{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T12:06:48Z","timestamp":1768997208297,"version":"3.49.0"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["K003088-00-S04"],"award-info":[{"award-number":["K003088-00-S04"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3157297","type":"journal-article","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T21:35:35Z","timestamp":1646775335000},"page":"32574-32583","source":"Crossref","is-referenced-by-count":47,"title":["Robust Attentive Deep Neural Network for Detecting GAN-Generated Faces"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6641-7410","authenticated-orcid":false,"given":"Hui","family":"Guo","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Engineering and Applied Sciences, University at Albany, State University of New York, Albany, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1446-4140","authenticated-orcid":false,"given":"Shu","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, State University of New York, Buffalo, NY, USA"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, State University of New York, Buffalo, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9325-5341","authenticated-orcid":false,"given":"Ming-Ching","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering and Applied Sciences, University at Albany, State University of New York, Albany, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0992-685X","authenticated-orcid":false,"given":"Siwei","family":"Lyu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, State University of New York, Buffalo, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. NIPS","author":"Goodfellow"},{"key":"ref2","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"arXiv:1710.10196","author":"Karras","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref5","first-page":"1","article-title":"Alias-free generative adversarial networks","volume-title":"Proc. NeurIPS","author":"Karras"},{"key":"ref6","volume-title":"A Spy Reportedly Used an AI-Generated Profile Picture to Connect With Sources on LinkedIn","year":"2019"},{"key":"ref7","volume-title":"A High School Student Created a Fake 2020 US Candidate. Twitter Verified it","year":"2020"},{"key":"ref8","volume-title":"How Fake Faces are Being Weaponized Online","year":"2020"},{"key":"ref9","volume-title":"These Faces are not Real","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206009"},{"key":"ref13","first-page":"1","article-title":"Forensics face detection from GANs using convolutional neural network","volume-title":"Proc. ISITC","author":"Do"},{"key":"ref14","article-title":"FakeSpotter: A simple yet robust baseline for spotting AI-synthesized fake faces","volume-title":"arXiv:1909.06122","author":"Wang","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746597"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.683"},{"key":"ref21","volume-title":"Machine Learning: A Probabilistic Perspective","author":"Murphy","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2090"},{"key":"ref24","first-page":"445","article-title":"The case against accuracy estimation for comparing induction algorithms","volume-title":"Proc. ICML","volume":"98","author":"Provost"},{"key":"ref25","first-page":"848","article-title":"Optimizing classifier performance via an approximation to the Wilcoxon-Mann-Whitney statistic","volume-title":"Proc. ICML","author":"Yan"},{"key":"ref26","first-page":"1","article-title":"A univariate bound of area under ROC","volume-title":"Proc. UAI","author":"Lyu"},{"key":"ref27","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035099"},{"key":"ref29","article-title":"Detection, attribution and localization of GAN generated images","volume-title":"arXiv:2007.10466","author":"Goebel","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00329"},{"key":"ref33","article-title":"Detecting GAN-generated imagery using color cues","volume-title":"arXiv:1812.08247","author":"McCloskey","year":"2018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107616"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref37","article-title":"Leveraging frequency analysis for deep fake image recognition","volume-title":"arXiv:2003.08685","author":"Frank","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335724"},{"key":"ref40","article-title":"Neural machine translation by jointly learning to align and translate","volume-title":"arXiv:1409.0473","author":"Bahdanau","year":"2014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/app11093883"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_18"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.667"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref51","article-title":"Rethinking the value of labels for improving class-imbalanced learning","volume-title":"arXiv:2006.07529","author":"Yang","year":"2020"},{"key":"ref52","first-page":"1567","article-title":"Learning imbalanced datasets with label-distribution-aware margin loss","volume-title":"Proc. NeurIPS","author":"Cao"},{"key":"ref53","first-page":"21013","article-title":"Learning by minimizing the sum of ranked range","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Hu"},{"key":"ref54","article-title":"Sum of ranked range loss for supervised learning","volume-title":"arXiv:2106.03300","author":"Hu","year":"2021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00512"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.580"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref59","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume-title":"arXiv:1506.01497","author":"Ren","year":"2015"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980791"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484336"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.396"},{"key":"ref63","first-page":"2017","article-title":"Spatial transformer networks","volume-title":"Proc. NIPS","volume":"28","author":"Jaderberg"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2020.605132"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref66","first-page":"313","article-title":"AUC optimization vs. error rate minimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"16","author":"Cortes"},{"key":"ref67","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Paszke"},{"key":"ref68","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. ICLR","author":"Kingma"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09729775.pdf?arnumber=9729775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:54:03Z","timestamp":1705535643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9729775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3157297","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}