Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
DOI: 10.1145/3297280.3297410
|View full text |Cite
|
Sign up to set email alerts
|

GAN is a friend or foe?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(5 citation statements)
references
References 17 publications
0
4
0
1
Order By: Relevance
“…A faceswap replaces the facial features of target person's with those of source person, while expression swap modified the facial features of target person based on those of source person. Quite some work has been done to detect deepfakes [10,14,33,13,34]. Many of these techniques employ machine learning and deep learning for image forensics based on the pixel-based attributes.…”
Section: Deepfake Image Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…A faceswap replaces the facial features of target person's with those of source person, while expression swap modified the facial features of target person based on those of source person. Quite some work has been done to detect deepfakes [10,14,33,13,34]. Many of these techniques employ machine learning and deep learning for image forensics based on the pixel-based attributes.…”
Section: Deepfake Image Detectionmentioning
confidence: 99%
“…Dang et al [37] identified the GAN images by employing a CNN that works on the pre-processed dataset (only tampered or GAN region of the image) to recognize the fake image. On the other hand, Tariq et al [13] devised the classifier for human created and Progressive GAN images and have also devised the end-to-end framework for automatic detection [34].…”
Section: Deepfake Image Detectionmentioning
confidence: 99%
“…Kuwahara et al 48 study the applicability of statistical anomaly detection methods to identify malicious CAN messages, where a pipeline technology is proposed to extract the timestamp and ID information in each messages quickly, and the efficiency of the proposed method is evaluated in real message datasets and in supervised and unsupervised cases. Besides NNs, other artificial intelligence algorithms, such as LSTM, 49 Bayesian networks, 50 hidden Markov models, 51 SVM, 52 compound classifier, 53 and singular spectrum analysis 54 are also introduced to build an IDS for CAN bus.…”
Section: The State‐of‐the‐art Work About Security Protection Of In‐vehicle Networkmentioning
confidence: 99%
“…Desarrollo de una aplicación web que genere rostros de personas que no existen en el mundo real En el campo de la inteligencia artificial, las Redes Generativas Adversarias o Generative Adversarial Networks (GANs) han emergido como una poderosa herramienta que desafía las fronteras de la creatividad digital (Tariq et al, 2019). Estas redes, conceptualizadas por primera vez por Ian Goodfellow y sus colegas en 2014, han revolucionado la generación de contenido visual, ofreciendo la capacidad única de crear imágenes realistas e inéditas que desafían la realidad misma.…”
Section: Introductionunclassified