3
Acceptability of Breast Milk Donor Banking: A qualitative study among Health Workers in Greater Accra Regional Hospital, Ghana
4
Face Forgery Detection via Symmetric Transformer
5
Creating, Using, Misusing, and Detecting Deep Fakes
7
Towards Generalization in Deepfake Detection
8
Learning a deep dual-level network for robust DeepFake detection
9
Deepfake Video Detection via Predictive Representation Learning
10
AI-Generated Characters: Putting Deepfakes to Good Use
11
AI-synthesized faces are indistinguishable from real faces and more trustworthy
12
Generative Adversarial Networks
13
AI-generated characters for supporting personalized learning and well-being
14
A Study of the Human Perception of Synthetic Faces
15
Fooled twice: People cannot detect deepfakes but think they can
16
Deepfake detection by human crowds, machines, and machine-informed crowds
17
DefakeHop: A Light-Weight High-Performance Deepfake Detector
18
Making Sense of Blockchain for AI Deepfakes Technology
19
Generalization of Audio Deepfake Detection
20
Combating Deepfakes: Multi-LSTM and Blockchain as Proof of Authenticity for Digital Media
21
Deepfake detection: humans vs. machines
22
AI-enabled future crime
23
TweepFake: About detecting deepfake tweets
24
Anticipating and addressing the ethical implications of deepfakes in the context of elections
25
Face identity disentanglement via latent space mapping
26
GANSpace: Discovering Interpretable GAN Controls
27
StyleRig: Rigging StyleGAN for 3D Control Over Portrait Images
28
Deepfake Detection: Current Challenges and Next Steps
29
Online Abuse and Harassment
30
Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
31
Global Texture Enhancement for Fake Face Detection in the Wild
32
Analyzing and Improving the Image Quality of StyleGAN
33
The Deepfake Detection Challenge (DFDC) Preview Dataset
34
Deepfake Video Detection through Optical Flow Based CNN
35
Celeb-DF: A New Dataset for DeepFake Forensics
36
Deepfakes and Cheap Fakes: The Manipulation of Audio and Visual Evidence
37
HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time
38
A Trusting News Ecosystem Against Fake News from Humanity and Technology Perspectives
39
A Review on Machine Learning Algorithms
40
An Introduction to Variational Autoencoders
41
MelNet: A Generative Model for Audio in the Frequency Domain
42
Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
43
Online harms white paper
44
Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space?
45
A Quick Review of Machine Learning Algorithms
46
FaceForensics++: Learning to Detect Manipulated Facial Images
47
Cyber-Dependent Crimes: An Interdisciplinary Review
48
Examining the Relative Impact of Professional Profile Images and Facial Expressions in Small Business-to-Business Marketing Online
49
A Style-Based Generator Architecture for Generative Adversarial Networks
50
BeautyGAN: Instance-level Facial Makeup Transfer with Deep Generative Adversarial Network
51
Fake Face Detection Methods: Can They Be Generalized?
52
Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security
53
Open Science now: A systematic literature review for an integrated definition
55
State of the Art on Monocular 3D Face Reconstruction, Tracking, and Applications
56
The future(s) of open science
57
FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces
58
Influence of fake news in Twitter during the 2016 US presidential election
59
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
60
Prolific.ac—A subject pool for online experiments
61
High-Resolution Image Synthesis and Semantic Manipulation with Conditional GANs
62
Ian Goodfellow, Yoshua Bengio, and Aaron Courville: Deep learning
63
Progressive Growing of GANs for Improved Quality, Stability, and Variation
64
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
66
Secure comics: an interactive comic series for improving cyber security and privacy
67
SREFI: Synthesis of realistic example face images
68
Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks
69
Multi-style Generative Network for Real-time Transfer
70
Image-to-Image Translation with Conditional Adversarial Networks
71
Learning What and Where to Draw
72
Adblocking and Counter Blocking: A Slice of the Arms Race
73
Generative Adversarial Text to Image Synthesis
74
Perceptual Losses for Real-Time Style Transfer and Super-Resolution
75
Replication of "What is Typical is Good: The Influence of Face Typicality on Perceived Trustworthiness"
76
Generating Images from Captions with Attention
77
Digital news report 2015
78
Lessons from collecting a million biometric samples
79
VDub: Modifying Face Video of Actors for Plausible Visual Alignment to a Dubbed Audio Track
80
A Randomised Controlled Study of the Effects of the Attention Training Technique on Traumatic Stress Symptoms, Emotional Attention Set Shifting and Flexibility
81
Deep Learning Face Attributes in the Wild
82
Poisoning behavioral malware clustering
83
Developing a framework for responsible innovation*
84
Evasion Attacks against Machine Learning at Test Time
86
The trouble with overconfidence.
88
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
89
Secrets and Lies: Digital Security in a Networked World
90
Video Rewrite: Driving Visual Speech with Audio
92
Are ChatGPT and Deepfake Algorithms Endangering the Cybersecurity Industry
93
Facing Reality: Law Enforcement And The Challenge Of Deepfakes
94
KYC/AML Compliance - Eliminating Financial Crime in Challenger Banks. 2022
95
Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity
98
The Scary Truth Behind the FBI Warning: Deepfake Fraud is Here And it’s Serious—We Are Not Prepared
99
This Person Does Not Exist
102
Prescriptivist vs descriptivist—what’s the difference?
103
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
104
“Reject the Evidence of Your Eyes and Ears”: Deepfakes and the Law of Virtual Replicants
105
Snapshot Paper—Deepfakes and Audiovisual Disinformation
106
How Much Data Is Created Every Day in 2020?
107
What Is Account Takeover Fraud and How Can You Prevent It?
108
The Draft Online Safety Bill and the legal but harmful debate Date Published: 24 January 2022 UK Parliament
109
How Does A.I. Art Stack Up Against Human Art? (HBO)., 2018. 42. Inside the Score. Can Artificial Intelligence Make Good Music?
110
Words We’re Watching: “Deepfake.
111
Learn About Account Takeover Fraud. The Balance
112
DEEPFAKES: THREATS AND COUNTERMEASURES SYSTEMATIC REVIEW
113
Protecting World Leaders Against Deep Fakes
114
21st Century-Style Truth Decay: Deep Fakes and the Challenge for Privacy, Free Expression, and National Security
115
US defense bill requires comprehensive deepfake weaponization, countermeasures initiative
116
Deep Fakes, Fake News, and What Comes Next
117
A spy reportedly used an AI-generated profile picture to connect with sources on LinkedIn
118
How blockchain could help combat deepfakes
119
Now fake Facebook accounts are using fake faces
120
The Hypnotic Allure of the AI Art Generator. Sothebys
121
A Voice Deepfake Was Used To Scam A CEO Out Of $243
122
These people do not exist. Why websites are churning out fake images of people (and cats)
123
Online Supplement to Working Paper 2018.1 Challenging Truth and Trust: A Global Inventory of Organized Social Media Manipulation
124
Toxic Twitter – Women’s Experiences of Violence and Abuse on Twitter
125
On the Edge -AI Generated Rock Music Composed by AIVA
126
Vehicle crime prevention and the co-evolutionary arms race: recent offender countermoves using immobiliser bypass technology
127
Social media and the silencing effect: why misogyny online is a human rights issue
128
Stop Unwanted Robocalls and Texts
130
Exploring the Spam Arms Race to Characterize Spam Evolution
131
Qualitative Data Analysis with NVivo
132
Authority and american usage
133
Adobe Photoshop中隐藏的“电猫”
135
Bots & Botnets: an Overview
136
Expert Systems With Applications
137
THE STRATEGY AND TACTICS OF THE PRO-KREMLIN DISINFORMATION CAMPAIGN
138
Older People, Fraud and Scams – Age UK report
139
How fake faces are being weaponized online
140
The Slippery Slope from DALLE-2 to Deepfake Anarchy
141
Microsoft and the learnings from its failed Tay artificial intelligence bot