Sign in

Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack.

Mahdi KhosravyKazuaki NakamuraNaoko NittaNilanjan DeyRubén González CrespoEnrique Herrera-ViedmaNoboru Babaguchi
Published in: IEEE Trans. Syst. Man Cybern. Syst. (2023)
Keyphrases
  • deep learning
  • management system
  • probabilistic model
  • machine learning
  • social networks
  • feature selection
  • multiscale
  • maximum likelihood
  • decision support
  • computer systems
  • learning strategies