Detecting real-time deep-fake videos using active illumination
CR Gerstner, H Farid - … of the IEEE/CVF Conference on …, 2022 - openaccess.thecvf.com
While many have grown suspicious of viral images and videos found online, there is a
general sense that we can and should trust that the person on the other end of our video …
general sense that we can and should trust that the person on the other end of our video …
Building Secure and Engaging Video Communication by Using Monitor Illumination
In this paper we develop a neural network that can detect a mismatch between the light
emitted from a monitor and the light reflected from the face of a user sitting in front of a …
emitted from a monitor and the light reflected from the face of a user sitting in front of a …
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …
Sonarguard: Ultrasonic face liveness detection on mobile devices
Liveness detection has been widely applied in face authentication systems to combat
malicious attacks. However, existing methods purely depending on visual frames become …
malicious attacks. However, existing methods purely depending on visual frames become …
Counterfactual Reward Estimation for Credit Assignment in Multi-agent Deep Reinforcement Learning over Wireless Video Transmission
This study investigates frame-wise optimization in Mobile Edge Computing (MEC) for video
transmission, emphasizing dynamic adaptation to diverse frame complexities and efficient …
transmission, emphasizing dynamic adaptation to diverse frame complexities and efficient …
Principles of Designing Robust Remote Face Anti-Spoofing Systems
Protecting digital identities of human face from various attack vectors is paramount, and face
anti-spoofing plays a crucial role in this endeavor. Current approaches primarily focus on …
anti-spoofing plays a crucial role in this endeavor. Current approaches primarily focus on …
[PDF][PDF] 远程办公系统安全综述
杨泽霖, 王基策, 徐斐, 黄宇航, 艾铭超, 马慧… - Journal of Cyber …, 2022 - jcs.iie.ac.cn
摘要受新型冠状病毒肺炎的影响, 远程办公这种新型办公方式在短时间内迅速发展并被社会广泛
应用, 由此引发的远程办公系统的安全问题显得越发急迫和突出. 目前, 远程办公系统安全的相关 …
应用, 由此引发的远程办公系统的安全问题显得越发急迫和突出. 目前, 远程办公系统安全的相关 …
[PDF][PDF] Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks.
Input transformation techniques have been proposed to defend against adversarial example
attacks in imageclassification systems. However, recent works have shown that, although …
attacks in imageclassification systems. However, recent works have shown that, although …
A Novel Face Spoofing Detection Using hand crafted MobileNet
S Zahra, M Khan, K Abid, N Aslam… - VFAST Transactions on …, 2023 - vfast.org
There are several uses for face spoofing detection, including human-robot communication,
business, film, hotel services, and even politics. Despite the adoption of numerous …
business, film, hotel services, and even politics. Despite the adoption of numerous …
[HTML][HTML] Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection Techniques
Intelligent surveillance systems play an essential role in modern smart cities to enable
situational awareness. As part of the critical infrastructure, surveillance systems are often …
situational awareness. As part of the critical infrastructure, surveillance systems are often …