Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Frontiers in Fake Media Generation and Detection
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Frontiers in Fake Media Generation and Detection/ edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi.
other author:
Khosravy, Mahdi.
Description:
XVI, 273 p. 81 illus., 64 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computational intelligence. -
Online resource:
https://doi.org/10.1007/978-981-19-1524-6
ISBN:
9789811915246
Frontiers in Fake Media Generation and Detection
Frontiers in Fake Media Generation and Detection
[electronic resource] /edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi. - 1st ed. 2022. - XVI, 273 p. 81 illus., 64 illus. in color.online resource. - Studies in Autonomic, Data-driven and Industrial Computing,2730-6445. - Studies in Autonomic, Data-driven and Industrial Computing,.
Part 1: Introduction -- Chapter 1. Deepfakes and Society: What lies ahead? -- Chapter 2. Adversarial Examples and Defenses -- Part 2: Fake Media Generation -- Chapter 3. Adversarial Attacks -- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection -- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User -- Part 3: Fake Media Detection -- Chapter 6. Defense Against Adversarial Attacks -- Chapter 7. Adversarial Defense with Secret Key -- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection -- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach -- Part 4: Further Topics and Trends -- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method -- Chapter 11. Dynamic deception using social media.
The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
ISBN: 9789811915246
Standard No.: 10.1007/978-981-19-1524-6doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Frontiers in Fake Media Generation and Detection
LDR
:02999nam a22004095i 4500
001
1086780
003
DE-He213
005
20220528082903.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811915246
$9
978-981-19-1524-6
024
7
$a
10.1007/978-981-19-1524-6
$2
doi
035
$a
978-981-19-1524-6
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Frontiers in Fake Media Generation and Detection
$h
[electronic resource] /
$c
edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XVI, 273 p. 81 illus., 64 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Studies in Autonomic, Data-driven and Industrial Computing,
$x
2730-6445
505
0
$a
Part 1: Introduction -- Chapter 1. Deepfakes and Society: What lies ahead? -- Chapter 2. Adversarial Examples and Defenses -- Part 2: Fake Media Generation -- Chapter 3. Adversarial Attacks -- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection -- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User -- Part 3: Fake Media Detection -- Chapter 6. Defense Against Adversarial Attacks -- Chapter 7. Adversarial Defense with Secret Key -- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection -- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach -- Part 4: Further Topics and Trends -- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method -- Chapter 11. Dynamic deception using social media.
520
$a
The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Machine learning.
$3
561253
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Machine Learning.
$3
1137723
700
1
$a
Khosravy, Mahdi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317326
700
1
$a
Echizen, Isao.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1267720
700
1
$a
Babaguchi, Noboru.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1393622
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811915239
776
0 8
$i
Printed edition:
$z
9789811915253
776
0 8
$i
Printed edition:
$z
9789811915260
830
0
$a
Studies in Autonomic, Data-driven and Industrial Computing,
$x
2730-6437
$3
1354727
856
4 0
$u
https://doi.org/10.1007/978-981-19-1524-6
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login