Joslin, 2024 - Google Patents
Systematic Methods to Analyze and Recognize Illicit Information ManipulationJoslin, 2024
View PDF- Document ID
- 7014178102466057538
- Author
- Joslin M
- Publication year
External Links
Snippet
Improvements in AI-synthesized content present challenges and opportunities for improving the quality and integrity of online information sources. Users increasingly depend on online information sources such as search engines or photos. This work examines three …
- 238000000034 method 0 title abstract description 119
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tramèr et al. | Adversarial: Perceptual ad blocking meets adversarial machine learning | |
| Chen et al. | Detecting visually similar web pages: Application to phishing detection | |
| Ghiurău et al. | Distinguishing reality from AI: approaches for detecting synthetic content | |
| Yang et al. | Scalable detection of promotional website defacements in black hat {SEO} campaigns | |
| Lago et al. | Visual and textual analysis for image trustworthiness assessment within online news | |
| Wu et al. | Price tag: towards semi-automatically discovery tactics, techniques and procedures of e-commerce cyber threat intelligence | |
| Wang et al. | Validating multimedia content moderation software via semantic fusion | |
| Oh et al. | Uniguard: Towards universal safety guardrails for jailbreak attacks on multimodal large language models | |
| Sunil et al. | Exploring autonomous methods for deepfake detection: A detailed survey on techniques and evaluation | |
| Kulkarni et al. | From ml to llm: Evaluating the robustness of phishing webpage detection models against adversarial attacks | |
| Li et al. | The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking | |
| Hao et al. | It doesn't look like anything to me: using diffusion model to subvert visual phishing detectors | |
| Bajaj et al. | Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms | |
| Banerjee et al. | A survey: Deepfake and current technologies for solutions | |
| Liu et al. | Evaluating LLM-based Personal Information Extraction and Countermeasures | |
| Tanniru et al. | Online Fake Logo Detection System | |
| Vekaria et al. | Before Blue Birds Became X-tinct: Understanding the Effect of Regime Change on Twitter's Advertising and Compliance of Advertising Policies | |
| Joslin et al. | Double Face: Leveraging User Intelligence to Characterize and Recognize {AI-synthesized} Faces | |
| Khimi et al. | A Systematic Review on Deep Fake Image Generation Detection Techniques Ethical Implications and Overcoming Challenges | |
| Joslin | Systematic Methods to Analyze and Recognize Illicit Information Manipulation | |
| US20220377108A1 (en) | Method and device for clustering phishing web resources based on visual content image | |
| Jiang et al. | Never compromise to vulnerabilities: A comprehensive survey on ai governance | |
| Tang et al. | Understanding major topics and attitudes toward deepfakes: An analysis of news articles | |
| Roshanbin | Interweaving unicode, color, and human interactions to enhance CAPTCHA security | |
| Kumar et al. | Peeping into the Future: Understanding and Combating Generative AI-Based Fake News |