Articles with "deepfake attacks" as a keyword



Photo by benceboros from unsplash

DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IT Professional"

DOI: 10.1109/mitp.2022.3172653

Abstract: Advancements in generative models, such as deepfake, allow users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust.… read more here.

Keywords: deepfake attacks; detection using; detection; defakepro decentralized ... See more keywords
Photo from wikipedia

Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14050125

Abstract: With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend on reliable, secure,… read more here.

Keywords: network; deepfake attacks; network frequency; electrical network ... See more keywords