{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:21:46Z","timestamp":1775578906468,"version":"3.50.1"},"publisher-location":"Cham","reference-count":69,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030585709","type":"print"},{"value":"9783030585716","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58571-6_39","type":"book-chapter","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T16:02:34Z","timestamp":1604851354000},"page":"667-684","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":336,"title":["Two-Branch Recurrent Network for Isolating Deepfakes in Videos"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0444-7646","authenticated-orcid":false,"given":"Iacopo","family":"Masi","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Killekar","sequence":"additional","affiliation":[]},{"given":"Royston Marian","family":"Mascarenhas","sequence":"additional","affiliation":[]},{"given":"Shenoy Pratik","family":"Gurudatt","sequence":"additional","affiliation":[]},{"given":"Wael","family":"AbdAlmageed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"39_CR1","unstructured":"CNN - business - when seeing is no longer believing inside the pentagon\u2019s race against deepfake videos. https:\/\/www.cnn.com\/interactive\/2019\/01\/business\/pentagons-race-against-deepfakes\/"},{"key":"39_CR2","unstructured":"DeepFaceLab. https:\/\/github.com\/iperov\/DeepFaceLab"},{"key":"39_CR3","unstructured":"DeepTrace - the antivirus of deepfakes - the state of deepfakes. https:\/\/deeptracelabs.com"},{"key":"39_CR4","unstructured":"ZAO app. https:\/\/apps.apple.com\/cn\/app\/zao\/"},{"key":"39_CR5","unstructured":"MSR Image Recognition Challenge (IRC) at ACM Multimedia 2016, July 2016"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: WIFS, pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"39_CR7","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: CVPR Workshops, June 2019"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310 (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Bulat, A., Tzimiropoulos, G.: How far are we from solving the 2D & 3D face alignment problem? (and a dataset of 230,000 3D facial landmarks). In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.116"},{"issue":"4","key":"39_CR10","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCOM.1983.1095851","volume":"31","author":"P Burt","year":"1983","unstructured":"Burt, P., Adelson, E.: The laplacian pyramid as a compact image code. IEEE Trans. Commun. 31(4), 532\u2013540 (1983)","journal-title":"IEEE Trans. Commun."},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: CVPR, pp. 1251\u20131258 (2017). http:\/\/openaccess.thecvf.com\/content_cvpr_2017\/html\/Chollet_Xception_Deep_Learning_CVPR_2017_paper.html","DOI":"10.1109\/CVPR.2017.195"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 159\u2013164 (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"39_CR13","unstructured":"Cozzolino, D., Thies, J., R\u00f6ssler, A., Riess, C., Nie\u00dfner, M., Verdoliva, L.: Forensictransfer: weakly-supervised domain adaptation for forgery detection. arXiv preprint arXiv:1812.02510 (2018)"},{"key":"39_CR14","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Ferrer, C.C.: The Deepfake Detection Challenge (DFDC) Preview Dataset. arXiv:1910.08854, October 2019. http:\/\/arxiv.org\/abs\/1910.08854, arXiv: 1910.08854"},{"issue":"10","key":"39_CR15","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2347736.2347755","volume":"55","author":"PM Domingos","year":"2012","unstructured":"Domingos, P.M.: A few useful things to know about machine learning. Commun. ACM 55(10), 78\u201387 (2012)","journal-title":"Commun. ACM"},{"key":"39_CR16","unstructured":"Dufour, N., et al.: Deepfakes detection dataset by Google and Jigsaw (2019)"},{"key":"39_CR17","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10451.001.0001","volume-title":"Photo Forensics","author":"H Farid","year":"2016","unstructured":"Farid, H.: Photo Forensics. MIT Press, Cambridge (2016)"},{"issue":"3","key":"39_CR18","first-page":"868","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. TIFS 7(3), 868\u2013882 (2012)","journal-title":"TIFS"},{"key":"39_CR19","unstructured":"Gellately, R.: Lenin, Stalin, and Hitler: The age of social catastrophe. Alfred a Knopf Incorporated (2007)"},{"key":"39_CR20","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: NIPS (2014)"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: AVSS, pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"39_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-46487-9_6","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Guo","year":"2016","unstructured":"Guo, Y., Zhang, L., Hu, Y., He, X., Gao, J.: MS-Celeb-1M: a dataset and benchmark for large-scale face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 87\u2013102. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_6"},{"key":"39_CR23","unstructured":"Han, X., Morariu, V., Larry Davis, P.I., et al.: Two-stream neural networks for tampered face detection. In: CVPR Workshops, pp. 19\u201327 (2017)"},{"key":"39_CR24","unstructured":"Heller, S., Rossetto, L., Schuldt, H.: The PS-Battles Dataset - an Image Collection for Image Manipulation Detection. CoRR abs\/1804.04866 (2018). http:\/\/arxiv.org\/abs\/1804.04866"},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: CVPR, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"39_CR26","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report, 07-49, UMass, Amherst, October 2007"},{"key":"39_CR27","doi-asserted-by":"crossref","unstructured":"Ioannou, Y., Robertson, D., Cipolla, R., Criminisi, A.: Deep roots: improving CNN efficiency with hierarchical filter groups. In: CVPR, pp. 1231\u20131240 (2017)","DOI":"10.1109\/CVPR.2017.633"},{"key":"39_CR28","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: CVPR, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"39_CR29","doi-asserted-by":"crossref","unstructured":"Kemelmacher-Shlizerman, I., Seitz, S.M., Miller, D., Brossard, E.: The MegaFace benchmark: 1 million faces for recognition at scale. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.527"},{"key":"39_CR30","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. JMLR 10, 1755\u20131758 (2009)","journal-title":"JMLR"},{"key":"39_CR31","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"39_CR32","doi-asserted-by":"crossref","unstructured":"Klare, B.F., et al.: Pushing the frontiers of unconstrained face detection and recognition: IARPA Janus Benchmark A. In: CVPR, pp. 1931\u20131939 (2015)","DOI":"10.1109\/CVPR.2015.7298803"},{"key":"39_CR33","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection. arXiv preprint arXiv:1812.08685 (2018)"},{"key":"39_CR34","doi-asserted-by":"crossref","unstructured":"Korshunov, P., Marcel, S.: Vulnerability assessment and detection of deepfake videos. In: ICB, Crete, Greece, June 2019","DOI":"10.1109\/ICB45273.2019.8987375"},{"key":"39_CR35","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: NIPS, pp. 1097\u20131105 (2012)"},{"key":"39_CR36","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.C., Lyu, S.: In ictu oculi: exposing AI created fake videos by detecting eye blinking. In: WIFS, pp. 1\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"39_CR37","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. In: CVPR Workshops, June 2019"},{"key":"39_CR38","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: CVPR, June 2020","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"39_CR39","unstructured":"Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(Nov), 2579\u20132605 (2008)"},{"key":"39_CR40","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Verdoliva, L., Poggi, G.: Do GANs leave artificial fingerprints? In: Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 506\u2013511 (2019)","DOI":"10.1109\/MIPR.2019.00103"},{"key":"39_CR41","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: WACV Workshops, pp. 83\u201392. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"issue":"3","key":"39_CR42","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1177\/0272989X8900900307","volume":"9","author":"DK McClish","year":"1989","unstructured":"McClish, D.K.: Analyzing a portion of the ROC curve. Med. Decis. Making 9(3), 190\u2013195 (1989)","journal-title":"Med. Decis. Making"},{"key":"39_CR43","doi-asserted-by":"publisher","first-page":"101027","DOI":"10.1016\/j.csl.2019.101027","volume":"60","author":"A Nagrani","year":"2020","unstructured":"Nagrani, A., Chung, J.S., Xie, W., Zisserman, A.: Voxceleb: large-scale speaker verification in the wild. Comput. Speech Lang. 60, 101027 (2020)","journal-title":"Comput. Speech Lang."},{"key":"39_CR44","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., Echizen, I.: Multi-task learning for detecting and segmenting manipulated facial images and videos. In: BTAS (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"39_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSSP, pp. 2307\u20132311. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"39_CR46","unstructured":"Nguyen, T.T., Nguyen, C.M., Nguyen, D.T., Nguyen, D.T., Nahavandi, S.: Deep learning for deepfakes creation and detection. arXiv preprint arXiv:1909.11573 (2019)"},{"key":"39_CR47","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Masi, I., Tran, A., Hassner, T., Medioni, G.: On face segmentation, face swapping, and face perception. In: AFGR (2018)","DOI":"10.1109\/FG.2018.00024"},{"key":"39_CR48","unstructured":"Pedro, D.: A unified bias-variance decomposition and its applications. In: 17th International Conference on Machine Learning, pp. 231\u2013238 (2000)"},{"key":"39_CR49","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., Echizen, I.: Distinguishing computer graphics from natural images using convolution neural networks. In: WIFS, pp. 1\u20136 (2017)","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"39_CR50","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"39_CR51","unstructured":"Ruff, L., et al.: Deep one-class classification. In: ICML, pp. 4393\u20134402 (2018)"},{"key":"39_CR52","unstructured":"Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., Natarajan, P.: Recurrent convolutional strategies for face manipulation detection in videos. In: CVPR Workshops, pp. 80\u201387 (2019)"},{"key":"39_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-01793-3_21","volume-title":"Advances in Biometrics","author":"C Sanderson","year":"2009","unstructured":"Sanderson, C., Lovell, B.C.: Multi-region probabilistic histograms for robust and scalable identity inference. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 199\u2013208. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01793-3_21"},{"key":"39_CR54","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"39_CR55","unstructured":"Stehouwer, J., Dang, H., Liu, F., Liu, X., Jain, A.: On the detection of digital face manipulation. arXiv preprint arXiv:1910.01717 (2019)"},{"issue":"4","key":"39_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. (TOG) 38(4), 1\u201312 (2019)","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"39_CR57","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of RGB videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2387\u20132395 (2016)","DOI":"10.1109\/CVPR.2016.262"},{"key":"39_CR58","doi-asserted-by":"crossref","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. arXiv preprint arXiv:2001.00179 (2020)","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"39_CR59","unstructured":"Valentini, G., Dietterich, T.G.: Bias-variance analysis of support vector machines for the development of SVM-based ensemble methods. JMLR 5(Jul), 725\u2013775 (2004)"},{"key":"39_CR60","unstructured":"Verdoliva, D.C.G.P.L.: Extracting camera-based fingerprints for video forensics (2019)"},{"key":"39_CR61","doi-asserted-by":"crossref","unstructured":"Verdoliva, L.: Media forensics and deepfakes: an overview. IEEE J. Sel. Top. Signal Process. (2020)","DOI":"10.1109\/JSTSP.2020.3002101"},{"issue":"7","key":"39_CR62","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/LSP.2018.2822810","volume":"25","author":"F Wang","year":"2018","unstructured":"Wang, F., Cheng, J., Liu, W., Liu, H.: Additive margin softmax for face verification. IEEE Signal Process. Lett. 25(7), 926\u2013930 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"39_CR63","unstructured":"Weisstein, E.W.: Hypersphere (2002)"},{"key":"39_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-319-46478-7_31","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Wen","year":"2016","unstructured":"Wen, Y., Zhang, K., Li, Z., Qiao, Yu.: A discriminative feature learning approach for deep face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 499\u2013515. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_31"},{"key":"39_CR65","doi-asserted-by":"crossref","unstructured":"Wu, C.Y., Manmatha, R., Smola, A.J., Krahenbuhl, P.: Sampling matters in deep embedding learning. In: ICCV, October 2017","DOI":"10.1109\/ICCV.2017.309"},{"key":"39_CR66","doi-asserted-by":"crossref","unstructured":"Xie, C., Wu, Y., Maaten, L.V.D., Yuille, A.L., He, K.: Feature denoising for improving adversarial robustness. In: CVPR, pp. 501\u2013509 (2019)","DOI":"10.1109\/CVPR.2019.00059"},{"key":"39_CR67","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSSP, pp. 8261\u20138265. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"39_CR68","doi-asserted-by":"crossref","unstructured":"Yu, N., Davis, L.S., Fritz, M.: Attributing fake images to GANs: learning and analyzing GAN fingerprints. In: ICCV, pp. 7556\u20137566 (2019)","DOI":"10.1109\/ICCV.2019.00765"},{"key":"39_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., Chang, S.F.: Detecting and simulating artifacts in GAN fake images. In: WIFS (2019)","DOI":"10.1109\/WIFS47025.2019.9035107"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58571-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:12:22Z","timestamp":1731024742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58571-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585709","9783030585716"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58571-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}