暂无分享,去创建一个
Henrique S. Malvar | Paul England | Eric Horvitz | Jack W. Stokes | Kevin Kane | Alex Shamis | Manuel Costa | Sylvan Clebsch | C'edric Fournet | Amaury Chamayou | Shabnam Erfani | E. Horvitz | C. Fournet | Manuel Costa | P. England | K. Kane | A. Shamis | J. W. Stokes | S. Clebsch | A. Chamayou | S. Erfani
[1] Kartik Nayak,et al. CCF: A Framework for Building Confidential Verifiable Replicated Services , 2019 .
[2] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[3] Frederic P. Miller,et al. Lua (programming language) , 2009 .
[4] Siwei Lyu,et al. Exposing DeepFake Videos By Detecting Face Warping Artifacts , 2018, CVPR Workshops.
[5] Jianbo Gao,et al. Performance Analysis of the Libra Blockchain: An Experimental Study , 2019, 2019 2nd International Conference on Hot Information-Centric Networking (HotICN).
[6] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[7] Xin Yang,et al. Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Meredith Ringel Morris,et al. Augmenting web pages and search results to support credibility assessment , 2011, CHI.
[9] Savvas Zannettou,et al. A pr 2 01 8 The Web of False Information : Rumors , Fake News , Hoaxes , Clickbait , and Various Other Shenanigans , 2018 .
[10] Luisa Verdoliva,et al. Media Forensics and DeepFakes: An Overview , 2020, IEEE Journal of Selected Topics in Signal Processing.
[11] Jack W. Stokes,et al. Designing Indicators to Combat Fake Media , 2020, ArXiv.
[12] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[13] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[14] Jeff Donahue,et al. Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.
[15] Sreeram Kannan,et al. Prism: Deconstructing the Blockchain to Approach Physical Limits , 2019, CCS.
[16] Victor Lempitsky,et al. Few-Shot Adversarial Learning of Realistic Neural Talking Head Models , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[17] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[18] Khaled Salah,et al. Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.
[19] Arati Baliga,et al. Performance Evaluation of the Quorum Blockchain Platform , 2018, ArXiv.
[20] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[21] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX Annual Technical Conference.
[22] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[23] Michael Arnold. Subjective and objective quality evaluation of watermarked audio tracks , 2002, Second International Conference on Web Delivering of Music, 2002. WEDELMUSIC 2002. Proceedings..
[24] Scott McCloskey,et al. Detecting GAN-generated Imagery using Color Cues , 2018, ArXiv.
[25] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[26] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking , 2018, ArXiv.