Deepfake Detection Using Multiple Facial Features (English)
- New search for: Wang, Xinzhe
- New search for: Ma, Duohe
- New search for: Wang, Liming
- New search for: Lu, Zhitong
- New search for: Zhang, Zhenchao
- New search for: Jiang, Junye
- New search for: Peterson, Gilbert
- New search for: Shenoi, Sujeet
- New search for: Wang, Xinzhe
- New search for: Ma, Duohe
- New search for: Wang, Liming
- New search for: Lu, Zhitong
- New search for: Zhang, Zhenchao
- New search for: Jiang, Junye
In:
Advances in Digital Forensics XIX
: 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers
;
Chapter: 9
;
161-175
;
2023
- Article/Chapter (Book) / Electronic Resource
-
Title:Deepfake Detection Using Multiple Facial Features
-
Additional title:IFIP Advs Information
-
Contributors:Peterson, Gilbert ( editor ) / Shenoi, Sujeet ( editor ) / Wang, Xinzhe ( author ) / Ma, Duohe ( author ) / Wang, Liming ( author ) / Lu, Zhitong ( author ) / Zhang, Zhenchao ( author ) / Jiang, Junye ( author )
-
Conference:IFIP International Conference on Digital Forensics ; 2023 ; Arlington, VA, USA
-
Published in:Advances in Digital Forensics XIX : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers ; Chapter: 9 ; 161-175IFIP Advances in Information and Communication Technology ; 687 ; 161-175
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2023-10-19
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Forensic Analysis of the iOS Apple Pay Mobile Payment SystemNicholson, Trevor / Hayes, Darren / Le-Khac, Nhien-An et al. | 2023
- 2
-
Forensic Analysis of Android Cryptocurrency Wallet ApplicationsShi, Chen / Guan, Yong et al. | 2023
- 3
-
An Anti-Fuzzing Approach for Android AppsCheng, Chris Chao-Chun / Lin, Li / Shi, Chen / Guan, Yong et al. | 2023
- 4
-
Nintendo 3DS Forensic Examination ToolsXynos, Konstantinos / Read, Huw / Sutherland, Iain / Bovee, Matthew / Do, Trang et al. | 2023
- 5
-
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot EcosystemTabari, Armin Ziaie / Liu, Guojun / Ou, Xinming / Singhal, Anoop et al. | 2023
- 6
-
Towards Direct-Control Data Acquisition by Nano-Probing Non-Volatile Memory CellsMcKay, Shawn / Hutchins, Nathan / Baskerville, Steven / Shenoi, Sujeet et al. | 2023
- 7
-
Using Perceptual Hashing for Targeted Content ScanningTwenning, Leon / Baier, Harald / Göbel, Thomas et al. | 2023
- 8
-
Analysis of Document Security FeaturesGarg, Pulkit / Chhabra, Saheb / Gupta, Garima / Srivastava, Vishal / Gupta, Gaurav et al. | 2023
- 9
-
Deepfake Detection Using Multiple Facial FeaturesWang, Xinzhe / Ma, Duohe / Wang, Liming / Lu, Zhitong / Zhang, Zhenchao / Jiang, Junye et al. | 2023
- 10
-
Identifying Superspreaders by Ranking System Object Instance GraphsSuryavanshi, Rajani / Sun, Xiaoyan / Dai, Jun et al. | 2023
- 11
-
A Dynamic Malicious Document Detection Method Based on Multi-Memory FeaturesWang, Yuanyuan / Li, Gengwang / Yu, Min / Chow, Kam-Pui / Jiang, Jianguo / Meng, Xiang / Huang, Weiqing et al. | 2023
- 12
-
Traceable Transformer-Based Anomaly Detection for a Water Treatment SystemQin, Shenzhi / Lang, Yubo / Chow, Kam-Pui et al. | 2023
- 13
-
Evolution of Global Digital Forensics Laws and Emergent ChallengesGanesan, Kaushik Thinnaneri et al. | 2023
- 14
-
A Blockchain Model for Sharing Information in Criminal Justice SystemsRamazhamba, Pardon / Venter, Hein et al. | 2023