Related references
Note: Only part of the references are listed.Dynamic Closest Color Warping to Sort and Compare Palettes
Suzi Kim et al.
ACM TRANSACTIONS ON GRAPHICS (2021)
Deepfake: a social construction of technology perspective
Andrei O. J. Kwok et al.
CURRENT ISSUES IN TOURISM (2021)
A Novel Counterfeit Feature Extraction Technique for Exposing Face-Swap Images Based on Deep Learning and Error Level Analysis
Weiguo Zhang et al.
ENTROPY (2020)
Deep Fake Image Detection Based on Pairwise Learning
Chih-Chung Hsu et al.
APPLIED SCIENCES-BASEL (2020)
Recent advances in digital image manipulation detection techniques: A brief review
Rahul Thakur et al.
FORENSIC SCIENCE INTERNATIONAL (2020)
Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection
Akash Chintha et al.
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2020)
Media Forensics and DeepFakes: An Overview
Luisa Verdoliva
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2020)
Deepfakes and beyond: A Survey of face manipulation and fake detection
Ruben Tolosana et al.
INFORMATION FUSION (2020)
Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN)
Xurong Li et al.
WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020 (2020)
Digital Forensics and Analysis of Deepfake Videos
Mousa Tayseer Jafar et al.
2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) (2020)
Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection
Luca Bondi et al.
2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) (2020)
Adversarial Perturbations Fool Deepfake Detectors
Apurva Gandhi et al.
2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2020)
DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection
Md Shohel Rana et al.
2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020) (2020)
Introducing the pervert's dilemma: a contribution to the critique of Deepfake Pornography
Carl Ohman
ETHICS AND INFORMATION TECHNOLOGY (2020)
Swapped face detection using deep learning and subjective assessment
Xinyi Ding et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2020)
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Ya Pan et al.
IEEE ACCESS (2020)
Fighting Deepfake by Exposing the Convolutional Traces on Images
Luca Guarnera et al.
IEEE ACCESS (2020)
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
Jawadul H. Bappy et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)
Face image manipulation detection based on a convolutional neural network
L. Minh Dang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2019)
Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos
Marie-Helen Maras et al.
INTERNATIONAL JOURNAL OF EVIDENCE & PROOF (2019)
Predicting Heart Rate Variations of Deepfake Videos using Neural ODE
Steven Fernandes et al.
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW) (2019)
Poster: Towards Robust Open-World Detection of Deepfakes
Saniat Javid Sohrawardi et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Combating Deepfake Videos Using Blockchain and Smart Contracts
Haya R. Hasan et al.
IEEE ACCESS (2019)
The Emergence of Deepfake Technology: A Review
Mika Westerlund
TECHNOLOGY INNOVATION MANAGEMENT REVIEW (2019)
Static analysis of android apps: A systematic literature review
Li Li et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2017)
Synthesizing Obama: Learning Lip Sync from Audio
Supasorn Suwajanakorn et al.
ACM TRANSACTIONS ON GRAPHICS (2017)
Densely Connected Convolutional Networks
Gao Huang et al.
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
Xception: Deep Learning with Depthwise Separable Convolutions
Francois Chollet
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact
HS Do et al.
EMPIRICAL SOFTWARE ENGINEERING (2005)
Authentication theory and hypothesis testing
UM Maurer
IEEE TRANSACTIONS ON INFORMATION THEORY (2000)