{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T15:11:24Z","timestamp":1769440284953,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"FFG","award":["879670"],"award-info":[{"award-number":["879670"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s00502-021-00929-7","type":"journal-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T12:02:57Z","timestamp":1631880177000},"page":"480-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The defalsif-AI project: protecting critical infrastructures against disinformation and fake news","Das Projekt defalsif-AI: Schutz kritischer Infrastrukturen vor Desinformation und Fake News"],"prefix":"10.1007","volume":"138","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9080-1255","authenticated-orcid":false,"given":"David","family":"Schreiber","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Picus","sequence":"additional","affiliation":[]},{"given":"David","family":"Fischinger","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Boyer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"929_CR1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0236517","volume":"15","author":"R. Gururaghav","year":"2020","unstructured":"Gururaghav, R., AlShebli, B., Waniek, B., Rahwan, T., Peng, J. C.-H. (2020): How weaponizing disinformation can bring down a city\u2019s power grid. PLoS ONE, 15, e0236517.","journal-title":"PLoS ONE"},{"key":"929_CR2","unstructured":"Financial Times [Online]. Available: https:\/\/www.ft.com\/content\/1eeedb71-d9dc-4b13-9b45-fcb7898ae9e1."},{"key":"929_CR3","unstructured":"defalsif-AI project (10.2020 - 9.2022) [Online]. Available: https:\/\/defalsifai.at\/."},{"key":"929_CR4","unstructured":"Charleer, S. (November 2019, 17 May 2019): Family fun with deepfakes. Or how I got my wife into the Tonight Show Medium. Retrieved 8 November 2019, 17 May 2019 [Online]. Available: http:\/\/svencharleer.com\/2018\/02\/02\/family-fun-with-deepfakes-or-how-i-got-my-wife-onto-the-tonight-show\/."},{"issue":"5","key":"929_CR5","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L. Verdoliva","year":"2020","unstructured":"Verdoliva, L. (2020): Media forensics and DeepFakes: an overview. IEEE J. Sel. Top. Signal Process., 14(5), 910\u2013932.","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"929_CR6","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/MIPR.2018.00084","volume-title":"IEEE conference on multimedia information processing and retrieval (MIPR)","author":"F. Marra","year":"2018","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., Verdoliva, L. (2018): Detection of GAN-generated fake images over social networks. In IEEE conference on multimedia information processing and retrieval (MIPR) (pp. 384\u2013389)."},{"issue":"1","key":"929_CR7","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1007\/s11042-016-4277-2","volume":"77","author":"K. M. Zakariah","year":"2018","unstructured":"Zakariah, K. M., Khan, M. K., Malik, H. (2018): Digital multimedia audio forensics: past, present and future. Multimed. Tools Appl., 77(1), 1009\u20131040.","journal-title":"Multimed. Tools Appl."},{"key":"929_CR8","unstructured":"[Online]. Available: https:\/\/www.youtube.com\/watch?v=I3l4XLZ59iw."},{"key":"929_CR9","unstructured":"Deepfake Detection Challenge (DFDC) [Online]. Available: https:\/\/www.kaggle.com\/c\/deepfake-detection-challenge."},{"key":"929_CR10","unstructured":"Korshunov, P., Marcel, S. (2018): DeepFakes: a new threat to face recognition? Assessment and detection arXiv:1812.08685 [cs.CV]."},{"key":"929_CR11","volume-title":"Proceedings of the 24th ACM international conference on multimedia","author":"N. Le","year":"2016","unstructured":"Le, N., Odobez, J. M. (2016): Learning multimodal temporal representation for dubbing detection in broadcast media. In Proceedings of the 24th ACM international conference on multimedia."},{"key":"929_CR12","first-page":"22","volume-title":"ACM SIKGDD explorations newsletter","author":"K. Shu","year":"2017","unstructured":"Shu, K., Wang, S., Tang, J., Liu, H. (2017): Fake news detection on social media: a data mining perspective. In ACM SIKGDD explorations newsletter (pp. 22\u201336)."},{"key":"929_CR13","volume-title":"Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","author":"S. Singh","year":"2016","unstructured":"Singh, S., Ribeiro, M. T., Guestrin, C. (2016): \u201cWhy should I trust you?\u201d: explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining."},{"key":"929_CR14","volume-title":"IEEE visualization conference","author":"F. Hohman","year":"2019","unstructured":"Hohman, F., Srinivasan, A., Drucker, S. (2019): TeleGam: combining visualization and verbalization for interpretable machine learning. In IEEE visualization conference."},{"key":"929_CR15","volume-title":"Proceedings of the 34th IEEE\/ACM international conference on automated software engineering","author":"X. Zhang","year":"2019","unstructured":"Zhang, X., Yin, Z., Feng, Y., Shi, Q., Liu, J., Chen, Z. (2019): NeuralVis: visualizing and interpreting deep learning models. In Proceedings of the 34th IEEE\/ACM international conference on automated software engineering."},{"key":"929_CR16","unstructured":"EU Code of Practice on Disinformation (2018): [Online]. Available: https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/code-practice-disinformation."},{"key":"929_CR17","first-page":"49","volume-title":"Race after technology. Abolitionist tools for the new Jim code","author":"R. Benjamin","year":"2019","unstructured":"Benjamin, R. (2019): Engineering inequity. Are robots racist?. In Race after technology. Abolitionist tools for the new Jim code (S. 49\u201376). Cambridge: Polity."},{"key":"929_CR18","volume-title":"IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","author":"T. Karras","year":"2019","unstructured":"Karras, T., Laine, S., Aila, T. (2019): A style-based generator architecture for generative adversarial networks. In IEEE\/CVF conference on computer vision and pattern recognition (CVPR)."},{"key":"929_CR19","unstructured":"NTech-Lab (2021): Kaggle DeepFake Detection Challenge (DFDC). [Online], Available: https:\/\/github.com\/NTech-Lab\/deepfake-detection-challenge."},{"key":"929_CR20","volume-title":"IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","author":"Y. Wu","year":"2019","unstructured":"Wu, Y., AbdAlmageed, W., Natarajan, P. (2019): Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In IEEE\/CVF conference on computer vision and pattern recognition (CVPR)."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00929-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00502-021-00929-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00929-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T14:01:07Z","timestamp":1694700067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00502-021-00929-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"references-count":20,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["929"],"URL":"https:\/\/doi.org\/10.1007\/s00502-021-00929-7","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"8 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The photo of author David Schreiber has been removed.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}