2021 14th International Conference on Developments in eSystems Engineering (DeSE) 2021
DOI: 10.1109/dese54285.2021.9719332
|View full text |Cite
|
Sign up to set email alerts
|

Image Feature Detectors for Deepfake Image Detection Using Transfer Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
0
0
Order By: Relevance
“…CNN, LSTM, CNN-LSTM, and CNN-RNN also showed reasonable results, but their performance The results for BoderlineSMOTE explain that the CNN-DBN of [35] and KNN produced massive results as displayed in Table 4. For DL, the CNN-DBN model has the best accuracy, precision, recall, F-1, and G-mean scores of 0.873, 0.882, 0.874, 0.875, and 0.870 respectively when compared with other DL models and when we compare the results of KNN with [34], [23] and other traditional ML algorithms, there is a huge difference as KNN has better evaluation results.…”
Section: Resultsmentioning
confidence: 96%
See 1 more Smart Citation
“…CNN, LSTM, CNN-LSTM, and CNN-RNN also showed reasonable results, but their performance The results for BoderlineSMOTE explain that the CNN-DBN of [35] and KNN produced massive results as displayed in Table 4. For DL, the CNN-DBN model has the best accuracy, precision, recall, F-1, and G-mean scores of 0.873, 0.882, 0.874, 0.875, and 0.870 respectively when compared with other DL models and when we compare the results of KNN with [34], [23] and other traditional ML algorithms, there is a huge difference as KNN has better evaluation results.…”
Section: Resultsmentioning
confidence: 96%
“…The second experiment was performed on other models using four strategies: SMOTE, BorderlineSMOTE, SMOTEENN, and SMOTE-Tomek. We compared the results of [34], [23], [35], and some other models on which we have performed the experiments to compare their performance. The models were then evaluated and the results were compared by using the Multi-step cyber attack dataset.…”
Section: Resultsmentioning
confidence: 99%