{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:18:18Z","timestamp":1769631498803,"version":"3.49.0"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031730153","type":"print"},{"value":"9783031730160","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73016-0_7","type":"book-chapter","created":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T19:02:40Z","timestamp":1729882960000},"page":"104-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Fake It till\u00a0You Make It: Curricular Dynamic Forgery Augmentations Towards General Deepfake Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7788-2054","authenticated-orcid":false,"given":"Yuzhen","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3750-9516","authenticated-orcid":false,"given":"Wentang","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2613-5451","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9299-1945","authenticated-orcid":false,"given":"Yuezun","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7520-9031","authenticated-orcid":false,"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-9133","authenticated-orcid":false,"given":"Han","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4976-3346","authenticated-orcid":false,"given":"Qiushi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: a Compact Facial Video Forgery Detection Network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bai, W., Liu, Y., Zhang, Z., Li, B., Hu, W.: AUNet: learning relations between action units for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24709\u201324719 (2023)","DOI":"10.1109\/CVPR52729.2023.02367"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bengio, Y., Louradour, J., Collobert, R., Weston, J.: Curriculum learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 41\u201348 (2009)","DOI":"10.1145\/1553374.1553380"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bondi, L., Cannas, E.D., Bestagini, P., Tubaro, S.: Training strategies and data augmentations in CNN-based DeepFake video detection. In: 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136 (2020)","DOI":"10.1109\/WIFS49906.2020.9360901"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4113\u20134122 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Chen, H., Lin, Y., Li, B.: Exposing face forgery clues via retinex-based image enhancement. In: Proceedings of the Asian Conference on Computer Vision, pp. 602\u2013617 (2022)","DOI":"10.1007\/978-3-031-26316-3_2"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, Y., Song, Y., Liu, L., Wang, J.: Self-supervised learning of adversarial example: towards good generalizations for deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18710\u201318719 (2022)","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"7_CR8","first-page":"24597","volume":"35","author":"L Chen","year":"2022","unstructured":"Chen, L., Zhang, Y., Song, Y., Wang, J., Liu, L.: OST: improving generalization of DeepFake detection via one-shot test-time training. Adv. Neural. Inf. Process. Syst. 35, 24597\u201324610 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"7_CR9","unstructured":"Cheung, T.H., Yeung, D.Y.: AdaAug: learning class- and instance-adaptive data augmentation policies. In: International Conference on Learning Representations (2022)"},{"key":"7_CR10","unstructured":"Cheung, T.H., Yeung, D.Y.: A survey of automated data augmentation for image classification: learning to compose, mix, and generate. IEEE Trans. Neural Networks Learn. Syst., 1\u201321 (2023)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: AutoAugment: learning augmentation strategies from data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 113\u2013123 (2019)","DOI":"10.1109\/CVPR.2019.00020"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Das, S., Kolahdouzi, M., \u00d6zparlak, L., Hickie, W., Etemad, A.: Unmasking deepfakes: masked autoencoding spatiotemporal transformers for enhanced video forgery detection. In: 2023 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u201311 (2023)","DOI":"10.1109\/IJCB57857.2023.10449301"},{"key":"7_CR14","unstructured":"Dolhansky, B., et al.: The DeepFake Detection Challenge (DFDC) Dataset. arXiv:2006.07397 [cs] (2020)"},{"key":"7_CR15","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Ferrer, C.C.: The Deepfake Detection Challenge (DFDC) Preview Dataset. arXiv:1910.08854 [cs] (2019)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Dong, S., Wang, J., Ji, R., Liang, J., Fan, H., Ge, Z.: Implicit identity leakage: the stumbling block to improving deepfake detection generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3994\u20134004 (2023)","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Dong, X., et al.: Protecting celebrities From DeepFake with identity consistency transformer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9468\u20139478 (2022)","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Gao, G., Huang, H., Fu, C., Li, Z., He, R.: Information Bottleneck Disentanglement for Identity Swapping. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3404\u20133413 (2021)","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., Yi, R.: Exploiting Fine-Grained Face Forgery Clues via Progressive Enhancement Learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 735\u2013743 (2022)","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"7_CR20","unstructured":"Guan, J., Zhou, H., Gong, M., Ding, E., Wang, J., Zhao, Y.: Detecting Deepfake by Creating Spatio-Temporal Regularity Disruption (2023)"},{"key":"7_CR21","first-page":"4517","volume":"35","author":"J Guan","year":"2022","unstructured":"Guan, J., Zhou, H., Hong, Z., Ding, E., Wang, J., Quan, C., Zhao, Y.: Delving into sequential patches for deepfake detection. Adv. Neural Inf. Process. Syst. 35, 4517\u20134530 (2022)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Hou, C., Zhang, J., Zhou, T.: When to learn what: model-adaptive data augmentation curriculum. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1717\u20131728 (2023)","DOI":"10.1109\/ICCV51070.2023.00165"},{"key":"7_CR23","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Larue, N., Vu, N.S., Struc, V., Peer, P., Christophides, V.: SeeABLE: soft discrepancies and bounded contrastive learning for exposing Deepfakes. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 21011\u201321021 (2023)","DOI":"10.1109\/ICCV51070.2023.01921"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6458\u20136467 (2021)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., Wen, F.: Advancing high fidelity identity swapping for forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5074\u20135083 (2020)","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Face X-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001\u20135010 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M., Lyu, S.: In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Li, Y., Hu, G., Wang, Y., Hospedales, T., Robertson, N.M., Yang, Y.: Differentiable Automatic Data Augmentation. In: Computer Vision \u2013 ECCV 2020, pp. 580\u2013595 (2020)","DOI":"10.1007\/978-3-030-58542-6_35"},{"key":"7_CR30","unstructured":"Li, Y., Lyu, S.: Exposing DeepFake videos by detecting face warping artifacts. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 46\u201352 (2019)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for DeepFake Forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3207\u20133216 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 772\u2013781 (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"issue":"12","key":"7_CR33","doi-asserted-by":"publisher","first-page":"10045","DOI":"10.1109\/TPAMI.2021.3132674","volume":"44","author":"R Liu","year":"2022","unstructured":"Liu, R., Gao, J., Zhang, J., Meng, D., Lin, Z.: Investigating bi-level optimization for learning and vision from a unified perspective: a survey and beyond. IEEE Trans. Pattern Anal. Mach. Intell. 44(12), 10045\u201310067 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer V2: scaling up capacity and resolution. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12009\u201312019 (2022)","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W.: Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16317\u201316326 (2021)","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW). pp. 83\u201392 (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Nadimpalli, A.V., Rattani, A.: On Improving Cross-dataset Generalization of Deepfake Detectors. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). pp. 91\u201399 (2022)","DOI":"10.1109\/CVPRW56347.2022.00019"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Nguyen, D., et al.: LAA-Net: localized artifact attention network for quality-agnostic and generalizable deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 17395\u201317405 (2024)","DOI":"10.1109\/CVPR52733.2024.01647"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: FSGAN: Subject Agnostic Face Swapping and Reenactment. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 7184\u20137193 (2019)","DOI":"10.1109\/ICCV.2019.00728"},{"issue":"1","key":"7_CR40","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TPAMI.2022.3155571","volume":"45","author":"Y Nirkin","year":"2023","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: FSGANv2: improved subject agnostic face swapping and reenactment. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 560\u2013575 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"7_CR41","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","volume":"44","author":"Y Nirkin","year":"2022","unstructured":"Nirkin, Y., Wolf, L., Keller, Y., Hassner, T.: DeepFake detection based on discrepancies between faces and their context. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6111\u20136121 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: ECCV, pp. 86\u2013103 (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: FaceForensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., et al.: Grad-CAM: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18720\u201318729 (2022)","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Song, L., et al.: Adaptive face forgery detection in\u00a0cross domain. In: Computer Vision \u2013 ECCV 2022, pp. 467\u2013484 (2022)","DOI":"10.1007\/978-3-031-19830-4_27"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Song, W., Lin, Y., Li, B.: Towards generic deepfake detection with dynamic curriculum. In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4500\u20134504 (2024)","DOI":"10.1109\/ICASSP48485.2024.10448345"},{"issue":"6","key":"7_CR48","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1007\/s11263-022-01611-x","volume":"130","author":"P Soviany","year":"2022","unstructured":"Soviany, P., Ionescu, R.T., Rota, P., Sebe, N.: Curriculum learning: a survey. Int. J. Comput. Vision 130(6), 1526\u20131565 (2022)","journal-title":"Int. J. Comput. Vision"},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Sun, K., Yao, T., Chen, S., Ding, S., Li, J., Ji, R.: Dual contrastive learning for general face forgery detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 2316\u20132324 (2022)","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"7_CR50","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114. PMLR (2019)"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., Efros, A.A.: CNN-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8695\u20138704 (2020)","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Wang, T., Chow, K.P.: Noise based deepfake detection via multi-head relative-interaction. In: Proceedings of the AAAI Conference on Artificial Intelligence 37(12), pp. 14548\u201314556 (2023)","DOI":"10.1609\/aaai.v37i12.26701"},{"issue":"9","key":"7_CR53","doi-asserted-by":"crossref","first-page":"4555","DOI":"10.1109\/TPAMI.2021.3072422","volume":"44","author":"X Wang","year":"2022","unstructured":"Wang, X., Chen, Y., Zhu, W.: A survey on curriculum learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(9), 4555\u20134576 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR54","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yu, K., Chen, C., Hu, X., Peng, S.: Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7278\u20137287 (2023)","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Xu, C., et al.: Designing one unified framework for\u00a0high-fidelity face reenactment and\u00a0swapping. In: Computer Vision \u2013 ECCV 2022, pp. 54\u201371 (2022)","DOI":"10.1007\/978-3-031-19784-0_4"},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Xu, Y., Liang, J., Jia, G., Yang, Z., Zhang, Y., He, R.: TALL: Thumbnail layout for deepfake video detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22658\u201322668 (2023)","DOI":"10.1109\/ICCV51070.2023.02071"},{"key":"7_CR57","doi-asserted-by":"publisher","unstructured":"Xu, Z., et al.: StyleSwap: style-based generator empowers robust face swapping. In: Computer Vision \u2013 ECCV 2022, pp. 661\u2013677 (2022). https:\/\/doi.org\/10.1007\/978-3-031-19781-9_38","DOI":"10.1007\/978-3-031-19781-9_38"},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Yan, Z., Luo, Y., Lyu, S., Liu, Q., Wu, B.: Transcending forgery specificity with latent space augmentation for generalizable deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8984\u20138994 (2024)","DOI":"10.1109\/CVPR52733.2024.00858"},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhang, Y., Fan, Y., Wu, B.: UCF: uncovering common features for generalizable deepfake detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22412\u201322423 (2023)","DOI":"10.1109\/ICCV51070.2023.02048"},{"key":"7_CR60","first-page":"4534","volume":"36","author":"Z Yan","year":"2023","unstructured":"Yan, Z., Zhang, Y., Yuan, X., Lyu, S., Wu, B.: DeepfakeBench: a comprehensive benchmark of deepfake detection. Adv. Neural Inf. Process. Syst. 36, 4534\u20134565 (2023)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"7_CR61","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8261\u20138265 (2019)","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"7_CR63","doi-asserted-by":"crossref","unstructured":"Zhao, T., Xu, X., Xu, M., Ding, H., Xiong, Y., Xia, W.: Learning self-consistency for deepfake detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15023\u201315033 (2021)","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"7_CR64","doi-asserted-by":"crossref","unstructured":"Zhuang, W., et al.: UIA-ViT: unsupervised inconsistency-aware method based on\u00a0vision transformer for\u00a0face forgery detection. In: Computer Vision \u2013 ECCV 2022, pp. 391\u2013407 (2022)","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"7_CR65","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.G.: WildDeepfake: a challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2382\u20132390 (2020)","DOI":"10.1145\/3394171.3413769"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73016-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T19:04:21Z","timestamp":1729883061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73016-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,26]]},"ISBN":["9783031730153","9783031730160"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73016-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,26]]},"assertion":[{"value":"26 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}