Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
2 results
Search Results
Item A hybrid model of convo-GAN to detect fake images(Grenze Scientific Society, 2021) Saha, S.; Rudra, B.With advancements in the field of Deep Learning, it has become easy to generate face swaps, thereby creating fake images which look extremely realistic, leaving few traces which cannot be detected by bare human eyes. Such images are known as ‘DeepFakes’ that can be used to create a ruckus and affect the quality of public discourse on sensitive issues, defame an individual’s profile, create political distress, blackmail a person or envision fake cyber terrorists. This paper proposes methods to detect fake images with the help of hybrid models having Convolutional Neural Network with Error Level Analysis, Gated Recurrent Unit neural network, Long Short Term Memory recurrent neural network and Generative Adversarial Network respectively. The 2019 ‘Real and Fake Face Detection’ dataset from Kaggle [7] is used to train the models and by experimentation we are able to prove that the combined model of Convolutional Neural Network and Generative Adversarial Network outperforms other models. © Grenze Scientific Society, 2021.Item Function Scheduling with Data Security in Serverless Computing Systems(Institute of Electrical and Electronics Engineers Inc., 2025) Saha, S.; Pandey, A.; Addya, S.K.; Brata Nath, S.In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these challenges, we have proposed a system to secure the data of an end-user. We also aim to meet the quality of service (QoS) for the end-user requests. This work presents a Simulated Annealing-based optimization algorithm for function placement. Also, we have Hyperledger Fabric, a blockchain framework in the system architecture for securing the data of an end-user. We have conducted experiments in Amazon Elastic Compute Cloud (EC2) taking virtual machine instances. The experiments in Amazon EC2 indicate that the proposed system secures the data and enhances the end-user's QoS. © 2025 IEEE.
