首页 > 最新文献

EURASIP Journal on Information Security最新文献

英文 中文
Feature partitioning for robust tree ensembles and their certification in adversarial scenarios 对抗场景下鲁棒树集合的特征划分及其认证
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-04-07 DOI: 10.1186/s13635-021-00127-0
Stefano Calzavara, C. Lucchese, Federico Marcuzzi, S. Orlando
{"title":"Feature partitioning for robust tree ensembles and their certification in adversarial scenarios","authors":"Stefano Calzavara, C. Lucchese, Federico Marcuzzi, S. Orlando","doi":"10.1186/s13635-021-00127-0","DOIUrl":"https://doi.org/10.1186/s13635-021-00127-0","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2020-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48949808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deep neural rejection against adversarial examples 对对抗性例子的深度神经排斥
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-04-07 DOI: 10.1186/s13635-020-00105-y
Angelo Sotgiu, Ambra Demontis, Marco Melis, B. Biggio, G. Fumera, Xiaoyi Feng, F. Roli
{"title":"Deep neural rejection against adversarial examples","authors":"Angelo Sotgiu, Ambra Demontis, Marco Melis, B. Biggio, G. Fumera, Xiaoyi Feng, F. Roli","doi":"10.1186/s13635-020-00105-y","DOIUrl":"https://doi.org/10.1186/s13635-020-00105-y","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2020 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2020-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00105-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65684020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device 跨移动设备使用场景的滑动手势认证稳定性评估
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-03-17 DOI: 10.1186/s13635-020-00103-0
Elakkiya Ellavarason, Richard Guest, Farzin Deravi
User interaction with a mobile device predominantly consists of touch motions, otherwise known as swipe gestures, which are used as a behavioural biometric modality to verify the identity of a user. Literature reveals promising verification accuracy rates for swipe gesture authentication. Most of the existing studies have considered constrained environment in their experimental set-up. However, real-life usage of a mobile device consists of several unconstrained scenarios as well. Thus, our work aims to evaluate the stability of swipe gesture authentication across various usage scenarios of a mobile device. The evaluations were performed using state-of-the-art touch-based classification algorithms—support vector machine (SVM), k-nearest neighbour (kNN) and naive Bayes—to evaluate the robustness of swipe gestures across device usage scenarios. To simulate real-life behaviour, multiple usage scenarios covering stationary and dynamic modes are considered for the analysis. Additionally, we focused on analysing the stability of verification accuracy for time-separated swipes by performing intra-session (acquired on the same day) and inter-session (swipes acquired a week later) comparisons. Finally, we assessed the consistency of individual features for horizontal and vertical swipes using a statistical method. Performance evaluation results indicate impact of body movement and environment (indoor and outdoor) on the user verification accuracy. The results reveal that for a static user scenario, the average equal error rate is 1%, and it rises significantly for the scenarios involving any body movement—caused either by user or the environment. The performance evaluation for time-separated swipes showed better verification accuracy rate for swipes acquired on the same day compared to swipes separated by a week. Finally, assessment on feature consistency reveal a set of consistent features such as maximum slope, standard deviation and mean velocity of second half of stroke for both horizontal and vertical swipes. The performance evaluation of swipe-based authentication shows variation in verification accuracy across different device usage scenarios. The obtained results challenge the adoption of swipe-based authentication on mobile devices. We have suggested ways to further achieve stability through specific template selection strategies. Additionally, our evaluation has established that at least 6 swipes are needed in enrolment to achieve acceptable accuracy. Also, our results conclude that features such as maximum slope and standard deviation are the most consistent features across scenarios.
用户与移动设备的交互主要由触摸动作组成,也被称为滑动手势,这被用作一种行为生物识别方式来验证用户的身份。文献揭示了滑动手势认证有希望的验证准确率。现有的研究大多在实验设置中考虑了约束环境。然而,移动设备的实际使用也包括几个不受约束的场景。因此,我们的工作旨在评估滑动手势认证在移动设备的各种使用场景中的稳定性。评估使用最先进的基于触摸的分类算法-支持向量机(SVM), k近邻(kNN)和朴素贝叶斯-来评估滑动手势在设备使用场景中的鲁棒性。为了模拟现实生活中的行为,我们考虑了多种使用场景,包括静止模式和动态模式。此外,我们通过执行会话内(在同一天获得)和会话间(一周后获得)比较,重点分析了时间间隔滑动验证准确性的稳定性。最后,我们使用统计方法评估了水平和垂直滑动的单个特征的一致性。性能评估结果表明身体运动和环境(室内和室外)对用户验证精度的影响。结果表明,对于静态用户场景,平均相等错误率为1%,对于涉及任何身体运动的场景(由用户或环境引起),错误率显着上升。对间隔时间的刷卡性能评价显示,当天刷卡的验证准确率高于间隔一周刷卡的验证准确率。最后,对特征一致性的评估揭示了一组一致的特征,如最大坡度、标准偏差和下半笔划的平均速度。通过对刷卡认证的性能评估,可以看出不同设备使用场景下,刷卡认证的验证精度存在差异。研究结果对在移动设备上采用基于刷卡的身份验证提出了挑战。我们提出了通过特定模板选择策略进一步实现稳定性的方法。此外,我们的评估已经确定,在登记时至少需要6次刷卡才能达到可接受的准确性。此外,我们的研究结果表明,最大斜率和标准差等特征是各种场景中最一致的特征。
{"title":"Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device","authors":"Elakkiya Ellavarason, Richard Guest, Farzin Deravi","doi":"10.1186/s13635-020-00103-0","DOIUrl":"https://doi.org/10.1186/s13635-020-00103-0","url":null,"abstract":"User interaction with a mobile device predominantly consists of touch motions, otherwise known as swipe gestures, which are used as a behavioural biometric modality to verify the identity of a user. Literature reveals promising verification accuracy rates for swipe gesture authentication. Most of the existing studies have considered constrained environment in their experimental set-up. However, real-life usage of a mobile device consists of several unconstrained scenarios as well. Thus, our work aims to evaluate the stability of swipe gesture authentication across various usage scenarios of a mobile device. The evaluations were performed using state-of-the-art touch-based classification algorithms—support vector machine (SVM), k-nearest neighbour (kNN) and naive Bayes—to evaluate the robustness of swipe gestures across device usage scenarios. To simulate real-life behaviour, multiple usage scenarios covering stationary and dynamic modes are considered for the analysis. Additionally, we focused on analysing the stability of verification accuracy for time-separated swipes by performing intra-session (acquired on the same day) and inter-session (swipes acquired a week later) comparisons. Finally, we assessed the consistency of individual features for horizontal and vertical swipes using a statistical method. Performance evaluation results indicate impact of body movement and environment (indoor and outdoor) on the user verification accuracy. The results reveal that for a static user scenario, the average equal error rate is 1%, and it rises significantly for the scenarios involving any body movement—caused either by user or the environment. The performance evaluation for time-separated swipes showed better verification accuracy rate for swipes acquired on the same day compared to swipes separated by a week. Finally, assessment on feature consistency reveal a set of consistent features such as maximum slope, standard deviation and mean velocity of second half of stroke for both horizontal and vertical swipes. The performance evaluation of swipe-based authentication shows variation in verification accuracy across different device usage scenarios. The obtained results challenge the adoption of swipe-based authentication on mobile devices. We have suggested ways to further achieve stability through specific template selection strategies. Additionally, our evaluation has established that at least 6 swipes are needed in enrolment to achieve acceptable accuracy. Also, our results conclude that features such as maximum slope and standard deviation are the most consistent features across scenarios.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"8 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2020-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding visual lip-based biometric authentication for mobile devices 了解移动设备的基于嘴唇的视觉生物识别认证
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-03-12 DOI: 10.1186/s13635-020-0102-6
C. Wright, D. Stewart
{"title":"Understanding visual lip-based biometric authentication for mobile devices","authors":"C. Wright, D. Stewart","doi":"10.1186/s13635-020-0102-6","DOIUrl":"https://doi.org/10.1186/s13635-020-0102-6","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2020 1","pages":"1-16"},"PeriodicalIF":3.6,"publicationDate":"2020-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-0102-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43745996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines 加密域的击键生物识别技术:网络搜索引擎搜索建议功能的初步研究
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-02-21 DOI: 10.1186/s13635-020-0100-8
N. Whiskerd, Nicklas Körtge, Kris Jürgens, Kevin Lamshöft, Salatiel Ezennaya-Gomez, C. Vielhauer, J. Dittmann, M. Hildebrandt
{"title":"Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines","authors":"N. Whiskerd, Nicklas Körtge, Kris Jürgens, Kevin Lamshöft, Salatiel Ezennaya-Gomez, C. Vielhauer, J. Dittmann, M. Hildebrandt","doi":"10.1186/s13635-020-0100-8","DOIUrl":"https://doi.org/10.1186/s13635-020-0100-8","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-0100-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42762486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combining PRNU and noiseprint for robust and efficient device source identification 结合PRNU和noiseprint实现稳健高效的设备源识别
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-17 DOI: 10.1186/s13635-020-0101-7
D. Cozzolino, Francesco Marra, Diego Gragnaniello, G. Poggi, L. Verdoliva
{"title":"Combining PRNU and noiseprint for robust and efficient device source identification","authors":"D. Cozzolino, Francesco Marra, Diego Gragnaniello, G. Poggi, L. Verdoliva","doi":"10.1186/s13635-020-0101-7","DOIUrl":"https://doi.org/10.1186/s13635-020-0101-7","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2020-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-0101-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44718634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation. 通过加密眼镜的机器学习:通过基于密钥的多样化聚合对抗对抗性攻击。
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 Epub Date: 2020-06-01 DOI: 10.1186/s13635-020-00106-x
Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients' back propagation and restricts the attacker to create a "bypass" system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)).

近年来,基于深度神经网络(DNN)的分类技术被广泛应用于计算机视觉、自然语言处理、自动驾驶汽车等多个领域。然而,基于dnn的分类系统在对抗性攻击中的脆弱性质疑了它们在许多关键应用中的使用。因此,基于dnn的鲁棒分类器的开发是这些方法未来部署的关键点。同样重要的问题是理解这个漏洞背后的机制。此外,目前还不完全清楚如何将机器学习与密码学联系起来,以创造防御者对攻击者的信息优势。在本文中,我们提出了一种基于密钥的多样化聚合(KDA)机制作为灰盒和黑盒场景下的防御策略。KDA假设攻击者(i)知道分类器的架构和使用的防御策略,(ii)可以访问训练数据集,但(iii)不知道密钥,也无法访问系统的内部状态。系统的鲁棒性是通过特殊设计的基于密钥的随机化来实现的。所提出的随机化可以防止梯度的反向传播,并限制攻击者创建“绕过”系统。随机化在多个通道中同时进行。每个通道在一个特殊的变换域中引入自己的随机化。在训练和测试阶段之间共享密钥为防御者创造了信息优势。最后,来自每个通道的软输出的聚合稳定了结果并增加了最终分数的可靠性。所进行的实验评估表明,KDA对最先进的基于梯度的灰盒可转移性攻击和非基于梯度的黑盒攻击具有高鲁棒性和通用性(本文报告的结果已在CVPR 2019 (Taran等人,通过随机多样化防御对抗性攻击,2019)和ICIP 2019 (Taran等人,2019)中部分呈现。基于预过滤键的多元聚合对深度网络分类器的鲁棒性增强,2019)。
{"title":"Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.","authors":"Olga Taran,&nbsp;Shideh Rezaeifar,&nbsp;Taras Holotyak,&nbsp;Slava Voloshynovskiy","doi":"10.1186/s13635-020-00106-x","DOIUrl":"https://doi.org/10.1186/s13635-020-00106-x","url":null,"abstract":"<p><p>In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients' back propagation and restricts the attacker to create a \"bypass\" system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)).</p>","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2020 1","pages":"10"},"PeriodicalIF":3.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00106-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38177556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Long-term integrity protection of genomic data 基因组数据的长期完整性保护
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-29 DOI: 10.1186/s13635-019-0099-x
J. Buchmann, Matthias Geihs, K. Hamacher, S. Katzenbeisser, S. Stammler
{"title":"Long-term integrity protection of genomic data","authors":"J. Buchmann, Matthias Geihs, K. Hamacher, S. Katzenbeisser, S. Stammler","doi":"10.1186/s13635-019-0099-x","DOIUrl":"https://doi.org/10.1186/s13635-019-0099-x","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0099-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47723221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation 具有ExtraTrees特征选择、极限学习机集成和softmax聚合的多层入侵检测系统
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-22 DOI: 10.1186/s13635-019-0098-y
Jivitesh Sharma, Charul Giri, Ole-Christoffer Granmo, Morten Goodwin
{"title":"Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation","authors":"Jivitesh Sharma, Charul Giri, Ole-Christoffer Granmo, Morten Goodwin","doi":"10.1186/s13635-019-0098-y","DOIUrl":"https://doi.org/10.1186/s13635-019-0098-y","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2019 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-019-0098-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65683958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Swapped face detection using deep learning and subjective assessment 使用深度学习和主观评估的交换人脸检测
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-09-10 DOI: 10.1186/s13635-020-00109-8
Xinyi Ding, Zohreh Raziei, Eric C. Larson, E. Olinick, P. Krueger, Michael Hahsler
{"title":"Swapped face detection using deep learning and subjective assessment","authors":"Xinyi Ding, Zohreh Raziei, Eric C. Larson, E. Olinick, P. Krueger, Michael Hahsler","doi":"10.1186/s13635-020-00109-8","DOIUrl":"https://doi.org/10.1186/s13635-020-00109-8","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2020 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00109-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48733952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
EURASIP Journal on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1