Linked e-resources
Details
Table of Contents
Part 1: Introduction
Chapter 1. Deepfakes and Society: What lies ahead?
Chapter 2. Adversarial Examples and Defenses
Part 2: Fake Media Generation
Chapter 3. Adversarial Attacks
Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection
Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User
Part 3: Fake Media Detection
Chapter 6. Defense Against Adversarial Attacks
Chapter 7. Adversarial Defense with Secret Key
Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection
Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach
Part 4: Further Topics and Trends
Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method
Chapter 11. Dynamic deception using social media.
Chapter 1. Deepfakes and Society: What lies ahead?
Chapter 2. Adversarial Examples and Defenses
Part 2: Fake Media Generation
Chapter 3. Adversarial Attacks
Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection
Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User
Part 3: Fake Media Detection
Chapter 6. Defense Against Adversarial Attacks
Chapter 7. Adversarial Defense with Secret Key
Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection
Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach
Part 4: Further Topics and Trends
Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method
Chapter 11. Dynamic deception using social media.