Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
May 20, 2024 · ... Evaluation Methods: A Systematic Review on Evaluating Explainable AI ... An adversarial attack approach for eXplainable AI evaluation on deepfake detection models.
May 27, 2024 · This research tackles this knowledge gap by providing an up-to-date systematic survey of the digital forensic methods used to detect deepfakes. A rigorous ...
May 31, 2024 · This study provides a comprehensive evaluation of model Robustness against such attacks across key tasks well-assessed in Information Disorder literature: Toxic ...
May 29, 2024 · The frame from the dataset in the first column is correctly identified as Fake by the detectors, while the corresponding frames generated by each of our attacks ...
May 14, 2024 · An adversarial attack approach for eXplainable AI evaluation on deepfake detection models ... evaluation approach specifically suited for deepfake detection ...
May 14, 2024 · We have applied Explainable Artificial Intelligence (XAI) to understand the interpretability and transparency of the proposed model in detecting XSS attacks.
May 27, 2024 · Conclusion In this project work, the proposed ResNeXt-LSTM model for Deepfake Detection for. Future Scope ○ Integration with real-time processing and edge ...
May 28, 2024 · This paper presents a survey of algorithms used to create deepfakes and, more importantly, methods proposed to detect deepfakes in the literature to date. We ...
21 hours ago · Adversarial Attack Detection. 14 papers with code ... Explainable Models. 36 papers with code ... DeepFake Detection. 6 benchmarks. 145 papers with code · Synthetic ...
Missing: approach | Show results with:approach
4 days ago · Title: Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed ...
Model advanced attackers with a flexible payload to gain control of compromised systems. Take...