Author of the publication

Detecting Deepfake Modifications of Biometric Images using Neural Networks (short paper).

, , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 391-397. CEUR-WS.org, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yevseiev, Serhii
add a person with the name Yevseiev, Serhii
 

Other publications of authors with the same name

Evaluation of Cryptographic Strength and Energy Intensity of Design of Modified Crypto-Code Structure of McEliece with Modified Elliptic Codes., , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 135-148. CEUR-WS.org, (2021)Security Analysis Models for Multimedia Information Resources in Social Networks (short paper)., , , , and . CPITS I, volume 2923 of CEUR Workshop Proceedings, page 60-67. CEUR-WS.org, (2021)Development of a Method for Detecting Deviations in the Nature of Traffic from the Elements of the Communication Network., , , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 1-9. CEUR-WS.org, (2021)Detecting Deepfake Modifications of Biometric Images using Neural Networks (short paper)., , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 391-397. CEUR-WS.org, (2024)Detection Of Intrusion Attacks Using Neural Networks., , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 107-114. CEUR-WS.org, (2021)Model of the System for Special Purpose of Critical Infrastructure Objects., , , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 97-106. CEUR-WS.org, (2021)Critical Points of Information Influence in Social Networks., , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 122-127. CEUR-WS.org, (2021)Cyber Terrorism as an Object of Modeling., , , , and . ISecIT, volume 3200 of CEUR Workshop Proceedings, page 204-210. CEUR-WS.org, (2021)The method of discretization signals to minimize the fallibility of information recovery., , , , , , and . Int. J. Commun. Networks Inf. Secur., (December 2021)Development of Methods for Improving Crypto Transformations in the Block-Symmetric Code., , , , , , and . IDAACS-SWS, page 1-9. IEEE, (2020)