Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/100)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
100
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
asynchronous fault detection
18.
attack detection
19.
barotrauma detection system
20.
body detection
21.
botnet detection
22.
capacitively coupled conductivity detection
23.
change detection
24.
chemical detection
25.
community detection
26.
compu ter-aided detection(CAD)
27.
computer-aided detection
28.
computer‐aided detection
29.
contactless conductivity detection
30.
contactless conductivity detection (C4D)
31.
crash detection
32.
defect detection
33.
detection
34.
detection efficiency
35.
detection engineering
36.
detection of anomalous end user nodes
37.
distributed detection
38.
early detection
39.
early intrusion detection
40.
energy detection
41.
error detection
42.
ESI-MS and IM detection
43.
Event detection
44.
failure detection
45.
fall detection
46.
fault detection
47.
fault detection and diagnoses
48.
fault detection and diagnosis
49.
Fish detection
50.
fouling detection
51.
hepatitis C virus (HCV) detection
52.
hubs detection
53.
IED detection
54.
indicident detection and response
55.
indirect UV absorbance detection
56.
intrusion detection
57.
intrusion detection systems
58.
island detection
59.
islanding detection
60.
label-free detection
61.
LED fluorescence detection
62.
leg detection
63.
light detection and ranging
64.
Light Detection and Ranging (LiDAR) point cloud
65.
limit of detection
66.
lock-in detection
67.
loop-closure detection
68.
malware detection
69.
marker detection
70.
mobile malware detection
71.
money laundering detection systems
72.
monitoring and detection
73.
multi-classed object detection
74.
mutant detection
75.
network anomaly detection
76.
nodules detection
77.
object detection
78.
oil-spill detection
79.
outlier’s detection methods
80.
outliers detection
81.
plagiarism detection
82.
position detection
83.
protein detection
84.
proton detection
85.
radar detection
86.
ramp event detection
87.
recycled FPGA detection
88.
robust detection
89.
short-circuit detection
90.
small molecule detection
91.
speech activity detection
92.
Suicidal ideation detection
93.
synchronous detection
94.
tyre detection
95.
unmanned aerial vehicle detection systems
96.
unsupervised outlier detection
97.
UV detection
98.
vehicle detection
99.
vortex detection
100.
3D lane detection
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT