Publications: |
2015- Loda: Lightweight on-line detector of anomalies, Machine Learning 2015 [pdf]
- Towards scalable network host simulation, Procceedings of the 2nd International Workshop on Agents and CyberSecurity 2015 [pdf]
- Unsupervised detection of malware in persistent web traffic, Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on 2015 [pdf]
- Automatic discovery of web servers hosting similar applications, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on 2015 [pdf]
- Towards dependable steganalysis, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XVII} 2015 [pdf]
2014- Interpreting and clustering outliers with sapling random forests, ITAT 2014. Information Technologies - Applications and Theory. Part II 2014 [pdf]
- Explaining Anomalies with Sapling Random Forests, ITAT 2014. Information Technologies - Applications and Theory. Part II 2014 [pdf]
- Randomized Operating Point Selection in Adversarial Classification, Machine Learning and Knowledge Discovery in Databases 2014 [pdf]
- A Memory Efficient Privacy Preserving Representation of Connection Graphs, Proceedings of the 1st International Workshop on Agents and CyberSecurity 2014 [pdf]
- A mishmash of methods for mitigating the model mismatch mess, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XVI} 2014 [pdf]
- Steganographic Key Leakage Through Payload Metadata, Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security 2014 [pdf]
- The Steganographer is the Outlier: Realistic Large-Scale Steganalysis, IEEE Transactions on Information Forensics and Security 2014 [pdf]
2013- Moving Steganography and Steganalysis from the Laboratory into the Real World, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security 2013 [pdf]
- The challenges of rich features in universal steganalysis, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XV} 2013 [pdf]
- Anomaly detection by bagging, Proceedings of {COPEM}, ECML/PKDD workshop 2013 2013 [pdf]
- Attacking the IDS learning processes, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2013 [pdf]
2012- Co-occurrence steganalysis in high dimensions, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIV} 2012 [pdf]
- Identifying a steganographer in realistic and heterogeneous data sets, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIV} 2012 [pdf]
- From Blind to Quantitative Steganalysis, IEEE Transactions on Information Forensics and Security 2012 [pdf]
- Batch Steganography in the Real World, Proceedings of the on Multimedia and Security 2012 [pdf]
- Detecting anomalous network hosts by means of PCA, IEEE International Workshop on Information Forensics and Security (WIFS), 2012 2012 [pdf]
2011- "Break Our Steganographic System": The Ins and Outs of Organizing BOSS, Procceedings of Information Hiding Conference 2011
- A new paradigm for steganalysis via clustering, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIII} 2011 [pdf]
- Detecting messages of unknown length, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIII} 2011 [pdf]
2010- Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, 12th International Workshop 2010 [pdf]
- Steganalysis by Subtractive Pixel Adjacency Matrix, Transactions on Information Forensics and Security 2010 [pdf]
- Modern Steganalysis Can Detect {YASS}, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XII} 2010 [pdf]
2009- Steganalysis by subtractive pixel adjacency matrix, Proceedings of the 11th workshop on Multimedia & security, Princeton, NJ, USA, September 7--8 2009 [pdf]
- From Blind to Quantitative Steganalysis, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XI, San Jose, CA, January 19--January 22 2009 [pdf]
2008- Novelty Detection in Blind Steganalysis, Proceedings of the 10th workshop on Multimedia & security 2008 [pdf]
- The Square Root Law of Steganographic Capacity, Proceedings of the 10th workshop on Multimedia & security 2008 [pdf]
- Multiclass Detector of Current Steganographic Methods for {JPEG} Format, {IEEE} Transactions on Information Forensics and Security 2008 [pdf]
- Benchmarking for Steganography, Information Hiding, 10th International Workshop 2008 [pdf]
- Estimation of Primary Quantization Matrix for Steganalysis of Double-Compressed JPEG Images, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 27--January 31 2008 [pdf]
- Detection of double-compression in JPEG images for applications in steganography, IEEE Transactions onInformation Forensics and Security 2008 [pdf]
- Kernel Methods in Steganalysis, 2008 [pdf]
2007- Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, Proceedings of the 9th workshop on Multimedia & security 2007 [pdf]
- Merging {M}arkov and {DCT} Features for Multi-Class {JPEG} Steganalysis, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, January 29--February 1 2007 [pdf]
2006- Determining the {S}tego {A}lgorithm for {JPEG} {I}mages, Special {I}ssue of {IEE} {P}roceedings --- {I}nformation {S}ecurity 2006 [pdf]
- Multiclass Blind Steganalyasis for {JPEG} Images, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16--19 2006 [pdf]
2005- Towards Multi-Class Blind Steganalyzer for {JPEG} Images, International Workshop on Digital Watermarking 2005 [pdf]
|