2016 | 2017 | 2018 | 2019 | 2020 | 2021 | ||
---|---|---|---|---|---|---|---|
(A) Protecting the privacy, biological, and environmental information |
Face, body, environment Finger print Interest
Social Media [C5] Others [C9, C10, C11] [J3, J4] |
[C29] [C24] [C13]
[C25] [C26, J6] |
[C46] [J9]
Voice
[J12] |
[C74, C76] [J21]
[J19, J20] [C68]
[C63] |
[C95]
|
Face, body, environment Finger print Interest Voice Social Media Others |
(A) Protecting the privacy, biological, and environmental information |
(B) Verification of the capability of generating various types of media clones |
Face, body Text Voice [C3, C4, C6, C7, C8] Social Media |
[C15, C16, C22] [C17, C18] |
[C39] [C41] [C31, C32, C33, C35, C37, C38, C43, C48, C51] [J10, J13, J14] [J11] |
[C58, C73] [J28] [C67] [C56 - C61, C65 - C67, C69, C70, C72, C78] [J16, J23, J26] [C77] [J18] |
[C83, C98] [J29]
[C80 - C82, C85 - C94] [J31, J33, J34] [C79, J30] |
[C101] Face, body Text [C99, C100] [J37] Voice [C85] Scial Media |
(B) Verification of the capability of generating various types of media clones |
(C) Realization of a protection shield for media clones' attacks |
Face, body, environment Text Voice [C1] [J1, J2] Social Media [C5] Others [C2, C12] |
[C28] [C19, C27] [C14, C20, C21] [J5] [J8] [C23] [J7] |
[C47] [C34, C36, C42]
[C50] |
[C64] [J22, J28] [C75] [C55, C71]
[C54, C62] [J24, J25, J27] |
[C96]
[C97] |
Face, body, environment Text Voice Social Media Others |
(C) Realization of a protection shield for media clones' attacks |
(D) Modeling of communication system |
|
Deception |
[C30, C44] |
[C52, C53] [J17] |
[J32] |
Deception |
(D) Modeling of communication system |
(E) Overview |
Invited Talks & Papers [I1, I2] Patents
|
[I3-I9] [P1, P2],
|
[I10-I14]
Database [**] |
[I15-I25]
|
[I26 - I29]
|
[J35, J36] Invited Talks & Papers Patents Database |
(E) Overview |