{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:06:26Z","timestamp":1773511586504,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T00:00:00Z","timestamp":1728259200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T00:00:00Z","timestamp":1728259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11263-024-02245-x","type":"journal-article","created":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T21:01:44Z","timestamp":1728334904000},"page":"1392-1409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Unified Frequency-Assisted Transformer Framework for Detecting and Grounding Multi-modal Manipulation"],"prefix":"10.1007","volume":"133","author":[{"given":"Huan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zichang","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yunchao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jingdong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,7]]},"reference":[{"key":"2245_CR1","doi-asserted-by":"crossref","unstructured":"Abdelnabi, S., Hasan, R., & Fritz, M. (2022). Open-domain, content-based, multi-modal fact-checking of out-of-context images via online resources. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14940\u201314949.","DOI":"10.1109\/CVPR52688.2022.01452"},{"key":"2245_CR2","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). Mesonet: a compact facial video forgery detection network. In: IEEE Workshop on Information Forensics and Security, pp. 1\u20137. IEEE .","DOI":"10.1109\/WIFS.2018.8630761"},{"issue":"12","key":"2245_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MSPEC.1967.5217220","volume":"4","author":"EO Brigham","year":"1967","unstructured":"Brigham, E. O., & Morrow, R. (1967). The fast fourier transform. IEEE Spectrum, 4(12), 63\u201370.","journal-title":"IEEE Spectrum"},{"key":"2245_CR4","doi-asserted-by":"crossref","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., & Zagoruyko, S. (2020). End-to-end object detection with transformers. In: Proceedings of the European Conference on Computer Vision, pp. 213\u2013229. Springer.","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"2245_CR5","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., & Gelly, S., et\u00a0al. (2020). An image is worth 16x16 words: Transformers for image recognition at scale. In: International Conference on Learning Representations."},{"key":"2245_CR6","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6nherr, L., Fischer, A., Kolossa, D., & Holz, T. (2020). Leveraging frequency analysis for deep fake image recognition. In: International Conference on Machine Learning, pp. 3247\u20133258. PMLR."},{"key":"2245_CR7","doi-asserted-by":"crossref","unstructured":"Gao, G., Huang, H., Fu, C., Li, Z., & He, R. (2021). Information bottleneck disentanglement for identity swapping. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3404\u20133413.","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"2245_CR8","unstructured":"Guan, J., Zhou, H., Hong, Z., Ding, E., Wang, J., Quan, C., & Zhao, Y.(2022). Delving into sequential patches for deepfake detection. In: Advances in Neural Information Processing Systems, 35, 4517."},{"key":"2245_CR9","doi-asserted-by":"crossref","unstructured":"Guo, Y., Zhen, C., & Yan, P. (2023). Controllable guide-space for generalizable face forgery detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision.","DOI":"10.1109\/ICCV51070.2023.01903"},{"key":"2245_CR10","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., & Pantic, M. (2021). Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5039\u20135049.","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"2245_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2245_CR12","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., & Weinberger, K.Q. (2017). Densely connected convolutional networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708.","DOI":"10.1109\/CVPR.2017.243"},{"key":"2245_CR13","doi-asserted-by":"crossref","unstructured":"Jeong, Y., Kim, D., Min, S., Joe, S., Gwon, Y., & Choi, J. (2022). Bihpf: bilateral high-pass filters for robust deepfake detection. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 48\u201357.","DOI":"10.1109\/WACV51458.2022.00293"},{"issue":"3","key":"2245_CR14","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TBIOM.2021.3086109","volume":"3","author":"G Jia","year":"2021","unstructured":"Jia, G., Zheng, M., Hu, C., Ma, X., Xu, Y., Liu, L., Deng, Y., & He, R. (2021). Inconsistency-aware wavelet dual-branch network for face forgery detection. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3), 308\u2013319.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"2245_CR15","doi-asserted-by":"crossref","unstructured":"Jin, Z., Cao, J., Guo, H., Zhang, Y., & Luo, J. (2017). Multimodal fusion with recurrent neural networks for rumor detection on microblogs. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 795\u2013816 .","DOI":"10.1145\/3123266.3123454"},{"issue":"7","key":"2245_CR16","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1007\/s11263-022-01606-8","volume":"130","author":"F Juefei-Xu","year":"2022","unstructured":"Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., & Liu, Y. (2022). Countering malicious deepfakes: Survey, battleground, and horizon. International Journal of Computer Vision, 130(7), 1678\u20131734.","journal-title":"International Journal of Computer Vision"},{"key":"2245_CR17","unstructured":"Kenton, J.D.M.W.C., & Toutanova, L.K. (2019). Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of NAACL-HLT, pp. 4171\u20134186 ."},{"key":"2245_CR18","doi-asserted-by":"crossref","unstructured":"Khattar, D., Goud, J.S., Gupta, M., & Varma, V. (2019). Mvae: Multimodal variational autoencoder for fake news detection. In: The World Wide Web Conference, pp. 2915\u20132921 .","DOI":"10.1145\/3308558.3313552"},{"key":"2245_CR19","unstructured":"Kim, W., Son, B., & Kim, I. (2021). Vilt: Vision-and-language transformer without convolution or region supervision. In: International Conference on Machine Learning, pp. 5583\u20135594. PMLR."},{"key":"2245_CR20","unstructured":"Kingma, D.P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"2245_CR21","first-page":"9694","volume":"34","author":"J Li","year":"2021","unstructured":"Li, J., Selvaraju, R., Gotmare, A., Joty, S., Xiong, C., & Hoi, S. C. H. (2021). Align before fuse: Vision and language representation learning with momentum distillation. Advances in Neural Information Processing Systems, 34, 9694\u20139705.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"2245_CR22","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., & Zhang, Y. (2021).Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6458\u20136467.","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"2245_CR23","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., & Guo, B. (2020). Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001\u20135010 .","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"2245_CR24","doi-asserted-by":"crossref","unstructured":"Li, Q., Shen, L., Guo, S., & Lai, Z.(2020). Wavelet integrated cnns for noise-robust image classification. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7245\u20137254 .","DOI":"10.1109\/CVPR42600.2020.00727"},{"key":"2245_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., Mao, H., Girshick, R., & He, K.(2022). Exploring plain vision transformer backbones for object detection. In: Proceedings of the European Conference on Computer Vision, pp. 280\u2013296. Springer .","DOI":"10.1007\/978-3-031-20077-9_17"},{"key":"2245_CR26","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., & Doll\u00e1r, P. (2017). Focal loss for dense object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2980\u20132988.","DOI":"10.1109\/ICCV.2017.324"},{"key":"2245_CR27","doi-asserted-by":"crossref","unstructured":"Liu, A., & Liang, Y. (2022). Ma-vit: Modality-agnostic vision transformers for face anti-spoofing. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp. 1180\u20131186.","DOI":"10.24963\/ijcai.2022\/165"},{"key":"2245_CR28","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Wan, J., Escalera, S., Guo, G., & Li, S.Z. (2021). Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1179\u20131187.","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2245_CR29","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1109\/TIFS.2021.3065495","volume":"16","author":"A Liu","year":"2021","unstructured":"Liu, A., Tan, Z., Wan, J., Liang, Y., Lei, Z., Guo, G., & Li, S. Z. (2021). Face anti-spoofing via adversarial cross-modality translation. IEEE Transactions on Information Forensics and Security, 16, 2759\u20132772.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2245_CR30","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Yu, Z., Zhao, C., Wan, J., Lei, Y.L.Z., Zhang, D., Li, S.Z., & Guo, G. (2023). Fm-vit: Flexible modal vision transformers for face anti-spoofing. IEEE Transactions on Information Forensics and Security.","DOI":"10.1109\/TIFS.2023.3296330"},{"key":"2245_CR31","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TIFS.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., Tan, Z., Escalera, S., Xing, J., Liang, Y., et al. (2022). Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Transactions on Information Forensics and Security, 17, 2497\u20132507.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2245_CR32","doi-asserted-by":"crossref","unstructured":"Liu, D., Dang, Z., Peng, C., Zheng, Y., Li, S., Wang, N., & Gao, X. (2023). Fedforgery: generalized face forgery detection with residual federated learning. IEEE Transactions on Information Forensics and Security.","DOI":"10.1109\/TIFS.2023.3293951"},{"key":"2245_CR33","doi-asserted-by":"crossref","unstructured":"Liu, F., Wang, Y., Wang, T., & Ordonez, V.,(2021). Visual news: Benchmark and challenges in news image captioning. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 6761\u20136771.","DOI":"10.18653\/v1\/2021.emnlp-main.542"},{"issue":"6","key":"2245_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3640344","volume":"20","author":"H Liu","year":"2024","unstructured":"Liu, H., Liu, X., Tan, Z., Li, X., & Zhao, Y. (2024). Padvg: A simple baseline of active protection for audio-driven video generation. ACM Transactions on Multimedia Computing, Communications and Applications, 20(6), 1.","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"2245_CR35","doi-asserted-by":"crossref","unstructured":"Liu, H., Tan, Z., Tan, C., Wei, Y., Wang, J., & Zhao, Y. (2024). Forgery-aware adaptive transformer for generalizable synthetic image detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10770\u201310780.","DOI":"10.1109\/CVPR52733.2024.01024"},{"key":"2245_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., & Guo, B. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2245_CR37","unstructured":"Loshchilov, I., & Hutter, F. (2017). Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101."},{"key":"2245_CR38","doi-asserted-by":"crossref","unstructured":"Luo, G., Darrell, T., & Rohrbach, A. (2021). Newsclippings: Automatic generation of out-of-context multimodal media. In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 6801\u20136817.","DOI":"10.18653\/v1\/2021.emnlp-main.545"},{"key":"2245_CR39","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W. (2021). Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16317\u201316326.","DOI":"10.1109\/CVPR46437.2021.01605"},{"issue":"7","key":"2245_CR40","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat, S. G. (1989). A theory for multiresolution signal decomposition: the wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 11(7), 674\u2013693.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2245_CR41","doi-asserted-by":"crossref","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., & AbdAlmageed, W. (2020). Two-branch recurrent network for isolating deepfakes in videos. In: Proceedings of the European Conference on Computer Vision, pp. 667\u2013684. Springer.","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"2245_CR42","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., & Yu, N. (2023). F2 trans: High-frequency fine-grained transformer for face forgery detection. IEEE Transactions on Information Forensics and Security, 18, 1039\u20131051.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2245_CR43","doi-asserted-by":"publisher","first-page":"3008","DOI":"10.1109\/TIFS.2022.3198275","volume":"17","author":"C Miao","year":"2022","unstructured":"Miao, C., Tan, Z., Chu, Q., Yu, N., & Guo, G. (2022). Hierarchical frequency-assisted interactive networks for face manipulation detection. IEEE Transactions on Information Forensics and Security, 17, 3008\u20133021.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2245_CR44","doi-asserted-by":"crossref","unstructured":"Mu, M., Das\u00a0Bhattacharjee, S., & Yuan, J. (2023). Self-supervised distilled learning for multi-modal misinformation identification. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 2819\u20132828.","DOI":"10.1109\/WACV56688.2023.00284"},{"key":"2245_CR45","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., & Shao, J. (2020). Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: Proceedings of the European Conference on Computer Vision, pp. 86\u2013103. Springer.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"2245_CR46","unstructured":"Radford, A., Kim, J.W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., Sastry, G., Askell, A., Mishkin, P., & Clark, J., et\u00a0al. (2021). Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PMLR."},{"key":"2245_CR47","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., & Echizen, I. (2017). Distinguishing computer graphics from natural images using convolution neural networks. In: IEEE Workshop on Information Forensics and Security, pp. 1\u20136. IEEE.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"2245_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-092534-9.50007-2","volume-title":"Discrete cosine transform: Algorithms, advantages, applications","author":"KR Rao","year":"1990","unstructured":"Rao, K. R., & Yip, P. (1990). Discrete cosine transform: Algorithms, advantages, applications. USA: Academic Press Professional Inc."},{"key":"2245_CR49","doi-asserted-by":"crossref","unstructured":"Rezatofighi, H., Tsoi, N., Gwak, J., Sadeghian, A., Reid, I., & Savarese, S. (2019). Generalized intersection over union: A metric and a loss for bounding box regression. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 658\u2013666.","DOI":"10.1109\/CVPR.2019.00075"},{"key":"2245_CR50","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nie\u00dfner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"2245_CR51","doi-asserted-by":"crossref","unstructured":"Shao, R., Wu, T., & Liu, Z.(2023). Detecting and grounding multi-modal media manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6904\u20136913.","DOI":"10.1109\/CVPR52729.2023.00667"},{"key":"2245_CR52","doi-asserted-by":"crossref","unstructured":"Shiohara, K., & Yamasaki, T. (2022). Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18720\u201318729.","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"2245_CR53","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/LSP.2022.3214768","volume":"29","author":"Z Tan","year":"2022","unstructured":"Tan, Z., Yang, Z., Miao, C., & Guo, G. (2022). Transformer-based feature compensation and aggregation for deepfake detection. IEEE Signal Processing Letters, 29, 2183\u20132187.","journal-title":"IEEE Signal Processing Letters"},{"key":"2245_CR54","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., & Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems 30."},{"issue":"10","key":"2245_CR55","doi-asserted-by":"publisher","first-page":"3349","DOI":"10.1109\/TPAMI.2020.2983686","volume":"43","author":"J Wang","year":"2020","unstructured":"Wang, J., Sun, K., Cheng, T., Jiang, B., Deng, C., Zhao, Y., Liu, D., Mu, Y., Tan, M., Wang, X., et al. (2020). Deep high-resolution representation learning for visual recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(10), 3349\u20133364.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2245_CR56","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., & Efros, A.A. (2020). Cnn-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8695\u20138704.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"2245_CR57","doi-asserted-by":"crossref","unstructured":"Wang, T., Zhang, Y., Fan, Y., Wang, J., & Chen, Q. (2022). High-fidelity gan inversion for image attribute editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11379\u201311388.","DOI":"10.1109\/CVPR52688.2022.01109"},{"key":"2245_CR58","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ma, F., Jin, Z., Yuan, Y., Xun, G., Jha, K., Su, L., & Gao, J. (2018). Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 849\u2013857.","DOI":"10.1145\/3219819.3219903"},{"key":"2245_CR59","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bao, J., Zhou, W., Wang, W., & Li, H. (2023). Altfreezing for more general video face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4129\u20134138.","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"2245_CR60","doi-asserted-by":"crossref","unstructured":"Woo, S., et\u00a0al. (2022). Add: Frequency attention and multi-view based knowledge distillation to detect low-quality compressed deepfake images. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 122\u2013130.","DOI":"10.1609\/aaai.v36i1.19886"},{"key":"2245_CR61","doi-asserted-by":"crossref","unstructured":"Yamada, I., Asai, A., Shindo, H., Takeda, H., & Matsumoto, Y. (2020). Luke: Deep contextualized entity representations with entity-aware self-attention. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 6442\u20136454.","DOI":"10.18653\/v1\/2020.emnlp-main.523"},{"key":"2245_CR62","doi-asserted-by":"crossref","unstructured":"Ying, Q., Hu, X., Zhou, Y., Qian, Z., Zeng, D., & Ge, S. (2023). Bootstrapping multi-view representations for fake news detection. In: Proceedings of the AAAI Conference on Artificial Intelligence.","DOI":"10.1609\/aaai.v37i4.25670"},{"key":"2245_CR63","unstructured":"Zellers, R., Holtzman, A., Rashkin, H., Bisk, Y., Farhadi, A., Roesner, F., & Choi, Y. (2019). Defending against neural fake news. Advances in Neural Information Processing Systems 32."},{"key":"2245_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, S., Wang, X., Liu, A., Zhao, C., Wan, J., Escalera, S., Shi, H., Wang, Z., & Li, S.Z. (2019). A dataset and benchmark for large-scale multi-modal face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 919\u2013928.","DOI":"10.1109\/CVPR.2019.00101"},{"key":"2245_CR65","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., & Yu, N. (2021). Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185\u20132194 .","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"2245_CR66","doi-asserted-by":"crossref","unstructured":"Zheng, X., Guo, Y., Huang, H., Li, Y., & He, R. (2020). A survey of deep facial attribute analysis. International Journal of Computer Vision, 128, 2002\u20132034.","DOI":"10.1007\/s11263-020-01308-z"},{"key":"2245_CR67","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Yang, Y., Ying, Q., Qian, Z., & Zhang, X. (2023). Multi-modal fake news detection on social media via multi-grained information fusion. In: Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, pp. 343\u2013352.","DOI":"10.1145\/3591106.3592271"},{"key":"2245_CR68","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Sheng, Q., Cao, J., Li, S., Wang, D., & Zhuang, F. (2022). Generalizing to the future: Mitigating entity bias in fake news detection. In: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 2120\u20132125.","DOI":"10.1145\/3477495.3531816"},{"key":"2245_CR69","doi-asserted-by":"crossref","unstructured":"Zhuang, W., Chu, Q., Tan, Z., Liu, Q., Yuan, H., Miao, C., Luo, Z., & Yu, N. (2022). Uia-vit: Unsupervised inconsistency-aware method based on vision transformer for face forgery detection. In: Proceedings of the European Conference on Computer Vision, pp. 391\u2013407. Springer.","DOI":"10.1007\/978-3-031-20065-6_23"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02245-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02245-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02245-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T10:06:02Z","timestamp":1740391562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02245-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,7]]},"references-count":69,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2245"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02245-x","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,7]]},"assertion":[{"value":"21 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}