HOME > Detail View

Detail View

Frontiers in fake media generation and detection

Frontiers in fake media generation and detection

Material type
단행본
Personal Author
Khosravy, Mahdi. Echizen, Isao. Babaguchi, Noboru.
Title Statement
Frontiers in fake media generation and detection / Mahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors.
Publication, Distribution, etc
Singapore :   Springer,   2022.  
Physical Medium
xvi, 273 p. : ill. (some col.) ; 25 cm.
Series Statement
Studies in autonomic, data-driven and industrial computing
ISBN
9789811915239
Subject Added Entry-Topical Term
Fake news. Computational intelligence.
000 00000nam u2200205 a 4500
001 000046140124
005 20230130105112
008 230130s2022 si a 000 0 eng d
020 ▼a 9789811915239
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a PN4784.F27
082 0 4 ▼a 303.3/75 ▼2 23
084 ▼a 303.375 ▼2 DDCK
090 ▼a 303.375 ▼b F935
245 0 0 ▼a Frontiers in fake media generation and detection / ▼c Mahdi Khosravy, Isao Echizen, Noboru Babaguchi, editors.
260 ▼a Singapore : ▼b Springer, ▼c 2022.
300 ▼a xvi, 273 p. : ▼b ill. (some col.) ; ▼c 25 cm.
490 1 ▼a Studies in autonomic, data-driven and industrial computing
650 0 ▼a Fake news.
650 0 ▼a Computational intelligence.
700 1 ▼a Khosravy, Mahdi.
700 1 ▼a Echizen, Isao.
700 1 ▼a Babaguchi, Noboru.
830 0 ▼a Studies in autonomic, data-driven and industrial computing.
945 ▼a ITMT

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 303.375 F935 Accession No. 121261952 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Part 1: Introduction.- Chapter 1. Deepfakes and Society: What lies ahead?.- Chapter 2. Adversarial Examples and Defenses.- Part 2: Fake Media Generation.- Chapter 3. Adversarial Attacks.- Chapter 4. Robust Deepfake On Unrestricted Media: Generation And Detection.- Chapter 5. Spoofing Tweet Generator considering Points of Interest of Target User.- Part 3: Fake Media Detection.- Chapter 6. Defense Against Adversarial Attacks.- Chapter 7. Adversarial Defense with Secret Key.- Chapter 8. A Practical Guide to Logical Access Voice Presentation Attack Detection.- Chapter 9. Cross-Domain Fake News Detection on Social Media: A Context-Aware Adversarial Approach.- Part 4: Further Topics and Trends.- Chapter 10. Recognizer Cloning Attack on Image Recognition Services and Its Defending Method.- Chapter 11. Dynamic deception using social media.

New Arrivals Books in Related Fields

경희대학교. 인문학연구원. HK+통합의료인문학연구단 (2023)