particular, if the statespace X is continuous, then Π is a function space comprising the space of density functions; if X is finite, then Π is the unit (X − 1)dimensional simplex (corresponding to X-dimensional probability vectors).…”
Section: General Inverse Filtermentioning
confidence: 99%
“…During the last decade, the importance of defense against cyberadversarial and autonomous treats has been highlighted on numerous occasions -e.g., [1,2,3]. In this paper, we consider the design of counter-adversarial autonomous (CAA) systems.…”
Section: Introductionmentioning
confidence: 99%