04756oam 2200889 450 991078680480332120230120124745.00-8232-6329-00-8232-6648-60-8232-6331-20-8232-6332-010.1515/9780823263318(CKB)3710000000224270(EBL)3239923(SSID)ssj0001352656(PQKBManifestationID)12537031(PQKBTitleCode)TC0001352656(PQKBWorkID)11313315(PQKB)10657574(StDuBDS)EDZ0001111273(OCoLC)891381746(MdBmJHUP)muse37912(DE-B1597)555260(DE-B1597)9780823263318(Au-PeEL)EBL3239923(CaPaEBR)ebr10913495(CaONFJC)MIL671356(OCoLC)898120490(OCoLC)958500757(Au-PeEL)EBL1884019(MiAaPQ)EBC3239923(MiAaPQ)EBC4803900(MiAaPQ)EBC6166644(MiAaPQ)EBC6396004(MiAaPQ)EBC1884019(dli)HEB32908(MiU) MIU01100000000000000000411(EXLCZ)99371000000022427020210514d2015 uy 0engur|nu---|u||utxtccrThe end of the world and other teachable moments Jacques Derrida's final seminar /Michael NaasFirst edition.New York :Fordham University Press,[2015]©20151 online resource (231 p.)Perspectives in Continental PhilosophyIncludes index.1-322-40074-1 0-8232-6328-2 Includes bibliographical references and index.Front matter --Contents --Abbreviations of Works by Jacques Derrida --Introduction: Derrida’s Other Corpus --1. Derrida’s Flair (For the Animals to Follow . . . ) --2. “If you could take just two books . . .” --3. To Die a Living Death --4. Reinventing the Wheel --5. Pray Tell --6. Derrida’s Preoccupation with the Archive --7. “World, Finitude, Solitude” --Conclusion: Désormais --Notes --IndexThe End of the World and Other Teachable Moments follows the remarkable itinerary of Jacques Derrida’s final seminar, “The Beast and the Sovereign” (2001–3), as the explicit themes of the seminar—namely, sovereignty and the question of the animal—come to be supplemented and interrupted by questions of death, mourning, survival, the archive, and, especially, the end of the world. The book begins with Derrida’s analyses, in the first year of the seminar, of the question of the animal in the context of his other published works on the same subject. It then follows Derrida through the second year of the seminar, presented in Paris from December 2002 to March 2003, as a very different tone begins to make itself heard, one that wavers between melancholy and an extraordinary lucidity with regard to the end. Focusing the entire year on just two works, Daniel Defoe’s Robinson Crusoe and Martin Heidegger’s seminar of 1929–30, “The Fundamental Concepts of Metaphysics,” the seminar comes to be dominated by questions of the end of the world and of an originary violence that at once gives rise to and effaces all things. The End of the World and Other Teachable Moments follows Derrida as he responds from week to week to these emerging questions, as well as to important events unfolding around him, both world events—the aftermath of 9/11, the American invasion of Iraq—and more personal ones, from the death of Maurice Blanchot to intimations of his own death less than two years away. All this, the book concludes, makes this final seminar an absolutely unique work in Derrida’s corpus, one that both speaks of death as the end of the world and itself now testifies to that end—just one, though hardly the least, of its many teachable moments.Perspectives in continental philosophy.Jacques Derrida's final seminarPhilosophyAnimality.Death.Deconstruction.Jacques Derrida.Martin Heidegger.Mourning.Sovereignty.World.Philosophy.100Naas Michael689709MiAaPQMiAaPQUtOrBLWBOOK9910786804803321The end of the world and other teachable moments3795634UNINA05286nam 22007215 450 991084229840332120251113175207.03-031-49803-810.1007/978-3-031-49803-9(CKB)30764024900041(MiAaPQ)EBC31200922(Au-PeEL)EBL31200922(DE-He213)978-3-031-49803-9(EXLCZ)993076402490004120240304d2024 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdversarial Multimedia Forensics /edited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (298 pages)Advances in Information Security,2512-2193 ;1043-031-49802-X Includes bibliographical references and index.Chapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection’s Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection.This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book’s content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs. The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy. Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource.Advances in Information Security,2512-2193 ;104Machine learningImage processingDigital techniquesComputer visionComputer crimesSignal processingArtificial intelligenceMachine LearningComputer Imaging, Vision, Pattern Recognition and GraphicsComputer CrimeSignal, Speech and Image ProcessingArtificial IntelligenceMachine learning.Image processingDigital techniques.Computer vision.Computer crimes.Signal processing.Artificial intelligence.Machine Learning.Computer Imaging, Vision, Pattern Recognition and Graphics.Computer Crime.Signal, Speech and Image Processing.Artificial Intelligence.005.8Nowroozi EhsanKallas KassemJolfaei AlirezaMiAaPQMiAaPQMiAaPQBOOK9910842298403321Adversarial Multimedia Forensics4145607UNINA