Sign in

Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples.

Shehzeen HussainPaarth NeekharaMalhar JereFarinaz KoushanfarJulian J. McAuley
Published in: WACV (2021)
Keyphrases
  • multi agent
  • real time
  • neural network
  • information retrieval
  • knowledge base
  • three dimensional
  • reinforcement learning
  • intrusion detection
  • key concepts
  • penetration testing