Research on Video Falsity Detection Based on Publisher and Publishing Environment Features

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (8. : 2022 : Qinghai) Artificial intelligence and security ; Part 3
1. Verfasser: Xiao, Xvhao (VerfasserIn)
Weitere Verfasser: Li, Xiaojun (VerfasserIn), Yao, Junping (VerfasserIn), Li, Shaochen (VerfasserIn), Anwar, Bilal (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Intrusion Detection Model Based on KNN-AE-DNN 2022 Chen, Hongtao
A Vulnerability Detection Algorithm Based on Transformer Model 2022 Hou, Fujin
Research on Offense and Defense of DDos Based on Evolutionary Game Theory 2022 Zhao, Tengteng
An Improved Image Authentication Method Using QR Code Watermarking Approach 2022 Liu, Xiaomei
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese 2022 Tadele, Firew
A Scheme to Improve the Security of IoT Communication 2022 Fu, Junjie
Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City 2022 Guo, Shaoyong
A Cyberspace Security Knowledge System Based on Knowledge Graph 2022 Ma, Bin
A Data Reconciliation Model Based on QLDPC for Satellite-Ground Quantum Key Distribution Network 2022 Zhou, Wenting
Spatial Image Steganography Using a Correlational Model 2022 Ni, Jiangqun
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage 2022 Bai, Xuetao
A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks 2022 Lai, Ji
Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-Resonance 2022 Liu, Jianbin
A New Transparent File Encryption Method Based on SM4 for Android Platform 2022 Li, Yuheng
Deep Learning Network Intrusion Detection Based on Network Traffic 2022 Wang, Hanyang
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information 2022 Kang, Lu
A Method of Data Distribution and Traceability Based on Blockchain 2022 Gu, Bin
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures 2022 Li, Zhe
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication 2022 Xian, Yongjin
Detect Adversarial Examples by Using Feature Autoencoder 2022 Ye, Hongwei
Alle Artikel auflisten