{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:40:22Z","timestamp":1757619622633,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819698684"},{"type":"electronic","value":"9789819698691"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9869-1_13","type":"book-chapter","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T13:43:47Z","timestamp":1753364627000},"page":"145-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forgery-Aware Adaptive CLIP for Generalizable Face Forgery Detection"],"prefix":"10.1007","author":[{"given":"Xiaoning","family":"Li","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yongcun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yingxin","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Guimin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Huang, Z., Chan, K.C.K., Jiang, Y., Liu, Z.: Collaborative diffusion for multi-modal face generation and editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6080\u20136090 (2023)","key":"13_CR1","DOI":"10.1109\/CVPR52729.2023.00589"},{"doi-asserted-by":"crossref","unstructured":"Lai, Y., Yang, G., He, Y., Luo, Z., Li, S.: Selective domain-invariant feature for generalizable deepfake detection. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2335\u20132339 (2024)","key":"13_CR2","DOI":"10.1109\/ICASSP48485.2024.10447889"},{"doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 18720\u201318729 (2022)","key":"13_CR3","DOI":"10.1109\/CVPR52688.2022.01816"},{"doi-asserted-by":"crossref","unstructured":"Yan, Z., Luo, Y., Lyu, S., Liu, Q., Wu, B.: Transcending forgery specificity with latent space augmentation for generalizable deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8984\u20138994 (2024)","key":"13_CR4","DOI":"10.1109\/CVPR52733.2024.00858"},{"doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4113\u20134122 (2022)","key":"13_CR5","DOI":"10.1109\/CVPR52688.2022.00408"},{"unstructured":"Radford, A., et al.: Learning transferable visual models from natural language supervision. In: Proceedings of the International Conference on Machine Learning (ICML), pp. 8748\u20138763 (2021)","key":"13_CR6"},{"doi-asserted-by":"crossref","unstructured":"Khan, S.A., Dang-Nguyen, D.-T.: Clipping the deception: adapting vision-language models for universal deepfake detection. In: Proceedings of the International Conference on Multimedia Retrieval (ICMR), pp. 1006\u20131015 (2024)","key":"13_CR7","DOI":"10.1145\/3652583.3658035"},{"doi-asserted-by":"crossref","unstructured":"Sun, K., et al.: Towards General Visual-Linguistic Face Forgery Detection. arXiv preprint arXiv:2502.20698 (2025)","key":"13_CR8","DOI":"10.1109\/CVPR52734.2025.01823"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2307\u20132311 (2019)","key":"13_CR9","DOI":"10.1109\/ICASSP.2019.8682602"},{"doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: FaceForensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311 (2019)","key":"13_CR10","DOI":"10.1109\/ICCV.2019.00009"},{"doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1831\u20131839 (2017)","key":"13_CR11","DOI":"10.1109\/CVPRW.2017.229"},{"doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 86\u2013103 (2020)","key":"13_CR12","DOI":"10.1007\/978-3-030-58610-2_6"},{"unstructured":"Lai, Y., Yu, Z., Yang, J., Li, B., Kang, X., Shen, L.: GM-DF: Generalized Multi-Scenario Deepfake Detection. arXiv preprint arXiv:2406.20078 (2024)","key":"13_CR13"},{"doi-asserted-by":"crossref","unstructured":"Lin, K., Lin, Y., Li, W., Yao, T., Li, B.: Standing on The Shoulders of Giants: Reprogramming Visual-Language Model for General Deepfake Detection. arXiv preprint arXiv:2409.02664 (2024)","key":"13_CR14","DOI":"10.1609\/aaai.v39i5.32559"},{"unstructured":"Jiang, D., et al.: From CLIP to DINO: Visual Encoders Shout in Multi-Modal Large Language Models. arXiv preprint arXiv:2310.08825 (2023)","key":"13_CR15"},{"doi-asserted-by":"crossref","unstructured":"Li, X.L., Liang, P.: Prefix-Tuning: Optimizing Continuous Prompts for Generation. arXiv preprint arXiv:2101.00190 (2021)","key":"13_CR16","DOI":"10.18653\/v1\/2021.acl-long.353"},{"unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a new dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3207\u20133216 (2020)","key":"13_CR17"},{"unstructured":"Dolhansky, B., et al.: The Deepfake Detection Challenge (DFDC) Dataset. arXiv preprint arXiv:2006.07397 (2020)","key":"13_CR18"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Song, H., Lu, X., Huang, S.-L., Duan, Y.: AdaForensics: learning a characteristic-aware adaptive deepfake detector. In: 2024 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2024)","key":"13_CR19","DOI":"10.1109\/ICME57554.2024.10687869"},{"doi-asserted-by":"crossref","unstructured":"Ba, Z., et al.: Exposing the deception: uncovering more forgery clues for deepfake detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 719\u2013728 (2024)","key":"13_CR20","DOI":"10.1609\/aaai.v38i2.27829"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Liang, J., Jia, G., Yang, Z., Zhang, Y., He, R.: TALL: thumbnail layout for deepfake video detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 22658\u201322668 (2023)","key":"13_CR21","DOI":"10.1109\/ICCV51070.2023.02071"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1109\/TIFS.2023.3332218","volume":"19","author":"A Luo","year":"2023","unstructured":"Luo, A., Kong, C., Huang, J., Hu, Y., Kang, X., Kot, A.C.: Beyond the prior forgery knowledge: mining critical clues for general face forgery detection. IEEE Trans. Inf. Forensics Secur. 19, 1168\u20131182 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Larue, N., Vu, N.-S., Struc, V., Peer, P., Christophides, V.: Seeable: soft discrepancies and bounded contrastive learning for exposing deepfakes. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 21011\u201321021 (2023)","key":"13_CR23","DOI":"10.1109\/ICCV51070.2023.01921"},{"issue":"9","key":"13_CR24","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1007\/s11263-022-01653-1","volume":"130","author":"K Zhou","year":"2022","unstructured":"Zhou, K., Yang, J., Loy, C.C., Liu, Z.: Learning to prompt for vision-language models. International J. Computer Vision (IJCV) 130(9), 2337\u20132348 (2022)","journal-title":"International J. Computer Vision (IJCV)"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9869-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T21:53:58Z","timestamp":1757282038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9869-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698684","9789819698691"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9869-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}