Survey on adversarial attacks and defense of face forgery and detection
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it i...
| Published in: | 网络与信息安全学报 |
|---|---|
| Main Author: | Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO |
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2023-08-01
|
| Subjects: | |
| Online Access: | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023049 |
Similar Items
Survey on adversarial attacks and defense of face forgery and detection
by: Shiyu HUANG, et al.
Published: (2023-08-01)
by: Shiyu HUANG, et al.
Published: (2023-08-01)
Deepfake-Image Anti-Forensics with Adversarial Examples Attacks
by: Li Fan, et al.
Published: (2021-11-01)
by: Li Fan, et al.
Published: (2021-11-01)
Deepfake swapped face detection based on double attention
by: Xiaojuan GONG, et al.
Published: (2021-04-01)
by: Xiaojuan GONG, et al.
Published: (2021-04-01)
Deepfake swapped face detection based on double attention
by: GONG Xiaojuan, HUANG Tianqiang, WENG Bin, YE Feng, XU Chao, et al.
Published: (2021-04-01)
by: GONG Xiaojuan, HUANG Tianqiang, WENG Bin, YE Feng, XU Chao, et al.
Published: (2021-04-01)
AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks
by: Hong Huang, et al.
Published: (2025-06-01)
by: Hong Huang, et al.
Published: (2025-06-01)
Multi-Feature Fusion Based Deepfake Face Forgery Video Detection
by: Zhimao Lai, et al.
Published: (2022-03-01)
by: Zhimao Lai, et al.
Published: (2022-03-01)
Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)
by: Ximeng LIU, et al.
Published: (2020-10-01)
Adversarial attacks and defenses in deep learning
by: LIU Ximeng, et al.
Published: (2020-10-01)
by: LIU Ximeng, et al.
Published: (2020-10-01)
Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
by: Samer Y. Khamaiseh, et al.
Published: (2022-01-01)
by: Samer Y. Khamaiseh, et al.
Published: (2022-01-01)
Face Swap Detection: A Systematic Literature Review
by: Safaa Hriez
Published: (2025-01-01)
by: Safaa Hriez
Published: (2025-01-01)
Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview
by: Xiaojiao Chen, et al.
Published: (2021-09-01)
by: Xiaojiao Chen, et al.
Published: (2021-09-01)
Survey of Image Adversarial Example Defense Techniques
by: LIU Ruiqi, LI Hu, WANG Dongxia, ZHAO Chongyang, LI Boyu
Published: (2023-12-01)
by: LIU Ruiqi, LI Hu, WANG Dongxia, ZHAO Chongyang, LI Boyu
Published: (2023-12-01)
Deepfakes Generation and Detection: A Short Survey
by: Zahid Akhtar
Published: (2023-01-01)
by: Zahid Akhtar
Published: (2023-01-01)
MagNet: Detecting Digital Presentation Attacks on Face Recognition
by: Akshay Agarwal, et al.
Published: (2021-12-01)
by: Akshay Agarwal, et al.
Published: (2021-12-01)
Gender forgery of faces by fusing wavelet shortcut connection generative adversarial network
by: Wanze CHEN, et al.
Published: (2023-06-01)
by: Wanze CHEN, et al.
Published: (2023-06-01)
Gender forgery of faces by fusing wavelet shortcut connection generative adversarial network
by: Wanze CHEN, Liqing HUANG, Jiazhen CHEN, Feng YE, Tianqiang HUANG, Haifeng LUO
Published: (2023-06-01)
by: Wanze CHEN, Liqing HUANG, Jiazhen CHEN, Feng YE, Tianqiang HUANG, Haifeng LUO
Published: (2023-06-01)
Lip forgery detection via spatial-frequency domain combination
by: Jiaying LIN, et al.
Published: (2022-12-01)
by: Jiaying LIN, et al.
Published: (2022-12-01)
Survey on Generalization Methods of Face Forgery Detection
by: DONG Lin, HUANG Li-qing, YE Feng, HUANG Tian-qiang, WENG Bin, XU Chao
Published: (2022-02-01)
by: DONG Lin, HUANG Li-qing, YE Feng, HUANG Tian-qiang, WENG Bin, XU Chao
Published: (2022-02-01)
Deepfake Face Detection and Adversarial Attack Defense Method Based on Multi-Feature Decision Fusion
by: Shanzhong Lei, et al.
Published: (2025-06-01)
by: Shanzhong Lei, et al.
Published: (2025-06-01)
Moving target defense against adversarial attacks
by: Bin WANG, et al.
Published: (2021-02-01)
by: Bin WANG, et al.
Published: (2021-02-01)
A survey of practical adversarial example attacks
by: Lu Sun, et al.
Published: (2018-09-01)
by: Lu Sun, et al.
Published: (2018-09-01)
Face Forgery Detection and Attribution via Prototype Disentanglement
by: QIAN Fei, LI Wei, CHEN Peng, CHEN Haoran, XIE Lipeng, LIU Liyuan
Published: (2025-02-01)
by: QIAN Fei, LI Wei, CHEN Peng, CHEN Haoran, XIE Lipeng, LIU Liyuan
Published: (2025-02-01)
Just Dance: detection of human body reenactment fake videos
by: Omran Alamayreh, et al.
Published: (2024-08-01)
by: Omran Alamayreh, et al.
Published: (2024-08-01)
Semantic Adversarial Attacks on Face Recognition Through Significant Attributes
by: Yasmeen M. Khedr, et al.
Published: (2023-12-01)
by: Yasmeen M. Khedr, et al.
Published: (2023-12-01)
A Momentum-Based Local Face Adversarial Example Generation Algorithm
by: Dapeng Lang, et al.
Published: (2022-12-01)
by: Dapeng Lang, et al.
Published: (2022-12-01)
A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies
by: Sohair Kilany, et al.
Published: (2025-08-01)
by: Sohair Kilany, et al.
Published: (2025-08-01)
The Framework of Cross-Domain and Model Adversarial Attack against Deepfake
by: Haoxuan Qiu, et al.
Published: (2022-01-01)
by: Haoxuan Qiu, et al.
Published: (2022-01-01)
Research on the Face Forgery Detection Model Based on Adversarial Training and Disentanglement
by: Yidi Wang, et al.
Published: (2024-05-01)
by: Yidi Wang, et al.
Published: (2024-05-01)
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01)
by: Haoran Lyu, et al.
Published: (2024-03-01)
DeepFake on Face and Expression Swap: A Review
by: Saima Waseem, et al.
Published: (2023-01-01)
by: Saima Waseem, et al.
Published: (2023-01-01)
Adversarial patch defense algorithm based on PatchTracker
by: Zhenjie XIAO, et al.
Published: (2024-02-01)
by: Zhenjie XIAO, et al.
Published: (2024-02-01)
Adversarial patch defense algorithm based on PatchTracker
by: Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG
Published: (2024-02-01)
by: Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG
Published: (2024-02-01)
A Defense Method Against FGSM Adversarial Attack
by: WANG Xiaopeng, LUO Wei, QIN Ke, YANG Jintao, WANG Min
Published: (2021-11-01)
by: WANG Xiaopeng, LUO Wei, QIN Ke, YANG Jintao, WANG Min
Published: (2021-11-01)
Exposing Face Manipulation Based on Generative Adversarial Network–Transformer and Fake Frequency Noise Traces
by: Qiaoyue Man, et al.
Published: (2025-02-01)
by: Qiaoyue Man, et al.
Published: (2025-02-01)
Enhancing the robustness of vision transformer defense against adversarial attacks based on squeeze-and-excitation module
by: YouKang Chang, et al.
Published: (2023-01-01)
by: YouKang Chang, et al.
Published: (2023-01-01)
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01)
by: Sanglee Park, et al.
Published: (2020-11-01)
Adversarial Attacks to Manipulate Target Localization of Object Detector
by: Kai Xu, et al.
Published: (2024-01-01)
by: Kai Xu, et al.
Published: (2024-01-01)
Multi-attention-based approach for deepfake face and expression swap detection and localization
by: Saima Waseem, et al.
Published: (2023-08-01)
by: Saima Waseem, et al.
Published: (2023-08-01)
Similar Items
-
Survey on adversarial attacks and defense of face forgery and detection
by: Shiyu HUANG, et al.
Published: (2023-08-01) -
Deepfake-Image Anti-Forensics with Adversarial Examples Attacks
by: Li Fan, et al.
Published: (2021-11-01) -
Deepfake swapped face detection based on double attention
by: Xiaojuan GONG, et al.
Published: (2021-04-01) -
Deepfake swapped face detection based on double attention
by: GONG Xiaojuan, HUANG Tianqiang, WENG Bin, YE Feng, XU Chao, et al.
Published: (2021-04-01) -
AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks
by: Hong Huang, et al.
Published: (2025-06-01)
