
000 | 00000nam u2200205 a 4500 | |
001 | 000046140124 | |
005 | 20230130105112 | |
008 | 230130s2022 si a 000 0 eng d | |
020 | ▼a 9789811915239 | |
040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
050 | 4 | ▼a PN4784.F27 |
082 | 0 4 | ▼a 303.3/75 ▼2 23 |
084 | ▼a 303.375 ▼2 DDCK | |
090 | ▼a 303.375 ▼b F935 | |
245 | 0 0 | ▼a Frontiers in fake media generation and detection / ▼c Mahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors. |
260 | ▼a Singapore : ▼b Springer, ▼c 2022. | |
300 | ▼a xvi, 273 p. : ▼b ill. (some col.) ; ▼c 25 cm. | |
490 | 1 | ▼a Studies in autonomic, data-driven and industrial computing |
650 | 0 | ▼a Fake news. |
650 | 0 | ▼a Computational intelligence. |
700 | 1 | ▼a Khosravy, Mahdi. |
700 | 1 | ▼a Echizen, Isao. |
700 | 1 | ▼a Babaguchi, Noboru. |
830 | 0 | ▼a Studies in autonomic, data-driven and industrial computing. |
945 | ▼a ITMT |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 303.375 F935 | 등록번호 121261952 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Part 1: Introduction.- Chapter 1. Deepfakes and Society: What lies ahead?.- Chapter 2. Adversarial Examples and Defenses.- Part 2: Fake Media Generation.- Chapter 3. Adversarial Attacks.- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection.- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User.- Part 3: Fake Media Detection.- Chapter 6. Defense Against Adversarial Attacks.- Chapter 7. Adversarial Defense with Secret Key.- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection.- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach.- Part 4: Further Topics and Trends.- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method.- Chapter 11. Dynamic deception using social media.