{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:21:47Z","timestamp":1775578907729,"version":"3.50.1"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031533013","type":"print"},{"value":"9783031533020","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53302-0_6","type":"book-chapter","created":{"date-parts":[[2024,1,28]],"date-time":"2024-01-28T09:02:09Z","timestamp":1706432529000},"page":"71-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adapting Pretrained Large-Scale Vision Models for\u00a0Face Forgery Detection"],"prefix":"10.1007","author":[{"given":"Lantao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chao","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: a compact facial video forgery detection network. In: WIFS (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1360612.1360638","volume":"27","author":"D Bitouk","year":"2008","unstructured":"Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P.N., Nayar, S.K.: Face swapping: automatically replacing faces in photographs. ACM Trans. Graph 27, 1\u20138 (2008)","journal-title":"ACM Trans. Graph"},{"key":"6_CR3","unstructured":"Cai, H., Gan, C., Zhu, L., Han, S.: Tinytl: reduce memory, not parameters for efficient on-device learning. In: NeurIPS (2020)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., Ji, R.: Local relation learning for face forgery detection. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"6_CR5","unstructured":"Chen, S., et al.: Adaptformer: adapting vision transformers for scalable visual recognition. In: NeurIPS (2022)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: Imagenet: A large-scale hierarchical image database. In: CVPR (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"6_CR7","unstructured":"Dhariwal, P., Nichol, A.Q.: Diffusion models beat GANs on image synthesis. In: NeurIPS (2021)"},{"key":"6_CR8","unstructured":"Dolhansky, B., et al.: The deepfake detection challenge (DFDC) dataset. CoRR (2020)"},{"key":"6_CR9","unstructured":"Dong, B., Zhou, P., Yan, S., Zuo, W.: LPT: long-tailed prompt tuning for image classification. CoRR (2022)"},{"key":"6_CR10","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: ICLR (2021)"},{"key":"6_CR11","first-page":"868","volume":"7","author":"JJ Fridrich","year":"2012","unstructured":"Fridrich, J.J., Kodovsk\u00fd, J.: Rich models for steganalysis of digital images. TIFS 7, 868\u2013882 (2012)","journal-title":"TIFS"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Gao, Y., et al.: High-fidelity and arbitrary face editing. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01585"},{"key":"6_CR13","unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks. CoRR (2014)"},{"key":"6_CR14","unstructured":"Han, X., Morariu, V., Larry Davis, P.I., et al.: Two-stream neural networks for tampered face detection. In: CVPR Workshop (2017)"},{"key":"6_CR15","unstructured":"He, J., Zhou, C., Ma, X., Berg-Kirkpatrick, T., Neubig, G.: Towards a unified view of parameter-efficient transfer learning. In: ICLR (2022)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"He, K., Chen, X., Xie, S., Li, Y., Doll\u00e1r, P., Girshick, R.: Masked autoencoders are scalable vision learners. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"6_CR17","unstructured":"He, X., Li, C., Zhang, P., Yang, J., Wang, X.E.: Parameter-efficient fine-tuning for vision transformers. CoRR (2022)"},{"key":"6_CR18","unstructured":"Hu, E.J., et al.: Lora: low-rank adaptation of large language models. In: ICLR (2022)"},{"key":"6_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-031-19778-9_3","volume-title":"ECCV 2022","author":"H Huang","year":"2022","unstructured":"Huang, H., et al.: Adaptive transformers for robust few-shot cross-domain face anti-spoofing. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13673, pp. 37\u201354. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19778-9_3"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Huang, Z., Chan, K.C.K., Jiang, Y., Liu, Z.: Collaborative diffusion for multi-modal face generation and editing. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.00589"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TBIOM.2021.3086109","volume":"3","author":"G Jia","year":"2021","unstructured":"Jia, G., et al.: Inconsistency-aware wavelet dual-branch network for face forgery detection. Trans. Biom. Behav. Ident. Sci. 3, 308\u2013319 (2021)","journal-title":"Trans. Biom. Behav. Ident. Sci."},{"key":"6_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/978-3-031-19827-4_41","volume-title":"ECCV 2022","author":"M Jia","year":"2022","unstructured":"Jia, M., et al.: Visual prompt tuning. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13693, pp. 709\u2013727. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19827-4_41"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Juefei-Xu, F., Boddeti, V.N., Savvides, M.: Local binary convolutional neural networks. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.456"},{"key":"6_CR24","unstructured":"Kim, K., et al.: Diffface: diffusion-based face swapping with facial guidance. CoRR (2022)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Face x-ray for more general face forgery detection. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: CVPR (2019)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Liu, H., et al. Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"6_CR30","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: ICLR (2019)"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F$${}^{\\text{2}}$$trans: High-frequency fine-grained transformer for face forgery detection. TIFS (2023)","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., Echizen, I.: Multi-task learning for detecting and segmenting manipulated facial images and videos. In: BTAS (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"6_CR33","unstructured":"Pan, J., Lin, Z., Zhu, X., Shao, J., Li, H.: St-adapter: parameter-efficient image-to-video transfer learning. In: NeurIPS (2022)"},{"key":"6_CR34","unstructured":"Paszke, A., et al.: Automatic differentiation in pytorch (2017)"},{"key":"6_CR35","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-58610-2_6","volume-title":"ECCV 2022","author":"Y Qian","year":"2020","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.M. (eds.) ECCV 2022. LNCS, vol. 12357, pp. 86\u2013103. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cet al.: Faceforensics++: learning to detect manipulated facial images. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-CAM: visual explanations from deep networks via gradient-based localization. In: IJCV (2020)","DOI":"10.1007\/s11263-019-01228-7"},{"key":"6_CR38","first-page":"7472","volume":"30","author":"Z Shi","year":"2021","unstructured":"Shi, Z., Chen, Y., Gavves, E., Mettes, P., Snoek, C.G.M.: Unsharp mask guided filtering. TIP 30, 7472\u20137485 (2021)","journal-title":"TIP"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: M2tr: multi-modal multi-scale transformers for deepfake detection. In: ICMR (2022)","DOI":"10.1145\/3512527.3531415"},{"key":"6_CR41","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-031-19815-1_13","volume-title":"ECCV 2022","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Xie, H., Xing, M., Wang, J., Zhu, S., Zhang, Y.: Detecting tampered scene text in the wild. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13688, pp. 215\u2013232. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19815-1_13"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Woo, S., et al.: Convnext v2: co-designing and scaling convnets with masked autoencoders. CoRR (2023)","DOI":"10.1109\/CVPR52729.2023.01548"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Yao, G., et al.: One-shot face reenactment using appearance adaptive normalization. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i4.16427"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Zhao, H., Wei, T., Zhou, W., Zhang, W., Chen, D., Yu, N.: Multi-attentional deepfake detection. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: CVPR Workshop (2017)","DOI":"10.1109\/CVPRW.2017.229"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.: Wilddeepfake: a challenging real-world dataset for deepfake detection. In: ACM MM (2020)","DOI":"10.1145\/3394171.3413769"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53302-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:56:36Z","timestamp":1709812596000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53302-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031533013","9783031533020"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53302-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool Pro","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"297","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}