Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
Face recognition systems under morphing attacks: A survey
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
A comprehensive survey on methods for image integrity
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
Deep face representations for differential morphing attack detection
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Benford's law applied to digital forensic analysis
P Fernandes, M Antunes - Forensic Science International: Digital …, 2023 - Elsevier
Tampered digital multimedia content has been increasingly used in a wide set of
cyberattacks, challenging criminal investigations and law enforcement authorities. The …
cyberattacks, challenging criminal investigations and law enforcement authorities. The …
Detection of face morphing attacks based on PRNU analysis
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
Adversarial attacks against face recognition: A comprehensive study
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …
suggesting suitability for real-world applications ranging from photo tagging in social media …
Learning to discover forgery cues for face forgery detection
Locating manipulation maps, ie, pixel-level annotation of forgery cues, is crucial for
providing interpretable detection results in face forgery detection. Related learning objects …
providing interpretable detection results in face forgery detection. Related learning objects …
FD-GAN: Face de-morphing generative adversarial network for restoring accomplice's facial image
Face morphing attack is proved to be a serious threat to the existing face recognition
systems. Although a few face morphing detection methods have been put forward, the face …
systems. Although a few face morphing detection methods have been put forward, the face …
Border control morphing attack detection with a convolutional neural network de-morphing approach
D Ortega-Delcampo, C Conde… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the use of biometric identification, automated or semiautomated, is a reality. For
this reason, the number of attacks has increased in such systems. One of the most common …
this reason, the number of attacks has increased in such systems. One of the most common …