ABSTRACT
No abstract available.
- M., Güera, David, and Edward J. Delp. "Deepfake video detection using recurrent neural networks." 2018 15th IEEE international conference on advanced video and signal-based surveillance (AVSS). IEEE, 2018.Google Scholar
- Zhao, Hanqing, "Multi-attentional deepfake detection." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2021.Google Scholar
- Aggarwal, Sudhir, "Design and Implementation of a Targeted Data Extraction System for Mobile Devices.”Google Scholar
- Roussev, Vassil, Andres Barreto, and Irfan Ahmed. "Forensic acquisition of cloud drives." arXiv preprint arXiv:1603.06542 (2016).Google Scholar
- Al Mutawa, Noora, Ibrahim Baggili, and Andrew Marrington. "Forensic analysis of social networking applications on mobile devices." Digital investigation 9 (2012): S24-S33.Google ScholarCross Ref
- Hasan, Haya R., and Khaled Salah. "Combating deepfake videos using blockchain and smart contracts." Ieee Access 7 (2019): 41596-4160Google ScholarCross Ref
Recommendations
Teaching digital library concepts using digital library applications
Many digital library topics may be taught using digital library applications, in the context of project-based digital library courses. Several digital library applications exist, and these applications are used as teaching tools to illustrate the ...
Cost-effective broadcast for fully decentralized peer-to-peer networks
Fully unstructured and decentralized peer-to-peer networks such as Gnutella are appealing for a variety of applications, among which file-sharing is the most prominent one. The decentralized nature of these systems provides a high degree of robustness ...
Comments