Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

Deep learning for deepfakes creation and detection: A survey

TT Nguyen, QVH Nguyen, DT Nguyen… - Computer Vision and …, 2022 - Elsevier
Deep learning has been successfully applied to solve various complex problems ranging
from big data analytics to computer vision and human-level control. Deep learning advances …

Anti-dreambooth: Protecting users from personalized text-to-image synthesis

T Van Le, H Phung, TH Nguyen… - Proceedings of the …, 2023 - openaccess.thecvf.com
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …

Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer

S Hu, X Liu, Y Zhang, M Li… - Proceedings of the …, 2022 - openaccess.thecvf.com
While deep face recognition (FR) systems have shown amazing performance in
identification and verification, they also arouse privacy concerns for their excessive …

[PDF][PDF] A qualitative survey on deep learning based deep fake video creation and detection method

A Rahman, MM Islam, MJ Moon, T Tasnim… - Aust. J. Eng. Innov …, 2022 - researchgate.net
The rapid growth of Deep Learning (DL) based applications is taking place in this modern
world. Deep Learning is used to solve so many critical problems such as big data analysis …

Copyright protection in generative ai: A technical perspective

J Ren, H Xu, P He, Y Cui, S Zeng, J Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Generative AI has witnessed rapid advancement in recent years, expanding their
capabilities to create synthesized content such as text, images, audio, and code. The high …

Anti-forgery: Towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations

R Wang, Z Huang, Z Chen, L Liu, J Chen… - arxiv preprint arxiv …, 2022 - arxiv.org
DeepFake is becoming a real risk to society and brings potential threats to both individual
privacy and political security due to the DeepFaked multimedia are realistic and convincing …

Intermediate layer optimization for inverse problems using deep generative models

G Daras, J Dean, A Jalal, AG Dimakis - arxiv preprint arxiv:2102.07364, 2021 - arxiv.org
We propose Intermediate Layer Optimization (ILO), a novel optimization algorithm for solving
inverse problems with deep generative models. Instead of optimizing only over the initial …

Watermark vaccine: Adversarial attacks to prevent watermark removal

X Liu, J Liu, Y Bai, J Gu, T Chen, X Jia… - European Conference on …, 2022 - Springer
As a common security tool, visible watermarking has been widely applied to protect
copyrights of digital images. However, recent works have shown that visible watermarks can …

RETRACTED ARTICLE: Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection

SR Ahmed, E Sonuç - Soft Computing, 2023 - Springer
The publisher has retracted this article in agreement with the Editor-in-Chief. The article was
submitted to be part of a guest-edited issue. An investigation by the publisher found a …