Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …
been gaining significant attention due to the rapidly growing applications of deep learning in …
Deep learning for deepfakes creation and detection: A survey
Deep learning has been successfully applied to solve various complex problems ranging
from big data analytics to computer vision and human-level control. Deep learning advances …
from big data analytics to computer vision and human-level control. Deep learning advances …
Anti-dreambooth: Protecting users from personalized text-to-image synthesis
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …
design skills, to create realistic images from simple text inputs. With powerful personalization …
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer
While deep face recognition (FR) systems have shown amazing performance in
identification and verification, they also arouse privacy concerns for their excessive …
identification and verification, they also arouse privacy concerns for their excessive …
[PDF][PDF] A qualitative survey on deep learning based deep fake video creation and detection method
The rapid growth of Deep Learning (DL) based applications is taking place in this modern
world. Deep Learning is used to solve so many critical problems such as big data analysis …
world. Deep Learning is used to solve so many critical problems such as big data analysis …
Copyright protection in generative ai: A technical perspective
Generative AI has witnessed rapid advancement in recent years, expanding their
capabilities to create synthesized content such as text, images, audio, and code. The high …
capabilities to create synthesized content such as text, images, audio, and code. The high …
Anti-forgery: Towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations
DeepFake is becoming a real risk to society and brings potential threats to both individual
privacy and political security due to the DeepFaked multimedia are realistic and convincing …
privacy and political security due to the DeepFaked multimedia are realistic and convincing …
Intermediate layer optimization for inverse problems using deep generative models
We propose Intermediate Layer Optimization (ILO), a novel optimization algorithm for solving
inverse problems with deep generative models. Instead of optimizing only over the initial …
inverse problems with deep generative models. Instead of optimizing only over the initial …
Watermark vaccine: Adversarial attacks to prevent watermark removal
As a common security tool, visible watermarking has been widely applied to protect
copyrights of digital images. However, recent works have shown that visible watermarks can …
copyrights of digital images. However, recent works have shown that visible watermarks can …
RETRACTED ARTICLE: Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection
SR Ahmed, E Sonuç - Soft Computing, 2023 - Springer
The publisher has retracted this article in agreement with the Editor-in-Chief. The article was
submitted to be part of a guest-edited issue. An investigation by the publisher found a …
submitted to be part of a guest-edited issue. An investigation by the publisher found a …