{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:37:48Z","timestamp":1769045868955,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11063-023-11249-6","type":"journal-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T05:46:17Z","timestamp":1680500777000},"page":"7057-7076","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Cascaded Network Based on EfficientNet and Transformer for Deepfake Video Detection"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3996-5569","authenticated-orcid":false,"given":"Liwei","family":"Deng","sequence":"first","affiliation":[]},{"given":"Jiandong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"key":"11249_CR1","unstructured":"Korshunov P, Marcel S (2018) Deepfakes: a new threat to face recognition? assessment and detection. Preprint at https:\/\/arxiv.org\/abs\/1812.08685"},{"key":"11249_CR2","unstructured":"Wang T, Cheng H, Chow KP, Nie L (2022) Deep convolutional pooling transformer for deepfake detection. arXiv preprint arXiv:2209.05299"},{"issue":"3","key":"11249_CR3","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TCSVT.2021.3074259","volume":"32","author":"J Hu","year":"2021","unstructured":"Hu J, Liao X, Wang W, Qin Z (2021) Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network. IEEE Trans Circuits Syst Video Technol 32(3):1089\u20131102","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"11249_CR4","doi-asserted-by":"crossref","unstructured":"Brockschmidt J, Shang J, Wu J (2019) On the generality of facial forgery detection. In: 2019 IEEE 16th international conference on mobile Ad Hoc and sensor systems workshops (MASSW), pp. 43\u201347. IEEE","DOI":"10.1109\/MASSW.2019.00015"},{"issue":"2","key":"11249_CR5","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TPAMI.2019.2932058","volume":"44","author":"J Yu","year":"2019","unstructured":"Yu J, Tan M, Zhang H, Rui Y, Tao D (2019) Hierarchical deep click feature prediction for fine-grained image recognition. IEEE Trans Pattern Anal Mach Intell 44(2):563\u2013578","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"11249_CR6","doi-asserted-by":"publisher","first-page":"3952","DOI":"10.1109\/TII.2018.2884211","volume":"15","author":"C Hong","year":"2018","unstructured":"Hong C, Yu J, Zhang J, Jin X, Lee K-H (2018) Multimodal face-pose estimation with multitask manifold deep learning. IEEE Trans Industr Inf 15(7):3952\u20133961","journal-title":"IEEE Trans Industr Inf"},{"key":"11249_CR7","unstructured":"Wodajo D, Atnafu S (2021) Deepfake video detection using convolutional vision transformer. arXiv preprint arXiv:2102.11126"},{"key":"11249_CR8","doi-asserted-by":"crossref","unstructured":"Qi H, Guo Q, Juefei-Xu F, Xie X, Ma L, Feng W, Liu Y, Zhao J (2020) Deeprhythm: exposing deepfakes with attentional visual heartbeat rhythms. In: Proceedings of the 28th ACM international conference on multimedia, pp. 4318\u20134327","DOI":"10.1145\/3394171.3413707"},{"key":"11249_CR9","unstructured":"Tan M, Le Q (2021) Efficientnetv2: smaller models and faster training. In: International conference on machine learning, pp 10096\u201310106. PMLR"},{"key":"11249_CR10","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S, et al (2020) An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929"},{"key":"11249_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107952","volume":"116","author":"J Zhang","year":"2021","unstructured":"Zhang J, Cao Y, Wu Q (2021) Vector of locally and adaptively aggregated descriptors for image feature representation. Pattern Recogn 116:107952","journal-title":"Pattern Recogn"},{"issue":"12","key":"11249_CR12","doi-asserted-by":"publisher","first-page":"5659","DOI":"10.1109\/TIP.2015.2487860","volume":"24","author":"C Hong","year":"2015","unstructured":"Hong C, Yu J, Wan J, Tao D, Wang M (2015) Multimodal deep autoencoder for human pose recovery. IEEE Trans Image Process 24(12):5659\u20135670","journal-title":"IEEE Trans Image Process"},{"key":"11249_CR13","doi-asserted-by":"crossref","unstructured":"Wang W, Xie E, Li X, Fan D-P, Song K, Liang D, Lu T, Luo P, Shao L (2021) Pyramid vision transformer: a versatile backbone for dense prediction without convolutions. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 568\u2013578","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"11249_CR14","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst, 30"},{"key":"11249_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13797-w","author":"M Zanardelli","year":"2022","unstructured":"Zanardelli M, Guerrini F, Leonardi R, Adami N (2022) Image forgery detection: a survey of recent deep-learning approaches. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13797-w","journal-title":"Multimed Tools Appl"},{"key":"11249_CR16","doi-asserted-by":"crossref","unstructured":"Korshunova I, Shi W, Dambre J, Theis L (2017) Fast face-swap using convolutional neural networks. In: Proceedings of the IEEE international conference on computer vision, pp 3677\u20133685","DOI":"10.1109\/ICCV.2017.397"},{"key":"11249_CR17","unstructured":"Perov I, Gao D, Chervoniy N, Liu K, Marangonda S, Um\u00e9 C, Dpfks M, Facenheim CS, RP L, Jiang J, et al (2020) Deepfacelab: integrated, flexible and extensible face-swapping framework. arXiv preprint arXiv:2005.05535"},{"key":"11249_CR18","unstructured":"Li L, Bao J, Yang H, Chen D, Wen F (2019) Faceshifter: Towards high fidelity and occlusion aware face swapping. arXiv preprint arXiv:1912.13457"},{"key":"11249_CR19","doi-asserted-by":"publisher","first-page":"4159","DOI":"10.1007\/s11063-021-10588-6","volume":"53","author":"Y Su","year":"2021","unstructured":"Su Y, Xia H, Liang Q, Nie W (2021) Exposing deepfake videos using attention based convolutional lstm network. Neural Process Lett 53:4159\u20134175","journal-title":"Neural Process Lett"},{"key":"11249_CR20","doi-asserted-by":"crossref","unstructured":"Vlasic D, Brand M, Pfister H, Popovic J (2006) Face transfer with multilinear models. In: ACM SIGGRAPH 2006 Courses, p. 24","DOI":"10.1145\/1185657.1185864"},{"key":"11249_CR21","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"11249_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M (2019) Deferred neural rendering: image synthesis using neural textures. Acm Trans Graph (TOG) 38(4):1\u201312","journal-title":"Acm Trans Graph (TOG)"},{"key":"11249_CR23","doi-asserted-by":"crossref","unstructured":"Ko\u00c7ak A, Alkan M (2022) Deepfake generation, detection and datasets: a rapid-review. In: 2022 15th International conference on information security and cryptography (ISCTURKEY), pp 86\u201391. IEEE","DOI":"10.1109\/ISCTURKEY56345.2022.9931802"},{"key":"11249_CR24","unstructured":"LIY CM, InIctuOculi L (2018) Exposingaicreated fakevideosbydetectingeyeblinking. In: Proceedings of the 2018 IEEE International workshop on information forensics and security (WIFS), Hong Kong, China, pp 11\u201313"},{"key":"11249_CR25","doi-asserted-by":"crossref","unstructured":"Gupta P, Chugh K, Dhall A, Subramanian R (2020) The eyes know it: Fakeet-an eye-tracking database to understand deepfake perception. In: Proceedings of the international conference on multimodal interaction, pp. 519\u2013527","DOI":"10.1145\/3382507.3418857"},{"key":"11249_CR26","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International workshop on information forensics and security (WIFS), pp 1\u20137. IEEE","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"11249_CR27","doi-asserted-by":"crossref","unstructured":"Dhere S, Rathod SB, Aarankalle S, Lad Y, Gandhi M (2020) A review on face reenactment techniques. In: 2020 International conference on industry 4.0 technology (I4Tech), pp 191\u2013194. IEEE","DOI":"10.1109\/I4Tech48345.2020.9102668"},{"key":"11249_CR28","doi-asserted-by":"crossref","unstructured":"Amerini I, Caldelli R (2020) Exploiting prediction error inconsistencies through lstm-based classifiers to detect deepfake videos. In: Proceedings of the 2020 ACM workshop on information hiding and multimedia security, pp. 97\u2013102","DOI":"10.1145\/3369412.3395070"},{"issue":"5","key":"11249_CR29","doi-asserted-by":"publisher","first-page":"3117","DOI":"10.1002\/int.22814","volume":"37","author":"J Zhang","year":"2022","unstructured":"Zhang J, Yang J, Yu J, Fan J (2022) Semisupervised image classification by mutual learning of multiple self-supervised models. Int J Intell Syst 37(5):3117\u20133141","journal-title":"Int J Intell Syst"},{"key":"11249_CR30","doi-asserted-by":"crossref","unstructured":"Wu B, Niu G, Yu J, Xiao X, Zhang J, Wu H (2021) Weakly supervised dense video captioning via jointly usage of knowledge distillation and cross-modal matching. arXiv preprint arXiv:2105.08252","DOI":"10.24963\/ijcai.2021\/160"},{"issue":"10","key":"11249_CR31","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","volume":"44","author":"Y Nirkin","year":"2021","unstructured":"Nirkin Y, Wolf L, Keller Y, Hassner T (2021) Deepfake detection based on discrepancies between faces and their context. IEEE Trans Pattern Anal Mach Intell 44(10):6111\u20136121","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"11249_CR32","doi-asserted-by":"publisher","first-page":"4854","DOI":"10.1109\/TCSVT.2021.3133859","volume":"32","author":"J Yang","year":"2021","unstructured":"Yang J, Xiao S, Li A, Lu W, Gao X, Li Y (2021) Msta-net: forgery detection by generating manipulation trace based on multi-scale self-texture attention. IEEE Trans Circuits Syst Video Technol 32(7):4854\u20134866","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"11249_CR33","doi-asserted-by":"crossref","unstructured":"Deng L, Suo H, Li D (2022) Deepfake video detection based on efficientnet-v2 network. Comput Intell Neurosci, 2022","DOI":"10.1155\/2022\/3441549"},{"issue":"5","key":"11249_CR34","first-page":"1671","volume":"16","author":"D Zhang","year":"2022","unstructured":"Zhang D, Wu P, Li F, Zhu W, Sheng VS (2022) Cascaded-hop for deepfake videos detection. KSII Trans Internet Inf Syst (TIIS) 16(5):1671\u20131686","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"11249_CR35","unstructured":"Esler T (2021) Pretrained pytorch face detection (mtcnn) and recognition (inceptionresnet) models. https:\/\/github.com\/timesler\/facenet-pytorchreferences"},{"key":"11249_CR36","doi-asserted-by":"crossref","unstructured":"Chacon-Murguia MI, Guzman-Pando A (2022) Moving object detection in video sequences based on a two-frame temporal information cnn. Neural Process Lett, 1\u201325","DOI":"10.1007\/s11063-022-11092-1"},{"issue":"6","key":"11249_CR37","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1049\/bme2.12031","volume":"10","author":"P Yu","year":"2021","unstructured":"Yu P, Xia Z, Fei J, Lu Y (2021) A survey on deepfake video detection. Iet Biom 10(6):607\u2013624","journal-title":"Iet Biom"},{"key":"11249_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148","journal-title":"Inf Fusion"},{"key":"11249_CR39","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/TIFS.2022.3146766","volume":"17","author":"Y Wang","year":"2022","unstructured":"Wang Y, Peng C, Liu D, Wang N, Gao X (2022) Forgerynir: deep face forgery and detection in near-infrared scenario. IEEE Trans Inf Forensics Secur 17:500\u2013515","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11249_CR40","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International conference on computer vision, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"11249_CR41","doi-asserted-by":"crossref","unstructured":"Jiang L, Li R, Wu W, Qian C, Loy CC (2020) Deeperforensics-1.0: a large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2889\u20132898","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"11249_CR42","unstructured":"Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC (2019) The deepfake detection challenge (dfdc) preview dataset. arXiv preprint arXiv:1910.08854"},{"key":"11249_CR43","doi-asserted-by":"crossref","unstructured":"Nirkin Y, Keller Y, Hassner T (2019) Fsgan: Subject agnostic face swapping and reenactment. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 7184\u20137193","DOI":"10.1109\/ICCV.2019.00728"},{"key":"11249_CR44","doi-asserted-by":"crossref","unstructured":"Sun Y, Zhang Z, Qiu C, Wang L, Sun L, Wang Z (2022) Faketransformer: Exposing face forgery from spatial-temporal representation modeled by facial pixel variations. In: 2022 7th international conference on intelligent computing and signal processing (ICSP), pp 705\u2013713. IEEE","DOI":"10.1109\/ICSP54964.2022.9778420"},{"key":"11249_CR45","doi-asserted-by":"crossref","unstructured":"Khan SA, Dang-Nguyen D-T (2022) Hybrid transformer network for deepfake detection. In: Proceedings of the 19th international conference on content-based multimedia indexing, pp 8\u201314","DOI":"10.1145\/3549555.3549588"},{"key":"11249_CR46","unstructured":"Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neural networks. In: International conference on machine learning, pp 6105\u20136114. PMLR"},{"key":"11249_CR47","doi-asserted-by":"crossref","unstructured":"Zhu X, Wang H, Fei H, Lei Z, Li SZ (2021) Face forgery detection by 3d decomposition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2929\u20132939","DOI":"10.1109\/CVPR46437.2021.00295"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11249-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-023-11249-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-023-11249-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T19:10:11Z","timestamp":1698520211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-023-11249-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":47,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["11249"],"URL":"https:\/\/doi.org\/10.1007\/s11063-023-11249-6","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]},"assertion":[{"value":"11 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}