X Zhang, L Hao, G Gui, Y Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Malware traffic classification (MTC) plays an important role in cyber security and network resource management for the secure Internet of Things (IoT). Many deep learning (DL) …
Multimedia anomaly datasets play a crucial role in automated surveillance. They have a wide range of applications expanding from outlier objects/situation detection to the detection …
Recent advancements in diffusion models have enabled the generation of realistic deepfakes by writing textual prompts in natural language. While these models have …
Generative deep learning techniques have invaded the public discourse recently. Despite the advantages, the applications to disinformation are concerning as the counter-measures …
Y Yu, X Liu, R Ni, S Yang, Y Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deepfake techniques can forge the visual or audio signals in the video, which leads to inconsistencies between visual and audio (VA) signals. Therefore, multimodal detection …
S Muppalla, S Jia, S Lyu - 2023 IEEE MIT Undergraduate …, 2023 - ieeexplore.ieee.org
Deepfakes are AI-generated media in which an image or video has been digitally modified. The advancements made in deepfake technology have led to privacy and security issues …
Most deepfake detection methods focus on detecting spatial and/or spatio-temporal changes in facial attributes and are centered around the binary classification task of detecting …
J Wu, Q Yin, Z Sheng, W Lu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, audio spoofing detection has received widespread attention for protecting personal privacy and social security. Despite the significant progress achieved in audio …
In addition to the advancements in deepfake generation, corresponding detection technologies need to continuously evolve to regulate the potential misuse of deepfakes …