{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:17:14Z","timestamp":1743052634647,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_14","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"175-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Training for\u00a0Deepfake Detection Models Against Disruption-Induced Data Poisoning"],"prefix":"10.1007","author":[{"given":"Jaewoo","family":"Park","sequence":"first","affiliation":[]},{"given":"Hong Eun","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Leo Hyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Asnani, V., Yin, X., Hassner, T., Liu, S., Liu, X.: Proactive image manipulation detection. In: Proceedings of the CVPR, pp. 15386\u201315395 (2022)","key":"14_CR1","DOI":"10.1109\/CVPR52688.2022.01495"},{"doi-asserted-by":"crossref","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.W., Kim, S., Choo, J.: StarGAN: unified generative adversarial networks for multi-domain image-to-image translation. In: Proceedings of the CVPR, pp. 8789\u20138797 (2018)","key":"14_CR2","DOI":"10.1109\/CVPR.2018.00916"},{"doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the CVPR (2017)","key":"14_CR3","DOI":"10.1109\/CVPR.2017.195"},{"doi-asserted-by":"crossref","unstructured":"Ciftci, U.A., Demir, I., Yin, L.: FakeCatcher: detection of synthetic portrait videos using biological signals. IEEE Trans. Pattern Anal. Mach. Intell. (2020)","key":"14_CR4","DOI":"10.1109\/TPAMI.2020.3009287"},{"unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks (2014)","key":"14_CR5"},{"unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)","key":"14_CR6"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the CVPR, pp. 770\u2013778 (2016)","key":"14_CR7","DOI":"10.1109\/CVPR.2016.90"},{"key":"14_CR8","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Hsu, G.S., Tsai, C.H., Wu, H.Y.: Dual-generator face reenactment. In: Proceedings of the CVPR, pp. 642\u2013650 (2022)","key":"14_CR9","DOI":"10.1109\/CVPR52688.2022.00072"},{"doi-asserted-by":"crossref","unstructured":"Hu, S., Li, Y., Lyu, S.: Exposing GAN-generated faces using inconsistent corneal specular highlights. In: Proceedings of the ICASSP, pp. 2500\u20132504. IEEE (2021)","key":"14_CR10","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"doi-asserted-by":"crossref","unstructured":"Huang, Q., Zhang, J., Zhou, W., Zhang, W., Yu, N.: Initiative defense against facial manipulation. In: Proceedings of the AAAI, vol. 35, pp. 1619\u20131627 (2021)","key":"14_CR11","DOI":"10.1609\/aaai.v35i2.16254"},{"doi-asserted-by":"crossref","unstructured":"Hulzebosch, N., Ibrahimi, S., Worring, M.: Detecting CNN-generated facial images in real-world scenarios. In: Proceedings of the CVPR Workshops (2020)","key":"14_CR12","DOI":"10.1109\/CVPRW50498.2020.00329"},{"doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the CVPR, pp. 4401\u20134410 (2019)","key":"14_CR13","DOI":"10.1109\/CVPR.2019.00453"},{"unstructured":"Lee, K., Kim, J., Chong, S., Shin, J.: Making stochastic neural networks from deterministic ones (2017)","key":"14_CR14"},{"unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 (2018)","key":"14_CR15"},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the CVPR, pp. 3207\u20133216 (2020)","key":"14_CR16","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"14_CR17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-031-19781-9_6","volume-title":"Computer Vision\u2014ECCV 2022","author":"B Liu","year":"2022","unstructured":"Liu, B., Yang, F., Bi, X., Xiao, B., Li, W., Gao, X.: Detecting generated images by real images. In: Avidan, S., Brostow, G., Cisse, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13674, pp. 95\u2013110. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19781-9_6"},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings OF the ICCV (2015)","key":"14_CR18","DOI":"10.1109\/ICCV.2015.425"},{"unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: Proceedings of the ICLR (2018)","key":"14_CR19"},{"doi-asserted-by":"crossref","unstructured":"Meng, D., Chen, H.: Magnet: a two-pronged defense against adversarial examples. In: Proceedings of the CCS, pp. 135\u2013147 (2017)","key":"14_CR20","DOI":"10.1145\/3133956.3134057"},{"unstructured":"Nie, W., Guo, B., Huang, Y., Xiao, C., Vahdat, A., Anandkumar, A.: Diffusion models for adversarial purification. In: Proceedings of the ICML, pp. 16805\u201316827. PMLR (2022)","key":"14_CR21"},{"doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: FSGAN: subject agnostic face swapping and reenactment. In: Proceedings of the ICCV, pp. 7184\u20137193 (2019)","key":"14_CR22","DOI":"10.1109\/ICCV.2019.00728"},{"doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the ICCV, pp. 1\u201311 (2019)","key":"14_CR23","DOI":"10.1109\/ICCV.2019.00009"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-030-66823-5_14","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"N Ruiz","year":"2020","unstructured":"Ruiz, N., Bargal, S.A., Sclaroff, S.: Disrupting deepfakes: adversarial attacks against conditional image translation networks and facial manipulation systems. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020. LNCS, vol. 12538, pp. 236\u2013251. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66823-5_14"},{"doi-asserted-by":"crossref","unstructured":"Wang, R., Huang, Z., Chen, Z., Liu, L., Chen, J., Wang, L.: Anti-forgery: towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations. arXiv preprint arXiv:2206.00477 (2022)","key":"14_CR25","DOI":"10.24963\/ijcai.2022\/107"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Huang, J., Ma, S., Nepal, S., Xu, C.: Deepfake disrupter: the detector of deepfake is my friend. In: Proceedings of the CVPR, pp. 14920\u201314929 (2022)","key":"14_CR26","DOI":"10.1109\/CVPR52688.2022.01450"},{"doi-asserted-by":"crossref","unstructured":"Xia, W., Yang, Y., Xue, J.H., Wu, B.: TediGAN: text-guided diverse face image generation and manipulation. In: Proceedings of the CVPR, pp. 2256\u20132265 (2021)","key":"14_CR27","DOI":"10.1109\/CVPR46437.2021.00229"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: Proceedings of the ICASSP, pp. 8261\u20138265. IEEE (2019)","key":"14_CR28","DOI":"10.1109\/ICASSP.2019.8683164"},{"doi-asserted-by":"crossref","unstructured":"Yeh, C.Y., Chen, H.W., Tsai, S.L., Wang, S.D.: Disrupting image-translation-based deepfake algorithms with adversarial attacks. In: Proceedings of the WACV Workshops, pp. 53\u201362 (2020)","key":"14_CR29","DOI":"10.1109\/WACVW50321.2020.9096939"},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., Chang, S.F.: Detecting and simulating artifacts in GAN fake images. In: Proceedings of the WIFS, pp. 1\u20136. IEEE (2019)","key":"14_CR30","DOI":"10.1109\/WIFS47025.2019.9035107"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Y., Li, Q., Wang, J., Xu, C.Z., Sun, Z.: One shot face swapping on megapixels. In: Proceedings of the CVPR, pp. 4834\u20134844 (2021)","key":"14_CR31","DOI":"10.1109\/CVPR46437.2021.00480"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:03:34Z","timestamp":1704863014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}