No abstract available.
Proceeding Downloads
Honeyfile Camouflage: Hiding Fake Files in Plain Sight
Honeyfiles are a particularly useful type of honeypot—fake files deployed to detect and infer information from malicious behaviour. This paper considers the challenge of naming honeyfiles so they are camouflaged when placed amongst real files in a file ...
Towards Generalized Detection of Face-Swap Deepfake Images
As the prevalence of face-swap deepfakes on the Internet continues to rapidly increase, it is imperative for social media platforms to utilise a robust detection algorithm to identify these fake images in order to minimise the risk of harm from ...
On the Correlation Between Deepfake Detection Performance and Image Quality Metrics
The increase in cybercrimes leveraging high-quality deepfakes has complicated the task of deepfake detection. Benchmark datasets are crucial for testing the effectiveness of deepfake detection methods, yet it is uncertain if the image quality metrics ...
Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat
Large Language Models (LLMs) have enabled powerful new AI capabilities, but their potential misuse for automating scams and fraud poses a serious emerging threat. In this paper, we investigate how LLMs combined with speech synthesis and speech ...
A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and Their Detection
With the rise of artificial intelligence (AI) in recent years, AI has not only become more accessible to the general public but also presents new challenges. Images, videos, and audio can now be easily created or altered using deepfakes, making them a ...