No abstract available.
Proceeding Downloads
TripletViNet: Mitigating Misinformation Video Spread Across Platforms
There has been rampant propagation of fake news and misinformation videos on many platforms lately, and moderation of such content faces many challenges that must be overcome. Recent research has shown the feasibility of identifying video titles from ...
An Empirical Study of Photo Naming Conventions across Popular Social Media Platforms
Metadata analysis is a crucial aspect of image forensics, but what happens when all information about an image, including its metadata, is lost? In such situations, it is important to explore alternative methods for image analysis. Our research has ...
A Hybrid Approach for Cheapfake Detection Using Reputation Checking and End-To-End Network
In today’s era dominated by digital manipulations, the identification of Cheapfakes, especially those involving out-of-context visuals, is imperative for upholding the integrity of information dissemination and fostering trust in multimedia content. ...
Digital Signatures for Authenticating Compressed JPEG Images
We construct a digital signature scheme for images that allows the image to be compressed without invalidating the signature. More specifically, given a JPEG image signed with our signature scheme, a third party can compress the image using JPEG ...
Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer
In the digital landscape, where fake news proliferates across online platforms, it not only distorts public discourse but also paves the way for sophisticated cyber threats, particularly phishing attacks. These attacks often exploit the credibility ...
Vietnamese User Awareness Against Scams in Cyberspace: An Empirical Survey
While technological advancement brings undeniable benefits in improving the quality of daily life, it also poses some risks, such as increasing users’ exposure to scams and cyber fraud. In the realm of cyber scam prevention, enhancing user awareness is ...
Interactive Assistance in Malware Dissemination Detection and Analysis
Analysis of a complex cyber-security attack often involves a variety of tools, for each specific payload used in the attack. The information supplied by these tools must be soundly correlated to obtain a correct verdict. We propose a tool, GView, that is ...