llibretto 发表于 2025-3-28 15:15:47

https://doi.org/10.1007/978-3-031-49803-9Adversarial Attacks; DeepFake Detection; Multimedia Forensics; Digital Forensics; Image Forensics; Video

dura-mater 发表于 2025-3-28 22:23:38

http://reply.papertrans.cn/16/1505/150411/150411_42.png

CRUMB 发表于 2025-3-29 00:36:07

Model Poisoning Attack Against Federated Learning with Adaptive Aggregation, a new era of collaborative data-driven insights. However, the growing adoption of FL brings forth the need to scrutinize its vulnerabilities and security challenges, particularly concerning adversarial attacks. This book chapter delves into the intricate realm of FL’s susceptibility to adversarial

正面 发表于 2025-3-29 06:38:27

http://reply.papertrans.cn/16/1505/150411/150411_44.png

Corral 发表于 2025-3-29 08:12:29

http://reply.papertrans.cn/16/1505/150411/150411_45.png

ORBIT 发表于 2025-3-29 14:45:07

Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms,hniques. These algorithms utilize Siamese neural networks to detect and localize spliced contents by identifying inconsistencies in an image’s forensic traces. At the same time, deep learning has also enabled the researchers to develop new types of anti-forensic attack that can fool forensic algorit

法律的瑕疵 发表于 2025-3-29 19:37:06

Generative Adversarial Networks for Artificial Satellite Image Creation and Manipulation,deep learning architectures (DL),Synthetic satellite images offer a wide range of potential applications, including the generation of massive, labeled datasets for artificial intelligence (AI) applications, manipulated image detection, and natural disaster monitoring and detection. Although deep lea

Lament 发表于 2025-3-29 23:39:55

Domain Specific Information Based Learning for Facial Image Forensics,cs is one of the sub fields of multimedia forensics which involves any kind of digital images such as face, fingerprint etc. Security systems are one of the most sophisticated systems to protect assets and privacy in recent years. The demand for fast, accurate identification and authentication is in

和谐 发表于 2025-3-30 01:07:08

http://reply.papertrans.cn/16/1505/150411/150411_49.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Adversarial Multimedia Forensics; Ehsan Nowroozi,Kassem Kallas,Alireza Jolfaei Book 2024 The Editor(s) (if applicable) and The Author(s),