Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation
暂无分享,去创建一个
[1] Jianwei Fei,et al. A Survey on Deepfake Video Detection , 2021, IET Biom..
[2] F. Koushanfar,et al. Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples , 2020, 2021 IEEE Winter Conference on Applications of Computer Vision (WACV).
[3] Saniat Javid Sohrawardi,et al. Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection , 2020, IEEE Journal of Selected Topics in Signal Processing.
[4] Hany Farid,et al. Evading Deepfake-Image Detectors with White- and Black-Box Attacks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[5] Shomik Jain,et al. Adversarial Perturbations Fool Deepfake Detectors , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).
[6] Dorothea Kolossa,et al. Leveraging Frequency Analysis for Deep Fake Image Recognition , 2020, ICML.
[7] Alexei A. Efros,et al. CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Saniat Javid Sohrawardi,et al. Poster: Towards Robust Open-World Detection of Deepfakes , 2019, CCS.
[9] Cristian Canton-Ferrer,et al. The Deepfake Detection Challenge (DFDC) Preview Dataset , 2019, ArXiv.
[10] Alberto Del Bimbo,et al. Deepfake Video Detection through Optical Flow Based CNN , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[11] Premkumar Natarajan,et al. Recurrent Convolutional Strategies for Face Manipulation Detection in Videos , 2019, CVPR Workshops.
[12] Justus Thies,et al. Deferred Neural Rendering: Image Synthesis using Neural Textures , 2019 .
[13] Justus Thies,et al. Deferred neural rendering , 2019, ACM Trans. Graph..
[14] James Bailey,et al. Black-box Adversarial Attacks on Video Recognition Models , 2019, ACM Multimedia.
[15] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[16] Pedro H. O. Pinheiro,et al. Adversarial Framing for Image and Video Classification , 2018, AAAI.
[17] Amit K. Roy-Chowdhury,et al. Adversarial Perturbations Against Real-Time Video Classification Systems , 2018, NDSS.
[18] Hang Su,et al. Sparse Adversarial Perturbations for Videos , 2018, AAAI.
[19] Edward J. Delp,et al. Deepfake Video Detection Using Recurrent Neural Networks , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[20] Junichi Yamagishi,et al. MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[22] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[23] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[24] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[25] François Chollet,et al. Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[26] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[27] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[28] Justus Thies,et al. Face2Face: Real-Time Face Capture and Reenactment of RGB Videos , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[30] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[31] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[33] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[34] Tom Schaul,et al. Natural Evolution Strategies , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).