Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Advancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media

    Dunya Ahmed Alkurdi1,2,*, Mesut Cevik2, Abdurrahim Akgundogdu3

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4285-4305, 2024, DOI:10.32604/cmc.2024.057029 - 19 December 2024

    Abstract Deepfake has emerged as an obstinate challenge in a world dominated by light. Here, the authors introduce a new deepfake detection method based on Xception architecture. The model is tested exhaustively with millions of frames and diverse video clips; accuracy levels as high as 99.65% are reported. These are the main reasons for such high efficacy: superior feature extraction capabilities and stable training mechanisms, such as early stopping, characterizing the Xception model. The methodology applied is also more advanced when it comes to data preprocessing steps, making use of state-of-the-art techniques applied to ensure constant… More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614 - 09 February 2022

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux More >

Displaying 1-10 on page 1 of 2. Per Page