001447250 000__ 03474cam\a2200517Ii\4500 001447250 001__ 1447250 001447250 003__ OCoLC 001447250 005__ 20230310004109.0 001447250 006__ m\\\\\o\\d\\\\\\\\ 001447250 007__ cr\un\nnnunnun 001447250 008__ 220606s2022\\\\si\a\\\\ob\\\\000\0\eng\d 001447250 019__ $$a1322365612$$a1323252706 001447250 020__ $$a9789811915246$$q(ebook) 001447250 020__ $$a9811915245$$q(ebook) 001447250 020__ $$z9789811915239$$q(hardback) 001447250 0247_ $$a10.1007/978-981-19-1524-6$$2doi 001447250 035__ $$aSP(OCoLC)1324242877 001447250 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dOCLCF$$dN$T$$dUKAHL$$dUIU$$dOCLCQ 001447250 049__ $$aISEA 001447250 050_4 $$aPN4784.F27$$bF766 2022eb 001447250 08204 $$a303.3/75$$223/eng/20220606 001447250 24500 $$aFrontiers in fake media generation and detection /$$cMahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors. 001447250 264_1 $$aSingapore :$$bSpringer,$$c2022. 001447250 300__ $$a1 online resource (xvi, 273 pages) :$$billustrations (some color). 001447250 336__ $$atext$$btxt$$2rdacontent 001447250 337__ $$acomputer$$bc$$2rdamedia 001447250 338__ $$aonline resource$$bcr$$2rdacarrier 001447250 4900_ $$aStudies in autonomic, data-driven and industrial computing,$$x2730-6445 001447250 504__ $$aIncludes bibliographical references. 001447250 5050_ $$aPart 1: Introduction -- Chapter 1. Deepfakes and Society: What lies ahead? -- Chapter 2. Adversarial Examples and Defenses -- Part 2: Fake Media Generation -- Chapter 3. Adversarial Attacks -- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection -- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User -- Part 3: Fake Media Detection -- Chapter 6. Defense Against Adversarial Attacks -- Chapter 7. Adversarial Defense with Secret Key -- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection -- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach -- Part 4: Further Topics and Trends -- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method -- Chapter 11. Dynamic deception using social media. 001447250 506__ $$aAccess limited to authorized users. 001447250 520__ $$aThe book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones' attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection. 001447250 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 2, 2022). 001447250 650_0 $$aFake news. 001447250 650_0 $$aComputational intelligence. 001447250 655_0 $$aElectronic books. 001447250 7001_ $$aKhosravy, Mahdi,$$eeditor. 001447250 7001_ $$aEchizen, Isao,$$eeditor. 001447250 7001_ $$aBabaguchi, Noboru,$$eeditor. 001447250 77608 $$iPrint version:$$tFrontiers in fake media generation and detection.$$dSingapore : Springer, [2022]$$z9789811915239$$w(OCoLC)1302574944 001447250 852__ $$bebk 001447250 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-1524-6$$zOnline Access$$91397441.1 001447250 909CO $$ooai:library.usi.edu:1447250$$pGLOBAL_SET 001447250 980__ $$aBIB 001447250 980__ $$aEBOOK 001447250 982__ $$aEbook 001447250 983__ $$aOnline 001447250 994__ $$a92$$bISE