Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization

H Du, R Zhang, Y Liu, J Wang, Y Lin… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of
Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across …

Generation and detection of manipulated multimodal audiovisual content: Advances, trends and open challenges

H Liz-Lopez, M Keita, A Taleb-Ahmed, A Hadid… - Information …, 2024 - Elsevier
Generative deep learning techniques have invaded the public discourse recently. Despite
the advantages, the applications to disinformation are concerning as the counter-measures …

Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders

N Damer, M Fang, P Siebke, JN Kolf… - … on Biometrics and …, 2023 - ieeexplore.ieee.org
Investigating new methods of creating face morphing attacks is essential to foresee novel
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …

Spear or shield: Leveraging generative AI to tackle security threats of intelligent network services

H Du, D Niyato, J Kang, Z Xiong, KY Lam… - arXiv preprint arXiv …, 2023 - arxiv.org
Generative AI (GAI) models have been rapidly advancing, with a wide range of applications
including intelligent networks and mobile AI-generated content (AIGC) services. Despite …

Image morphing techniques: A review

AQ Aloraibi - 2023 - techniumscience.com
Nowadays image morphing has become one of the important techniques in applications that
require a graphical representation of objects. Morphing tools have become very well known …

Worst‐Case Morphs Using Wasserstein ALI and Improved MIPGAN

UM Kelly, M Nauta, L Liu, LJ Spreeuwers… - IET …, 2023 - Wiley Online Library
A morph is a combination of two separate facial images and contains the identity information
of two different people. When used in an identity document, both people can be …

LADIMO: Face Morph Generation through Biometric Template Inversion with Latent Diffusion

M Grimmer, C Busch - 2024 IEEE International Joint …, 2024 - ieeexplore.ieee.org
Face morphing attacks pose a severe security threat to face recognition systems, enabling
the morphed face image to be verified against multiple identities. To detect such …

Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing

B Zhang, X Zhu, X Zhang, Z Lei - 2023 IEEE International Joint …, 2023 - ieeexplore.ieee.org
Face anti-spoofing is crucial for ensuring the security and reliability of face recognition
systems. Several existing face anti-spoofing methods utilize GAN-like networks to detect …

[HTML][HTML] Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image

J Cai, Q Duan, M Long, LB Zhang, X Ding - Sensors, 2024 - mdpi.com
Face morphing attacks disrupt the essential correlation between a face image and its identity
information, posing a significant challenge to face recognition systems. Despite …

Fast-dim: Towards fast diffusion morphs

ZW Blasingame, C Liu - IEEE Security & Privacy, 2024 - ieeexplore.ieee.org
Fast-DiM: Towards Fast Diffusion Morphs Page 1 1540-7993/24©2024IEEE Copublished by
the IEEE Computer and Reliability Societies July/August 2024 103 SYNTHETIC REALITIES …