IEEE.org
IEEE Xplore Digital Library
IEEE Standards Association
IEEE Spectrum Online
More IEEE Sites
IEEE.org
More IEEE Sites
131 resources related to
Information Integrity
Read more
Featured Article
Read more
Related topics
Fake News
Top Videos on Information Integrity
Texception: A Character/Word-Level Deep Learning Model For Phishing Url Detection
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Advanced Package Technologies and their Reliability Challenges
Keith Moore, PE - Candidate, IEEE-USA President-Elect 2021
Health & Human Well-Being | Session 3: Engagement Opportunities & Policy Debate Roundtable | IEEE TechEthics & UN-DESA
Ethics, Labor and Democracy: Designing Impactful Tech for an Actively Inclusive Society
Mind/Brain Research and AI Development: How Do They Inform Each Other? - IEEE TechEthics Panel
More links
Xplore Articles related to Information Integrity
Fake news is not 'news' - it's manipulative disinformation
Food for Thought: Fighting Fake News and Online Disinformation
Alternative news: From russia with lies: An E&T investigation into online disinformation campaigns that seek to undermine the truth about the spread of the Covid-19 coronavirus suggests fake news will continue to emerge from Russia even without the Kremlin's backing
Can you believe your eyes? ‘Deepfake’ technology is racing towards realism. But what can we do when fakes are accepted as true and reality is dismissed as false?
Keynote 8
EfficientNets for DeepFake Detection: Comparison of Pretrained Models
A Unified Framework for High Fidelity Face Swap and Expression Reenactment
FakeLocator: Robust Localization of GAN-Based Face Manipulations
Synthetic Data: How AI Is Transitioning From Data Consumer to Data Producer... and Why That's Important
Fighting Deepfake by Residual Noise Using Convolutional Neural Networks
More links
E-books related to Information Integrity
Protocols
Applications
Cryptography
Authentication
Cryptanalysis
Editor's Biography
Cryptanalysis: A Survey of Recent Results
Index
An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789.
The First Ten Years of Public Key Cryptology
More links
Courses related to Information Integrity
Security of Information and Communication Networks Part 1
More links
Most published Xplore authors for Information Integrity
Vladimir Barannik
Yurij Ryabukha
Andrej Krasnorutskyy
More links