Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/116)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
116
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
aspect detection
18.
asynchronous fault detection
19.
attack detection
20.
barotrauma detection system
21.
behaviour-based intrusion detection systems
22.
body detection
23.
botnet detection
24.
capacitively coupled conductivity detection
25.
change detection
26.
chemical detection
27.
community detection
28.
compu ter-aided detection(CAD)
29.
computer-aided detection
30.
computer‐aided detection
31.
contactless conductivity detection
32.
contactless conductivity detection (C4D)
33.
crack detection
34.
crash detection
35.
cyber intrusion detection
36.
defect detection
37.
detection
38.
detection efficiency
39.
detection engineering
40.
detection methods
41.
detection of anomalous end user nodes
42.
detection of hydrogen isotopes
43.
distributed detection
44.
early detection
45.
early intrusion detection
46.
energy detection
47.
error detection
48.
ESI-MS and IM detection
49.
Event detection
50.
extraction and detection methods
51.
failure detection
52.
fall detection
53.
fault detection
54.
fault detection and diagnoses
55.
fault detection and diagnosis
56.
Fish detection
57.
fouling detection
58.
harmonic detection
59.
hepatitis C virus (HCV) detection
60.
hubs detection
61.
IED detection
62.
image-based crack detection
63.
indicident detection and response
64.
indirect UV absorbance detection
65.
intrusion detection
66.
intrusion detection system
67.
intrusion detection system (IDS)
68.
intrusion detection systems
69.
island detection
70.
islanding detection
71.
label-free detection
72.
LED fluorescence detection
73.
leg detection
74.
light detection and ranging
75.
light detection and ranging (LiDAR)
76.
Light Detection and Ranging (LiDAR) point cloud
77.
limit of detection
78.
lock-in detection
79.
loop-closure detection
80.
malware detection
81.
marker detection
82.
mobile malware detection
83.
money laundering detection systems
84.
monitoring and detection
85.
multi-classed object detection
86.
mutant detection
87.
network anomaly detection
88.
network intrusion detection system
89.
nodules detection
90.
object detection
91.
oil-spill detection
92.
outlier’s detection methods
93.
outliers detection
94.
peak detection
95.
plagiarism detection
96.
position detection
97.
protein detection
98.
proton detection
99.
radar detection
100.
ramp event detection
101.
recycled FPGA detection
102.
residual current detection
103.
robust detection
104.
scene text detection
105.
short-circuit detection
106.
small molecule detection
107.
speech activity detection
108.
Suicidal ideation detection
109.
synchronous detection
110.
tyre detection
111.
unmanned aerial vehicle detection systems
112.
unsupervised outlier detection
113.
UV detection
114.
vehicle detection
115.
vortex detection
116.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT