Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Haar wavelet
biblio
Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
generated face
Blur inconsistency
blur inconsistency detection scheme
DeepFake detection method
DeepFake generation algorithms
DeepFake videos
distortion
exclusive blur inconsistency
face images
face region
fake face
DeepFake
Generative Adversarial Networks GANs
Haar transforms
Haar wavelet
Haar wavelet transform
high-quality fake videos
realistic manner
source video
surrounding context
Wavelet domain
Gallium nitride
Human behavior
Human Factors
Metrics
Resiliency
Scalability
neural nets
resilience
face recognition
feature extraction
pubcrawl
Image edge detection
gan
object detection
generative adversarial networks
Face
Videos
wavelet transforms
video signal processing
detection rate
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection