Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks

نویسندگان

چکیده

In the last few years, we have witnessed an explosive growth of fake content on Internet which has significantly affected veracity information many social platforms. Much this disruption been caused by proliferation advanced machine and deep learning methods. turn, platforms using same technological methods in order to detect content. However, there is understanding strengths weaknesses these detection article, describe examples approaches that can be used different types We also discuss characteristics potential for adversarial attacks could reduce accuracy detection. Finally, identify some future research challenges area.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CBR: Strengths and Weaknesses

There is considerable enthusiasm about Case-Based Reasoning as a means of developing knowledge-based systems. There are two broad reasons for this enthusiasm. First, it is evident that much of human expert competence is experience based and it makes sense to adopt a reuse-based methodology for developing knowledge based systems. The other reason is the expectation that using Case-Based Reasonin...

متن کامل

Comparing Strengths and Weaknesses of Learning Theories

Introduction: Medical education is changing. Therefore, teachers need to evaluate their performance and try to maximize learning. Learning theories can provide insight in this important issue. This study aimed to review the strengths and weaknesses of learning theories including behavioral, cognitive and humanistic theories. Methods: In this study, some literatures related to learning theories...

متن کامل

Paper's Strengths / Weaknesses

This paper proposes a heterogeneous multi-core architecture where all of the cores share a single Instruction Set Architecture (ISA). The design is characterized by each of the heterogeneous cores representing a different point in the power/performance design space. They demonstrate, through modeling, that this is an effective mechanism to reduce power dissipation by means of dynamically switch...

متن کامل

Ceremony Analysis: Strengths and Weaknesses

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better underst...

متن کامل

Content Rating and Fake Detection system

We present here the web-interface we designed and implemented to make it easier to access our data on P2P activity. In particular, this interface makes it browsable by browsing from files to related users, and conversely. Moreover, we include in this interface richer information which we precompute, like lists of files of interest for a given user, list of users providing a given file, list of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet Computing

سال: 2021

ISSN: ['1089-7801', '1941-0131']

DOI: https://doi.org/10.1109/mic.2020.3032323