{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T10:31:22Z","timestamp":1761388282844,"version":"build-2065373602"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006020","62171042","62102033"],"award-info":[{"award-number":["62006020","62171042","62102033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4242020","4232026"],"award-info":[{"award-number":["4242020","4232026"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Academic Research Projects of Beijing Union University","award":["ZK10202404"],"award-info":[{"award-number":["ZK10202404"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s00530-025-01959-3","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:30:36Z","timestamp":1755779436000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generalization-oriented face forgery detection via discriminative feature analysis and normalization"],"prefix":"10.1007","volume":"31","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"given":"Bingxin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hongzhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weiguo","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"key":"1959_CR1","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network, in: 2018 IEEE international workshop on information forensics and security (WIFS), IEEE. pp. 1\u20137, (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"1959_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Singh, R., Vatsa, M., Noore, A.: Swapped! digital face presentation attack detection via weighted local magnitude pattern, in: 2017 IEEE International Joint Conference on Biometrics (IJCB), IEEE. pp. 659\u2013665, (2017)","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"1959_CR3","doi-asserted-by":"crossref","unstructured":"Bastidas, A.A., Tang, H.: Channel attention networks, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp. 0\u20130, (2019)","DOI":"10.1109\/CVPRW.2019.00117"},{"key":"1959_CR4","doi-asserted-by":"crossref","unstructured":"Ben-David, S., Blitzer, J., Crammer, K., Pereira, F.: Analysis of representations for domain adaptation. Adv. Neural Inf. Process. Syst. 19, (2006)","DOI":"10.7551\/mitpress\/7503.003.0022"},{"key":"1959_CR5","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4113\u20134122, (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"1959_CR6","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, J., Lin, S., Wei, F., Hu, H.: Gcnet: Non-local networks meet squeeze-excitation networks and beyond, in: Proceedings of the IEEE\/CVF international conference on computer vision workshops, pp. 0\u20130, (2019)","DOI":"10.1109\/ICCVW.2019.00246"},{"key":"1959_CR7","doi-asserted-by":"crossref","unstructured":"Chang, W.G., You, T., Seo, S., Kwak, S., Han, B.: Domain-specific batch normalization for unsupervised domain adaptation, in: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition, pp. 7354\u20137362 (2019)","DOI":"10.1109\/CVPR.2019.00753"},{"key":"1959_CR8","doi-asserted-by":"crossref","unstructured":"Chen, C., Chen, Z., Jiang, B., Jin, X.: Joint domain alignment and discriminative feature learning for unsupervised deep domain adaptation, in: Proceedings of the AAAI conference on artificial intelligence, pp. 3296\u20133303 (2019a)","DOI":"10.1609\/aaai.v33i01.33013296"},{"key":"1959_CR9","doi-asserted-by":"crossref","unstructured":"Chen, C., Xie, W., Huang, W., Rong, Y., Ding, X., Huang, Y., Xu, T., Huang, J.: Progressive feature alignment for unsupervised domain adaptation, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 627\u2013636 (2019b)","DOI":"10.1109\/CVPR.2019.00072"},{"key":"1959_CR10","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.1109\/TCSVT.2022.3209336","volume":"33","author":"H Chen","year":"2022","unstructured":"Chen, H., Lin, Y., Li, B., Tan, S.: Learning features of intra-consistency and inter-diversity: Keys toward generalizable deepfake detection. IEEE Trans. Circuits Syst. Video Technol. 33, 1468\u20131480 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1959_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, Y., Song, Y., Liu, L., Wang, J.: Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 18710\u201318719 (2022b)","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"1959_CR12","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1109\/TCYB.2021.3110128","volume":"53","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Zhang, H., Wang, Y., Peng, W., Zhang, W., Wu, Q.J., Yang, Y.: D-bin: A generalized disentangling batch instance normalization for domain adaptation. IEEE Trans. Cybernet. 53, 2151\u20132163 (2021)","journal-title":"IEEE Trans. Cybernet."},{"key":"1959_CR13","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: Deep learning with depthwise separable convolutions, in: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1251\u20131258, (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"1959_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Ververas, E., Kotsia, I., Zafeiriou, S.: Retinaface: Single-shot multi-level face localisation in the wild, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5203\u20135212 (2020)","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"1959_CR15","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1109\/TIP.2022.3186531","volume":"31","author":"Z Deng","year":"2022","unstructured":"Deng, Z., Zhou, K., Li, D., He, J., Song, Y.Z., Xiang, T.: Dynamic instance domain adaptation. IEEE Trans. Image Process. 31, 4585\u20134597 (2022)","journal-title":"IEEE Trans. Image Process."},{"key":"1959_CR16","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Ferrer, C.: The deepfake detection challenge (dfdc) preview dataset. (2019) arxiv 2019. arXiv: 1910.08854"},{"key":"1959_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s40747-024-01634-6","volume":"11","author":"H Duan","year":"2025","unstructured":"Duan, H., Jiang, Q., Jin, X., Wozniak, M., Zhao, Y., Wu, L., Yao, S., Zhou, W.: Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection. Complex Intelli. Syst. 11, 11 (2025)","journal-title":"Complex Intelli. Syst."},{"key":"1959_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ipl.2005.11.003","volume":"97","author":"PS Efraimidis","year":"2006","unstructured":"Efraimidis, P.S., Spirakis, P.G.: Weighted random sampling with a reservoir. Inf. Process. Lett. 97, 181\u2013185 (2006)","journal-title":"Inf. Process. Lett."},{"key":"1959_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128128","volume":"598","author":"E Essa","year":"2024","unstructured":"Essa, E.: Feature fusion vision transformers using mlp-mixer for enhanced deepfake detection. Neurocomputing 598, 128128 (2024)","journal-title":"Neurocomputing"},{"key":"1959_CR20","doi-asserted-by":"crossref","unstructured":"Farahani, A., Voghoei, S., Rasheed, K., Arabnia, H.R.: A brief review of domain adaptation. Advances in data science and information engineering: proceedings from ICDATA 2020 and IKE 2020, 877\u2013894 (2021)","DOI":"10.1007\/978-3-030-71704-9_65"},{"key":"1959_CR21","unstructured":"Ganin, Y., Lempitsky, V.: Unsupervised domain adaptation by backpropagation, in: International conference on machine learning, PMLR. pp. 1180\u20131189 (2015)"},{"key":"1959_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108450","volume":"133","author":"J Gao","year":"2024","unstructured":"Gao, J., Micheletto, M., Orr\u00f9, G., Concas, S., Feng, X., Marcialis, G.L., Roli, F.: Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection. Eng. Appl. Artif. Intell. 133, 108450 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1959_CR23","doi-asserted-by":"crossref","unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., Yi, R.: Exploiting fine-grained face forgery clues via progressive enhancement learning, in: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 735\u2013743, (2022)","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"1959_CR24","doi-asserted-by":"crossref","unstructured":"Guo, X., Liu, X., Ren, Z., Grosz, S., Masi, I., Liu, X.: Hierarchical fine-grained image forgery detection and localization, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3155\u20133165 (2023)","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"1959_CR25","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., Pantic, M.: Lips don\u2019t lie: A generalisable and robust approach to face forgery detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5039\u20135049 (2021)","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"1959_CR26","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1109\/TIFS.2023.3269152","volume":"18","author":"R Han","year":"2023","unstructured":"Han, R., Wang, X., Bai, N., Wang, Q., Liu, Z., Xue, J.: Fcd-net: Learning to detect multiple types of homologous deepfake face images. IEEE Trans. Inf. Forensics Secur. 18, 2653\u20132666 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1959_CR27","doi-asserted-by":"crossref","unstructured":"Huang, X., Belongie, S.: Arbitrary style transfer in real-time with adaptive instance normalization, in: Proceedings of the IEEE international conference on computer vision, pp. 1501\u20131510, (2017)","DOI":"10.1109\/ICCV.2017.167"},{"key":"1959_CR28","unstructured":"Jiang, J., Zhai, C.: Instance weighting for domain adaptation in nlp, ACL (2007)"},{"key":"1959_CR29","doi-asserted-by":"crossref","unstructured":"Jiang, L., Li, R., Wu, W., Qian, C., Loy, C.C.: Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2889\u20132898 (2020)","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"1959_CR30","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 6458\u20136467 (2021a)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"1959_CR31","doi-asserted-by":"publisher","first-page":"12167","DOI":"10.1109\/TKDE.2021.3117003","volume":"35","author":"J Li","year":"2021","unstructured":"Li, J., Xie, H., Yu, L., Gao, X., Zhang, Y.: Discriminative feature mining based on frequency information and metric learning for face forgery detection. IEEE Trans. Knowl. Data Eng. 35, 12167\u201312180 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1959_CR32","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5001\u20135010 (2020a)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"1959_CR33","doi-asserted-by":"crossref","unstructured":"Li, R., Jiao, Q., Cao, W., Wong, H.S., Wu, S.: Model adaptation: Unsupervised domain adaptation without source data, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 9641\u20139650 (2020b)","DOI":"10.1109\/CVPR42600.2020.00966"},{"key":"1959_CR34","doi-asserted-by":"publisher","first-page":"4260","DOI":"10.1109\/TIP.2018.2839528","volume":"27","author":"S Li","year":"2018","unstructured":"Li, S., Song, S., Huang, G., Ding, Z., Wu, C.: Domain invariant and class discriminative feature learning for visual domain adaptation. IEEE Trans. Image Process. 27, 4260\u20134273 (2018)","journal-title":"IEEE Trans. Image Process."},{"key":"1959_CR35","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TCSVT.2022.3217950","volume":"33","author":"X Li","year":"2022","unstructured":"Li, X., Ni, R., Yang, P., Fu, Z., Zhao, Y.: Artifacts-disentangled adversarial learning for deepfake detection. IEEE Trans. Circuits Syst. Video Technol. 33, 1658\u20131670 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1959_CR36","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.patcog.2018.03.005","volume":"80","author":"Y Li","year":"2018","unstructured":"Li, Y., Wang, N., Shi, J., Hou, X., Liu, J.: Adaptive batch normalization for practical domain adaptation. Pattern Recogn. 80, 109\u2013117 (2018)","journal-title":"Pattern Recogn."},{"key":"1959_CR37","unstructured":"Li, Y., Wang, N., Shi, J., Liu, J., Hou, X.: Revisiting batch normalization for practical domain adaptation. (2016) arXiv preprint arXiv:1603.04779"},{"key":"1959_CR38","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 3207\u20133216 (2020c)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"1959_CR39","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., Yu, N.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 772\u2013781 (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"1959_CR40","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/TIE.2016.2627020","volume":"64","author":"W Lu","year":"2016","unstructured":"Lu, W., Liang, B., Cheng, Y., Meng, D., Yang, J., Zhang, T.: Deep model based domain adaptation for fault diagnosis. IEEE Trans. Indus. Electron. 64, 2296\u20132305 (2016)","journal-title":"IEEE Trans. Indus. Electron."},{"key":"1959_CR41","doi-asserted-by":"crossref","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos, in: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, Springer. pp. 667\u2013684 (2020)","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"1959_CR42","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations, in: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), IEEE. pp. 83\u201392 (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"1959_CR43","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F 2 trans: High-frequency fine-grained transformer for face forgery detection. IEEE Trans. Inf. Forensics Secur. 18, 1039\u20131051 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1959_CR44","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., Echizen, I.: Multi-task learning for detecting and segmenting manipulated facial images and videos, in: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS), IEEE. pp. 1\u20138 (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"1959_CR45","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: Face forgery detection by mining frequency-aware clues, in: European conference on computer vision, Springer. pp. 86\u2013103 (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"1959_CR46","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., Echizen, I.: Distinguishing computer graphics from natural images using convolution neural networks, in: 2017 IEEE workshop on information forensics and security (WIFS), IEEE. pp. 1\u20136 (2017)","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"1959_CR47","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization, in: Proceedings of the IEEE international conference on computer vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"1959_CR48","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18720\u201318729 (2022)","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"1959_CR49","unstructured":"Tan, M., Le, Q.: Efficientnet: Rethinking model scaling for convolutional neural networks, in: International conference on machine learning, PMLR. pp. 6105\u20136114 (2019)"},{"key":"1959_CR50","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 14923\u201314932 (2021)","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"1959_CR51","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chen, C., Zhang, N., Hu, X.: Watcher: Wavelet-guided texture-content hierarchical relation learning for deepfake detection. International Journal of Computer Vision, 1\u201322 (2024)","DOI":"10.1007\/s11263-024-02116-5"},{"key":"1959_CR52","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yu, K., Chen, C., Hu, X., Peng, S.: Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7278\u20137287 (2023)","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"1959_CR53","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, pp. 8261\u20138265. IEEE, Speech and Signal Processing (ICASSP) (2019)","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"1959_CR54","doi-asserted-by":"crossref","unstructured":"You, K., Long, M., Cao, Z., Wang, J., Jordan, M.I.: Universal domain adaptation, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2720\u20132729 (2019)","DOI":"10.1109\/CVPR.2019.00283"},{"key":"1959_CR55","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.neucom.2022.06.013","volume":"501","author":"M Yu","year":"2022","unstructured":"Yu, M., Ju, S., Zhang, J., Li, S., Lei, J., Li, X.: Patch-dfd: Patch-based end-to-end deepfake discriminator. Neurocomputing 501, 583\u2013595 (2022)","journal-title":"Neurocomputing"},{"key":"1959_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127192","volume":"572","author":"M Yu","year":"2024","unstructured":"Yu, M., Li, H., Yang, J., Li, X., Li, S., Zhang, J.: Fdml: Feature disentangling and multi-view learning for face forgery detection. Neurocomputing 572, 127192 (2024)","journal-title":"Neurocomputing"},{"key":"1959_CR57","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhou, F., Zhao, G.: Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"1959_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, D., Chen, J., Liao, X., Li, F., Chen, J., Yang, G.: Face forgery detection via multi-feature fusion and local enhancement. IEEE Transactions on Circuits and Systems for Video Technology (2024a)","DOI":"10.1109\/TCSVT.2024.3390945"},{"key":"1959_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, K., Hou, Z., Hua, Z., Zheng, Y., Zhang, L.Y.: Boosting deepfake detection generalizability via expansive learning and confidence judgement. IEEE Transactions on Circuits and Systems for Video Technology (2024b)","DOI":"10.1109\/TCSVT.2024.3462985"},{"key":"1959_CR60","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1959_CR61","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.G.: Wilddeepfake: A challenging real-world dataset for deepfake detection, in: Proceedings of the 28th ACM international conference on multimedia, pp. 2382\u20132390 (2020)","DOI":"10.1145\/3394171.3413769"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01959-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-025-01959-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01959-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T10:25:44Z","timestamp":1761387944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-025-01959-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":61,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1959"],"URL":"https:\/\/doi.org\/10.1007\/s00530-025-01959-3","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"11 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"372"}}