Login / Signup

Emerging Threat of Deep Fake: How to identify and Prevent IT.

Murooj Amer TahaWijdan Mahood KhudhairAhmed Mahmood KhudhurOmar Abdulkareem MahmoodYousif I. HammadiRiyam Shihab Ahmed Al-husseinawiAhmed Aziz
Published in: ICFNDS (2022)
Keyphrases
  • feature extraction
  • information technology
  • neural network
  • artificial intelligence
  • case study
  • countermeasures