Results 71 to 80 of about 36,777 (311)

Imperceptible Face Forgery Attack via Adversarial Semantic Mask [PDF]

open access: green
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversarial examples with generated pixel perturbations in the global image. These generated adversarial samples still can't achieve satisfactory
Decheng Liu   +4 more
openalex   +3 more sources

SHIELD: an evaluation benchmark for face spoofing and forgery detection with multimodal large language models

open access: yesVisual Intelligence
Multimodal large language models (MLLMs) have demonstrated strong capabilities in vision-related tasks, capitalizing on their visual semantic comprehension and reasoning capabilities.
Yichen Shi   +9 more
doaj   +1 more source

A Statistical Approach for Keystroke Continuous Authentication Subversion

open access: yesIEEE Access
Continuous Authentication systems leveraging keystroke dynamics are increasingly used to verify users unobtrusively. However, the resilience of these systems against advanced adversarial techniques remains unclear.
Danny Radosevich, Mike Borowczak
doaj   +1 more source

Cryptanalysis of NORX v2.0

open access: yesIACR Transactions on Symmetric Cryptology, 2017
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau   +4 more
doaj   +1 more source

Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors [PDF]

open access: yes2018 26th European Signal Processing Conference (EUSIPCO), 2018
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful communication channel. Not surprisingly, they are also increasingly subject to manipulations aimed at distorting information and spreading fake news. In recent years, the scientific community has devoted major efforts to contrast this menace, and many image ...
Diego Gragnaniello   +3 more
openaire   +3 more sources

Psychoactive prescription drug use and misuse in patients on opioid agonist treatment

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Aims To identify the patterns and trends in prescription drug use and misuse in patients on opioid agonist treatment. Methods We used data from the OPPIDUM programme, which collects data from patients attending substance abuse treatment facilities. Data collected include use of psychoactive prescription drugs in the past week.
Thomas Soeiro   +5 more
wiley   +1 more source

‘Let's talk about the weather’: The activist curriculum and global climate change education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Activist movements have garnered significant global attention on a range of sustainability issues, often involving collectives of citizens coming together. Invoked is the idea of citizens informed to act, emerging not from a common‐sense understanding of everyday life, but rather from a deep political understanding of the world—one that is ...
Richard Pountney
wiley   +1 more source

‘Where are the adults?’: Troubling child‐activism and children's political participation

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley   +1 more source

From paradise lost to paradise regained: A compassionate retuning of assessed seminars

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Universities often aim to deliver a curriculum that is both research‐based and develops transferable skills in students, thereby enhancing their competitiveness in the job market. At the same time, evidence indicates that university students experience significant stress owing to the competitive nature of the assessments, an aspect that is ...
Sarah Stephen
wiley   +1 more source

Camera-based Image Forgery Localization using Convolutional Neural Networks

open access: yes, 2018
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core   +1 more source

Home - About - Disclaimer - Privacy