glomeruli 发表于 2025-3-25 04:58:31

Forensic Analysis of Webex on the iOS Platformces. With the surging usage of online telecommunication software, online meeting exploitation and disruptions cases also increased. However, there is limited research performed on online telecommunication software from the forensics perspective, and most are focused on Skype. Also, even though the i

自负的人 发表于 2025-3-25 09:10:05

http://reply.papertrans.cn/28/2794/279328/279328_22.png

SOBER 发表于 2025-3-25 15:30:04

http://reply.papertrans.cn/28/2794/279328/279328_23.png

bioavailability 发表于 2025-3-25 19:36:23

http://reply.papertrans.cn/28/2794/279328/279328_24.png

持久 发表于 2025-3-25 20:34:44

Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification. Our experimental results demonstrate that the proposed attack can be implemented to successfully compromise the existing forensic methods with 100% probability for non-flat videos while producing the high quality content. The results indicate the need for attack-prone video source camera identific

VEST 发表于 2025-3-26 01:20:49

http://reply.papertrans.cn/28/2794/279328/279328_26.png

返老还童 发表于 2025-3-26 07:53:40

Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? – A Preliminary Sesibility issue. Adapting the original approach by replacing its steganalyzer with watermark extraction algorithm and revising the overall training strategy, we are able to mitigate the visibility issue. Furthermore, we evaluate our improved approaches under three simple yet practical attacks, i.e.,

防御 发表于 2025-3-26 10:00:31

http://reply.papertrans.cn/28/2794/279328/279328_28.png

提名 发表于 2025-3-26 13:41:05

http://reply.papertrans.cn/28/2794/279328/279328_29.png

Gossamer 发表于 2025-3-26 20:13:26

http://reply.papertrans.cn/28/2794/279328/279328_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 13th EAI Internation Sanjay Goel,Pavel Gladyshev,Daryl Johnson Conference proceedings 2023 ICST Institut