نتایج جستجو برای: fake

تعداد نتایج: 5746  

2015
Rashmi M. Mhatre Deeksha Bhardwaj

The classification of the iris image under the fake or real and also adding security to it by encrypting it provides double the security. Iris recognition system can undergo the security attacks which can result into the fraudulent identity authentication. The attacker therefore will try to develop the methods which will spoof the iris biometrics. Therefore it becomes difficult to develop the r...

2013
Justin Chiu Ajda Gokcen Wenyi Wang Xiaohua Yan

Fake or real? That is the question, even in the context of languages. In this course project, we are given the task of distinguishing real Broadcast News articles from fake “articles” generated by a trigram model trained from the 100 million word corpus of Broadcast News articles from 1992–1996. This task is clearly not difficult for humans, while machines are not as smart as us to tell whether...

Journal: :CoRR 2016
Pingzhong Tang Yulong Zeng

In the standard formulation of mechanism design, a key assumption is that the designer has reliable information and technology to determine a prior distribution over types of the agents. In the meanwhile, as pointed out by the Wilson’s Principle, a mechanism should reply as little as possible on the accuracy of prior type distribution. In this paper, we put forward a simple model to formalize a...

2016
Chengcheng Shao Giovanni Luca Ciampaglia Alessandro Flammini Filippo Menczer

Massive amounts of misinformation have been observed to spread in uncontrolled fashion across social media. Examples include rumors, hoaxes, fake news, and conspiracy theories. At the same time, several journalistic organizations devote significant efforts to high-quality fact checking of online claims. The resulting information cascades contain instances of both accurate and inaccurate informa...

Journal: :CoRR 2013
Yuval Elovici Michael Fire Amir Herzberg Haya Shulman

Online Social Networks (OSNs) have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important and popular subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded by...

2004
Seana Coulson

Kamp (1975) defines a privative adjective as one for which, given adjective A and noun N, the claim 'No AN is a N' is necessarily true.For example, 'fake' is a privative because 'No fake gun is a gun,' is true by definition. In order to explain how 'fake' acts as a modifier, the semanticist's job has been to provide a mechanism for specifying the similarities and differences between real and fa...

Journal: :Lancet 2001
P Newton S Proux M Green F Smithuis J Rozendaal S Prakongpan K Chotivanich M Mayxay S Looareesuwan J Farrar F Nosten N J White

Artesunate is a key antimalarial drug in the treatment of multidrug-resistant Plasmodium falciparum malaria in southeast Asia. We investigated the distribution of counterfeit artesunate tablets by use of the validated, simple, and inexpensive Fast Red TR dye technique. We also aimed to identify distinguishing characteristics of the fake drugs. Of 104 shop-bought "artesunate" samples from Cambod...

2006
Anderson Rocha Siome Goldenstein

In this paper, we describe a new methodology to separate photographs and computer generated images . We introduce the Progressive Randomization (PR) technique that captures the statistical properties of each one of these classes. Using only statistical descriptors of the least significant bit (LSB) occurrences, our method already performs as well or better than some comparable existing techniqu...

2017
Guido Collina

The story of “dysplastic nevus” dates as far back as 1978 when W.H. Clark and colleagues [1] reported a group of melanocytic lesions with atypical clinical and histological features. Such melanocytic nevi were regarded as precursors of melanoma in patients with multiple nevi and/or family history of melanoma and the term of “dysplastic nevus” soon after entered the diagnostic jargon. The concep...

2011
Zahid Akhtar Giorgio Fumera Gian Luca Marcialis Fabio Roli

In spite of many advantages, multi-modal biometric recognition systems are vulnerable to spoof attacks, which can decrease their level of security. Thus, it is fundamental to understand and analyse the effects of spoof attacks and propose new methods to design robust systems against them. To this aim, we are developing a method based on simulating the fake score distributions of individual matc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید