Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Defending deepfake detector against data poisoning attacks

View through CrossRef
[EMBARGOED UNTIL 12/1/2023] With the ability of generating high quality fake images using deep neural networks, fake image detection techniques have become more and more important to serve as the guard that prevents misinformation from spreading online. However, just like other AI models, fake image detectors also face machine learning attacks that could compromise their effectiveness in filtering out fake images. In this work, we focus on defending the data poisoning attacks on DNN-based fake image detectors in which attackers attempt to fool the fake image detectors by mislabeling fake images used for training. We design a novel protector model that is capable of distinguishing such poisoned fake images from correctly labeled images. A key advantage of our model is that it is able to identify new types of poisoned fake images that it has not seen before. We have conducted extensive experimental studies which demonstrate the high detection accuracy and recall of our model.
University of Missouri Libraries
Title: Defending deepfake detector against data poisoning attacks
Description:
[EMBARGOED UNTIL 12/1/2023] With the ability of generating high quality fake images using deep neural networks, fake image detection techniques have become more and more important to serve as the guard that prevents misinformation from spreading online.
However, just like other AI models, fake image detectors also face machine learning attacks that could compromise their effectiveness in filtering out fake images.
In this work, we focus on defending the data poisoning attacks on DNN-based fake image detectors in which attackers attempt to fool the fake image detectors by mislabeling fake images used for training.
We design a novel protector model that is capable of distinguishing such poisoned fake images from correctly labeled images.
A key advantage of our model is that it is able to identify new types of poisoned fake images that it has not seen before.
We have conducted extensive experimental studies which demonstrate the high detection accuracy and recall of our model.

Related Results

Evaluating the Threshold of Authenticity in Deepfake Audio and Its Implications Within Criminal Justice
Evaluating the Threshold of Authenticity in Deepfake Audio and Its Implications Within Criminal Justice
Deepfake technology has come a long way in recent years and the world has already seen cases where it has been used maliciously. After a deepfake of UK independent financial adviso...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
Abnormal Brain Functional Network Dynamics in Acute CO Poisoning
Abnormal Brain Functional Network Dynamics in Acute CO Poisoning
Aims: Carbon monoxide poisoning is a common condition that can cause severe neurological sequelae. Previous studies have revealed that functional connectivity in carbon monoxide po...
Deepfake Detection with Choquet Fuzzy Integral
Deepfake Detection with Choquet Fuzzy Integral
Deep forgery has been spreading quite quickly in recent years and continues to develop. The development of deep forgery has been used in films. This development and spread have beg...
How Frequency and Harmonic Profiling of a ‘Voice’ Can Inform Authentication of Deepfake Audio: An Efficiency Investigation
How Frequency and Harmonic Profiling of a ‘Voice’ Can Inform Authentication of Deepfake Audio: An Efficiency Investigation
As life in the digital era becomes more complex, the capacity for criminal activity within the digital realm becomes even more widespread. More recently, the development of deepfak...
A New Deepfake Detection Method Based on Compound Scaling Dual-Stream Attention Network
A New Deepfake Detection Method Based on Compound Scaling Dual-Stream Attention Network
INTRODUCTION: Deepfake technology allows for the overlaying of existing images or videos onto target images or videos. The misuse of this technology has led to increasing complexit...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

Back to Top