Linked e-resources

Details

Part 1: Introduction
Chapter 1. Deepfakes and Society: What lies ahead?
Chapter 2. Adversarial Examples and Defenses
Part 2: Fake Media Generation
Chapter 3. Adversarial Attacks
Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection
Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User
Part 3: Fake Media Detection
Chapter 6. Defense Against Adversarial Attacks
Chapter 7. Adversarial Defense with Secret Key
Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection
Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach
Part 4: Further Topics and Trends
Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method
Chapter 11. Dynamic deception using social media.

Browse Subjects

Show more subjects...

Statistics

from
to
Export