語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Frontiers in Fake Media Generation and Detection
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Frontiers in Fake Media Generation and Detection/ edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi.
其他作者:
Babaguchi, Noboru.
面頁冊數:
XVI, 273 p. 81 illus., 64 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Machine Learning. -
電子資源:
https://doi.org/10.1007/978-981-19-1524-6
ISBN:
9789811915246
Frontiers in Fake Media Generation and Detection
Frontiers in Fake Media Generation and Detection
[electronic resource] /edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi. - 1st ed. 2022. - XVI, 273 p. 81 illus., 64 illus. in color.online resource. - Studies in Autonomic, Data-driven and Industrial Computing,2730-6445. - Studies in Autonomic, Data-driven and Industrial Computing,.
Part 1: Introduction -- Chapter 1. Deepfakes and Society: What lies ahead? -- Chapter 2. Adversarial Examples and Defenses -- Part 2: Fake Media Generation -- Chapter 3. Adversarial Attacks -- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection -- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User -- Part 3: Fake Media Detection -- Chapter 6. Defense Against Adversarial Attacks -- Chapter 7. Adversarial Defense with Secret Key -- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection -- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach -- Part 4: Further Topics and Trends -- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method -- Chapter 11. Dynamic deception using social media.
The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
ISBN: 9789811915246
Standard No.: 10.1007/978-981-19-1524-6doiSubjects--Topical Terms:
1137723
Machine Learning.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Frontiers in Fake Media Generation and Detection
LDR
:02999nam a22004095i 4500
001
1086780
003
DE-He213
005
20220528082903.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811915246
$9
978-981-19-1524-6
024
7
$a
10.1007/978-981-19-1524-6
$2
doi
035
$a
978-981-19-1524-6
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Frontiers in Fake Media Generation and Detection
$h
[electronic resource] /
$c
edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XVI, 273 p. 81 illus., 64 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Studies in Autonomic, Data-driven and Industrial Computing,
$x
2730-6445
505
0
$a
Part 1: Introduction -- Chapter 1. Deepfakes and Society: What lies ahead? -- Chapter 2. Adversarial Examples and Defenses -- Part 2: Fake Media Generation -- Chapter 3. Adversarial Attacks -- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection -- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User -- Part 3: Fake Media Detection -- Chapter 6. Defense Against Adversarial Attacks -- Chapter 7. Adversarial Defense with Secret Key -- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection -- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach -- Part 4: Further Topics and Trends -- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method -- Chapter 11. Dynamic deception using social media.
520
$a
The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
650
2 4
$a
Machine Learning.
$3
1137723
650
2 4
$a
Artificial Intelligence.
$3
646849
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Machine learning.
$3
561253
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computational intelligence.
$3
568984
700
1
$a
Babaguchi, Noboru.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1393622
700
1
$a
Echizen, Isao.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1267720
700
1
$a
Khosravy, Mahdi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317326
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811915239
776
0 8
$i
Printed edition:
$z
9789811915253
776
0 8
$i
Printed edition:
$z
9789811915260
830
0
$a
Studies in Autonomic, Data-driven and Industrial Computing,
$x
2730-6437
$3
1354727
856
4 0
$u
https://doi.org/10.1007/978-981-19-1524-6
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入