Results 21 to 30 of about 11,154 (185)

Deepfake Face Generation Techniques Based on Generative Adversarial Networks [PDF]

open access: yesITM Web of Conferences
With the continuous rise of deepfake technology in recent years, deepfake face generation technology has gradually become a popular technology in the field of computer vision.
Pi Yonghe
doaj   +1 more source

Deepfake Literacy of the Journalists and Initiatives of Media Organization in Bangladesh [PDF]

open access: yes, 2022
Deepfake has become a recent concern in the field of journalism. Though earlier deepfake was mainly used in porn industry nowadays the unscrupulous people used it to provide false and fabricated information.
Sumon Ali, Md.
core   +2 more sources

DeepFake on Face and Expression Swap: A Review

open access: yesIEEE Access, 2023
Remarkable advances have been made in deep learning, leading to the emergence of highly realistic AI-generated videos known as deepfakes. Deepfakes use generative models to manipulate facial features to create modified identities or expressions with ...
Saima Waseem   +5 more
doaj   +1 more source

Challenges associated with generative forms of multimedia content (keynote talk) [PDF]

open access: yes, 2019
This short paper presents what is currently the main challenge associated with using Generative Adversarial Networks (GANs) to generate visual media.
Smeaton, Alan F.
core   +1 more source

Role of Artificial Intelligence (AI) art in care of ageing society: focus on dementia [PDF]

open access: yes, 2019
open access articleBackground: Art enhances both physical and mental health wellbeing. The health benefits include reduction in blood pressure, heart rate, pain perception and briefer inpatient stays, as well as improvement of communication skills and ...
Harwood, Tracy   +2 more
core   +1 more source

Deepfake-Image Anti-Forensics with Adversarial Examples Attacks

open access: yesFuture Internet, 2021
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks.
Li Fan, Wei Li, Xiaohui Cui
doaj   +1 more source

The proliferation of the “fake news” and its algorithms damages the democratic culture [PDF]

open access: yes, 2019
El objetivo es conjeturar sobre "fake news" (FN) priorizando los tiempos en la trayectoria de Internet con la eclosión de las redes sociales, de la atroz recentida de que pone en riesgo la credibilidad del periodismo, justificando así la pérdida de ...
Parreira do Prado, Magaly
core   +2 more sources

JERAT HUKUM PENYALAHGUNAAN APLIKASI DEEPFAKE DITINJAU DARI HUKUM PIDANA

open access: yes, 2021
Perkembangan teknologi memicu munculnya salah satu software atau aplikasi sejenis deepfake, aplikasi tersebut dapat memanipulasi gambar atau video editan secara palsu dan dapat memicu adanya hoax ataupun ujaran kebencian lainnya.
Astuti, Pudji, Novyanti, Heny
core   +2 more sources

A Critical Review of the 2025 RSHE Guidance and Alternative Approach Framed in Safe Uncertainty

open access: yesChildren &Society, EarlyView.
ABSTRACT This policy review critically examines the English government's 2025 statutory guidance on Relationships Education, Relationship and Sex Education and Health Education (RSHE), analysing its educational assumptions, strengths and limitations through the lens of safe uncertainty.
Emily Setty, Jonny Hunt
wiley   +2 more sources

Artificial intelligence and UK national security: Policy considerations [PDF]

open access: yes, 2020
RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development ...
Babuta, Alexander   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy