A low-latency edge computation offloading scheme for trust evaluation in finance-level artificial intelligence of things
The finance-level Artificial Intelligence of Things (AIoT) is going to become a novel media in
the 6G-driven digital society. Inside the financial AIoT environment, large-scale crowd credit …
the 6G-driven digital society. Inside the financial AIoT environment, large-scale crowd credit …
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …
authentication, encompassing an analysis of key aspects such as the selection of biometric …
A privacy-preserving social computing framework for health management using federated learning
Currently, health management driven by intelligent means is a general demand of social
systems. Although a number of researchers have paid attention to such areas, they have …
systems. Although a number of researchers have paid attention to such areas, they have …
Restricted black-box adversarial attack against deepfake face swapping
DeepFake face swapping presents a significant threat to online security and social media,
which can replace the source face in an arbitrary photo/video with the target face of an …
which can replace the source face in an arbitrary photo/video with the target face of an …
A vehicle-road urban sensing framework for collaborative content delivery in freeway-oriented vehicular networks
X Zhu, Q Hua, W Yan, Z Guo, K Yu - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
Urban sensing provides a fundamental computing environment for smart cities, in which
ubiquitous vehicular networks are an important component. Due to the limitation of urban …
ubiquitous vehicular networks are an important component. Due to the limitation of urban …
A Deep Learning-Based Data Management Scheme for Intelligent Control of Wastewater Treatment Processes Under Resource-Constrained IoT Systems
Y Shen, X Zhu, Z Guo, K Yu, O Alfarraj… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Effective data management schemes have always been the major demand in universal
industrial Internet of Things (IoT) systems, especially in resource-constrained scenarios. In …
industrial Internet of Things (IoT) systems, especially in resource-constrained scenarios. In …
Exposing deepfakes using dual-channel network with multi-axis attention and frequency analysis
This paper proposes a dual-channel network for DeepFake detection. The network
comprises two channels: one using a stacked Maxvit block to process the downsampled …
comprises two channels: one using a stacked Maxvit block to process the downsampled …
Synthesizing black-box anti-forensics deepfakes with high visual quality
DeepFake, an AI technology for creating facial forgeries, has garnered global attention.
Amid such circumstances, forensics researchers focus on developing defensive algorithms …
Amid such circumstances, forensics researchers focus on developing defensive algorithms …
The spiral of digital falsehood in deepfakes
M Leone - International Journal for the Semiotics of Law-Revue …, 2023 - Springer
The article defines the research field of a semiotically oriented philosophy of digital
communication. It lays out its methodological perspective, pointing out how the fake has …
communication. It lays out its methodological perspective, pointing out how the fake has …
A Cross-Field Deep Learning-based Fuzzy Spamming Detection Approach Via Collaboration of Behavior Modeling and Sentiment Analysis
Intelligent detection techniques for Online spamming have been a hot concern in academia.
Although much technical progress has been achieved in recent years, two aspects of …
Although much technical progress has been achieved in recent years, two aspects of …