HOME > 상세정보

상세정보

Frontiers in fake media generation and detection

Frontiers in fake media generation and detection

자료유형
단행본
개인저자
Khosravy, Mahdi. Echizen, Isao. Babaguchi, Noboru.
서명 / 저자사항
Frontiers in fake media generation and detection / Mahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors.
발행사항
Singapore :   Springer,   2022.  
형태사항
xvi, 273 p. : ill. (some col.) ; 25 cm.
총서사항
Studies in autonomic, data-driven and industrial computing
ISBN
9789811915239
일반주제명
Fake news. Computational intelligence.
000 00000nam u2200205 a 4500
001 000046140124
005 20230130105112
008 230130s2022 si a 000 0 eng d
020 ▼a 9789811915239
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a PN4784.F27
082 0 4 ▼a 303.3/75 ▼2 23
084 ▼a 303.375 ▼2 DDCK
090 ▼a 303.375 ▼b F935
245 0 0 ▼a Frontiers in fake media generation and detection / ▼c Mahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors.
260 ▼a Singapore : ▼b Springer, ▼c 2022.
300 ▼a xvi, 273 p. : ▼b ill. (some col.) ; ▼c 25 cm.
490 1 ▼a Studies in autonomic, data-driven and industrial computing
650 0 ▼a Fake news.
650 0 ▼a Computational intelligence.
700 1 ▼a Khosravy, Mahdi.
700 1 ▼a Echizen, Isao.
700 1 ▼a Babaguchi, Noboru.
830 0 ▼a Studies in autonomic, data-driven and industrial computing.
945 ▼a ITMT

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 303.375 F935 등록번호 121261952 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Part 1: Introduction.- Chapter 1. Deepfakes and Society: What lies ahead?.- Chapter 2. Adversarial Examples and Defenses.- Part 2: Fake Media Generation.- Chapter 3. Adversarial Attacks.- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection.- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User.- Part 3: Fake Media Detection.- Chapter 6. Defense Against Adversarial Attacks.- Chapter 7. Adversarial Defense with Secret Key.- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection.- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach.- Part 4: Further Topics and Trends.- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method.- Chapter 11. Dynamic deception using social media.

관련분야 신착자료

경희대학교. 인문학연구원. HK+통합의료인문학연구단 (2023)