Overview

The development of techniques for creating completely synthetic photographic images, videos and audio sequences, as well as the increasing prevalence of disinformation associated with such synthetic media, has sparked an interest in the computer community. One such issue is the proliferation of deepfakes. However, much of the research is devoted to outwitting the state-of-the-art in order to generate and detect fabricated images and videos. Considering them from the perspective of computer security and human ethics is largely ignored. As such, this workshop aims to provide a forum for researchers to exchange ideas and methodologies, as well as to provide academia and industry with insights into the development and identification of fake media from a computer security perspective.

Topics

We invite submissions of contributions on topics related to deepfakes, disinformation, and deception. The scope of the workshop includes, but is not limited to, the following areas:

Deepfake Topics

❖ Novel Generation Techniques

❖ Detection and Classification

❖ Deepfake Attribution

❖ Multimodal Deepfakes

❖ Deepfake Forensics

❖ Deepfake Impact Assessment

❖ Mitigation Strategies

❖ Deepfake Policy and Regulation

❖ Practical Attacks

❖ Realistic Threat Models

❖ Defense Strategies

❖ Multimodal Fake Media Detection

❖ Deepfake Activity Detection

❖ Deepfakes & Adversarial Attacks

❖ Robustness of Detectors

❖ Deepfakes in the Metaverse

❖ Fairness and Bias of Detectors

❖ Explainability & Interpretability

❖ Ethics in Audio & Video Synthesis

Disinformation Topics

❖ Disinformation Campaign Analysis

❖ Human Factors in Fake Media

❖ Detection of Disinformation

❖ Disinformation Impact Assessment

❖ Disinformation Attribution

❖ Disinformation Spread and Virality

❖ Countering Disinformation

❖ Ethical Considerations

Deception Topics

❖ Deception for Good

❖ Deep Learning for Deception

❖ Metrics to Measure the Impact of Deception

❖ Deceptive Content Detection

❖ Psychological Aspects of Deception

❖ Deceptive User Interfaces

❖ Deceptive AI and Chatbots

❖ Deceptive Social Engineering

Other Common Topics

❖ Empirical Measurements

❖ Differential Privacy

❖ Digital Watermarking Techniques & Security Issues

❖ Systematisation of Knowledge

❖ Content Provenance & Authenticity Frameworks

❖ Human-in-the-loop Solutions

❖ Adversarial Attacks & Defenses