{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T11:05:38Z","timestamp":1768993538848,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556922","type":"print"},{"value":"9789819556939","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5693-9_2","type":"book-chapter","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:23:00Z","timestamp":1768944180000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-dimensional Fusion Attention Network for\u00a0Face Forgery Detection"],"prefix":"10.1007","author":[{"given":"Jiting","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5238-9035","authenticated-orcid":false,"given":"Yuxuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Ba, Z., et al.: Exposing the deception: Uncovering more forgery clues for deepfake detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 719\u2013728 (2024)","DOI":"10.1609\/aaai.v38i2.27829"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4113\u20134122 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TIP.2024.3354108","volume":"33","author":"Z Chen","year":"2024","unstructured":"Chen, Z., He, Z., Lu, Z.M.: Dea-net: Single image dehazing based on detail-enhanced convolution and content-guided attention. IEEE Trans. Image Process. 33, 1002\u20131015 (2024)","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Dong, S., Wang, J., Ji, R., Liang, J., Fan, H., Ge, Z.: Implicit identity leakage: The stumbling block to improving deepfake detection generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3994\u20134004 (2023)","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., Yi, R.: Exploiting fine-grained face forgery clues via progressive enhancement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 735\u2013743 (2022)","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Hu, J., Liao, X., Liang, J., Zhou, W., Qin, Z.: Finfer: Frame inference-based deepfake detection for high-visual-quality videos. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 951\u2013959 (2022)","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Kendall, A., Gal, Y., Cipolla, R.: Multi-task learning using uncertainty to weigh losses for scene geometry and semantics. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7482\u20137491 (2018)","DOI":"10.1109\/CVPR.2018.00781"},{"key":"2_CR8","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: A machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6458\u20136467 (2021)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3207\u20133216 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"147265","DOI":"10.1109\/ACCESS.2020.3015714","volume":"8","author":"J Liang","year":"2020","unstructured":"Liang, J., Zhang, T., Feng, G.: Channel compression: Rethinking information redundancy among channels in CNN architecture. IEEE Access 8, 147265\u2013147274 (2020)","journal-title":"IEEE Access"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","volume":"10","author":"A Malik","year":"2022","unstructured":"Malik, A., Kuribayashi, M., Abdullahi, S.M., Khan, A.N.: Deepfake detection for human face images and videos: a survey. Ieee Access 10, 18757\u201318775 (2022)","journal-title":"Ieee Access"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-030-58571-6_39","volume-title":"Computer Vision \u2013 ECCV 2020","author":"I Masi","year":"2020","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12352, pp. 667\u2013684. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58571-6_39"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","volume":"53","author":"M Masood","year":"2023","unstructured":"Masood, M., Nawaz, M., Malik, K.M., Javed, A., Irtaza, A., Malik, H.: Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Appl. Intell. 53(4), 3974\u20134026 (2023)","journal-title":"Appl. Intell."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: European Conference on Computer Vision, pp. 86\u2013103. Springer (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference On Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.neucom.2022.09.135","volume":"513","author":"JW Seow","year":"2022","unstructured":"Seow, J.W., Lim, M.K., Phan, R.C., Liu, J.K.: A comprehensive overview of deepfake: Generation, detection, datasets, and opportunities. Neurocomputing 513, 351\u2013371 (2022)","journal-title":"Neurocomputing"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Sun, K., Yao, T., Chen, S., Ding, S., Li, J., Ji, R.: Dual contrastive learning for general face forgery detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a036, pp. 2316\u20132324 (2022)","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1109\/TIFS.2022.3186803","volume":"17","author":"J Wang","year":"2022","unstructured":"Wang, J., Sun, Y., Tang, J.: Lisiam: Localization invariance Siamese network for deepfake detection. IEEE Trans. Inf. Forensics Secur. 17, 2425\u20132436 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yu, K., Chen, C., Hu, X., Peng, S.: Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7278\u20137287 (2023)","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Y., Liang, J., Jia, G., Yang, Z., Zhang, Y., He, R.: Tall: Thumbnail layout for deepfake video detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22658\u201322668 (2023)","DOI":"10.1109\/ICCV51070.2023.02071"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhang, Y., Fan, Y., Wu, B.: Ucf: Uncovering common features for generalizable deepfake detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22412\u201322423 (2023)","DOI":"10.1109\/ICCV51070.2023.02048"},{"issue":"5","key":"2_CR25","doi-asserted-by":"publisher","first-page":"6259","DOI":"10.1007\/s11042-021-11733-y","volume":"81","author":"T Zhang","year":"2022","unstructured":"Zhang, T.: Deepfake generation and detection, a survey. Multimedia Tools Appl. 81(5), 6259\u20136276 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, K., Wu, J.: Residual attention: A simple but effective method for multi-label recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 184\u2013193 (2021)","DOI":"10.1109\/ICCV48922.2021.00025"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Zhu, X., Wang, H., Fei, H., Lei, Z., Li, S.Z.: Face forgery detection by 3D decomposition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2929\u20132939 (2021)","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Zhuang, W., et al.: Uia-vit: Unsupervised inconsistency-aware method based on vision transformer for face forgery detection. In: European Conference on Computer Vision, pp. 391\u2013407. Springer (2022)","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.G.: Wilddeepfake: A challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2382\u20132390 (2020)","DOI":"10.1145\/3394171.3413769"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5693-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:23:04Z","timestamp":1768944184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5693-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556922","9789819556939"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5693-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"21 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}