暂无分享,去创建一个
[1] Farinaz Koushanfar,et al. Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples , 2020, ArXiv.
[2] Radu State,et al. Blockchain-Based, Decentralized Access Control for IPFS , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[3] Run Wang,et al. DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices , 2020, ACM Multimedia.
[4] Yingjie Wang,et al. A Survey on Privacy Protection of Blockchain: The Technology and Application , 2020, IEEE Access.
[5] Patrick Aichroth,et al. Copy-Move Forgery Detection and Localization via Partial Audio Matching , 2019 .
[6] JPEG White paper: Towards a Standardized Framework for Media Blockchain and Distributed Ledger Technologies , 2019 .
[7] Robert C. Maher. Principles of Forensic Audio Analysis , 2018 .
[8] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[9] Saman K. Halgamuge,et al. Computational Intelligence for Modelling and Prediction , 2005, Studies in Computational Intelligence.
[10] Pedro Cano,et al. Audio Fingerprinting: Concepts And Applications , 2005, Computational Intelligence for Modelling and Prediction.
[11] Bin Yan,et al. Digital Audio Watermarking: Fundamentals, Techniques and Challenges , 2017 .
[12] Zhen Li,et al. An Overview of Blockchain Security Analysis , 2018, CNCERT.
[13] Muhammad Imran,et al. An Automatic Digital Audio Authentication/Forensics System , 2017, IEEE Access.
[14] Diego Renza,et al. A Machine Learning Model to Detect Fake Voice , 2020, ICAI.
[15] Daniel Patricio Nicolalde Rodríguez,et al. Evaluating digital audio authenticity with spectral distances and ENF phase change , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Rich Salz,et al. A Universally Unique IDentifier (UUID) URN Namespace , 2005, RFC.
[17] Tian Feng,et al. The Jpeg-Blockchain Framework For Glam Services , 2018, 2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[18] Eddy B. Brixen. Techniques for the Authentication of Digital Audio Recordings , 2007 .
[19] Frédéric Bimbot,et al. Audio thumbnails for spoken content without transcription based on a maximum motif coverage criterion , 2014, INTERSPEECH.