Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/107)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
107
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
aspect detection
18.
asynchronous fault detection
19.
attack detection
20.
barotrauma detection system
21.
body detection
22.
botnet detection
23.
capacitively coupled conductivity detection
24.
change detection
25.
chemical detection
26.
community detection
27.
compu ter-aided detection(CAD)
28.
computer-aided detection
29.
computer‐aided detection
30.
contactless conductivity detection
31.
contactless conductivity detection (C4D)
32.
crash detection
33.
cyber intrusion detection
34.
defect detection
35.
detection
36.
detection efficiency
37.
detection engineering
38.
detection of anomalous end user nodes
39.
detection of hydrogen isotopes
40.
distributed detection
41.
early detection
42.
early intrusion detection
43.
energy detection
44.
error detection
45.
ESI-MS and IM detection
46.
Event detection
47.
extraction and detection methods
48.
failure detection
49.
fall detection
50.
fault detection
51.
fault detection and diagnoses
52.
fault detection and diagnosis
53.
Fish detection
54.
fouling detection
55.
hepatitis C virus (HCV) detection
56.
hubs detection
57.
IED detection
58.
indicident detection and response
59.
indirect UV absorbance detection
60.
intrusion detection
61.
intrusion detection system (IDS)
62.
intrusion detection systems
63.
island detection
64.
islanding detection
65.
label-free detection
66.
LED fluorescence detection
67.
leg detection
68.
light detection and ranging
69.
Light Detection and Ranging (LiDAR) point cloud
70.
limit of detection
71.
lock-in detection
72.
loop-closure detection
73.
malware detection
74.
marker detection
75.
mobile malware detection
76.
money laundering detection systems
77.
monitoring and detection
78.
multi-classed object detection
79.
mutant detection
80.
network anomaly detection
81.
nodules detection
82.
object detection
83.
oil-spill detection
84.
outlier’s detection methods
85.
outliers detection
86.
peak detection
87.
plagiarism detection
88.
position detection
89.
protein detection
90.
proton detection
91.
radar detection
92.
ramp event detection
93.
recycled FPGA detection
94.
robust detection
95.
scene text detection
96.
short-circuit detection
97.
small molecule detection
98.
speech activity detection
99.
Suicidal ideation detection
100.
synchronous detection
101.
tyre detection
102.
unmanned aerial vehicle detection systems
103.
unsupervised outlier detection
104.
UV detection
105.
vehicle detection
106.
vortex detection
107.
3D lane detection
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT