{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T12:16:00Z","timestamp":1777032960705,"version":"3.51.4"},"reference-count":127,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Institute of Information and Communications Technology Planning and Evaluation"},{"name":"Korea Government through the Ministry of Science and Information and Communications Technology (MSIT), South Korea,","award":["RS-2023-00230337"],"award-info":[{"award-number":["RS-2023-00230337"]}]},{"name":"MSIT under the Information Technology Research Center (ITRC) Support Program supervised by IITP","award":["IITP-2023-2020-0-01602"],"award-info":[{"award-number":["IITP-2023-2020-0-01602"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3353785","type":"journal-article","created":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:21:58Z","timestamp":1705353718000},"page":"11674-11687","source":"Crossref","is-referenced-by-count":17,"title":["Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6759-366X","authenticated-orcid":false,"given":"Jaewoo","family":"Park","sequence":"first","affiliation":[{"name":"Graduate School of Information, Yonsei University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3100-2258","authenticated-orcid":false,"given":"Leo Hyun","family":"Park","sequence":"additional","affiliation":[{"name":"Graduate School of Information, Yonsei University, Seoul, South Korea"}]},{"given":"Hong Eun","family":"Ahn","sequence":"additional","affiliation":[{"name":"Graduate School of Information, Yonsei University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5513-0836","authenticated-orcid":false,"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Graduate School of Information, Yonsei University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Generative adversarial networks","author":"Goodfellow","year":"2014","journal-title":"arXiv:1406.2661"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"ref6","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref7","article-title":"Making stochastic neural networks from deterministic ones","author":"Lee","year":"2017"},{"key":"ref8","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01450"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"ref14","first-page":"16805","article-title":"Diffusion models for adversarial purification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nie"},{"key":"ref15","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00411-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/eb057469"},{"key":"ref18","first-page":"30","article-title":"A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology","volume-title":"Proc. 38th Australas. Comput. Sci. Conf. (ACSC)","volume":"27","author":"Herbert"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref24","article-title":"Exposing DeepFake videos by detecting face warping artifacts","author":"Li","year":"2018","journal-title":"arXiv:1811.00656"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01973"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00202"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3587321"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3271121"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3303782"},{"key":"ref32","article-title":"FakeTracer: Proactively defending against face-swap DeepFakes via implanting traces in training","author":"Sun","year":"2023","journal-title":"arXiv:2307.14593"},{"key":"ref33","article-title":"Feature extraction matters more: Universal deepfake disruption through attacking ensemble feature extractors","author":"Tang","year":"2023","journal-title":"arXiv:2303.00200"},{"key":"ref34","article-title":"LEAT: Towards robust Deepfake disruption in real-world scenarios via latent ensemble attack","author":"Shim","year":"2023","journal-title":"arXiv:2307.01520"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26693"},{"key":"ref36","article-title":"Raising the cost of malicious AI-powered image editing","author":"Salman","year":"2023","journal-title":"arXiv:2302.06588"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3266702"},{"key":"ref38","first-page":"7213","article-title":"UnGANable: Defending against GAN-based face manipulation","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX)","author":"Li"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547923"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956501"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01588"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428173"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360910"},{"key":"ref45","article-title":"Protecting against image translation Deepfakes by leaking universal perturbations from black-box neural networks","author":"Ruiz","year":"2020","journal-title":"arXiv:2006.06493"},{"key":"ref46","article-title":"Progressive growing of GANs for improved quality, stability, and variation","author":"Karras","year":"2017","journal-title":"arXiv:1710.10196"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1117\/12.2080393"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01058"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_50"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_11"},{"key":"ref59","first-page":"852","article-title":"Alias-free generative adversarial networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Karras"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851881"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01102"},{"key":"ref63","article-title":"Tackling the generative learning trilemma with denoising diffusion GANs","author":"Xiao","year":"2021","journal-title":"arXiv:2112.07804"},{"key":"ref64","first-page":"319","article-title":"Contrastive learning for unpaired image-to-image translation","volume-title":"Proc. Eur. Conf. Comput. Vis. (ECCV)","author":"Taesung"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00209"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01036"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093474"},{"key":"ref69","article-title":"DeepFakes: A new threat to face recognition? Assessment and detection","author":"Korshunov","year":"2018","journal-title":"arXiv:1812.08685"},{"key":"ref70","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015","journal-title":"arXiv:1511.06434"},{"key":"ref71","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Arjovsky"},{"key":"ref72","article-title":"FaceShifter: Towards high fidelity and occlusion aware face swapping","author":"Li","year":"2019","journal-title":"arXiv:1912.13457"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2109730"},{"key":"ref76","first-page":"25","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Heusel"},{"key":"ref77","first-page":"1","article-title":"Assessing generative models via precision and recall","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sajjadi"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2831899"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2886771"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.421"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00569"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00232"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref88","article-title":"Towards the detection of diffusion model Deepfakes","author":"Ricker","year":"2022","journal-title":"arXiv:2210.14571"},{"key":"ref89","first-page":"24597","article-title":"OST: Improving generalization of Deepfake detection via one-shot test-time training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Chen"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00712"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref105","article-title":"The Deepfake detection challenge (DFDC) preview dataset","author":"Dolhansky","year":"2019","journal-title":"arXiv:1910.08854"},{"key":"ref106","article-title":"The Deepfake detection challenge (DFDC) dataset","author":"Dolhansky","year":"2020","journal-title":"arXiv:2006.07397"},{"key":"ref107","article-title":"LSUN: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"Yu","year":"2015","journal-title":"arXiv:1506.03365"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2018-1929"},{"key":"ref109","volume-title":"Deep Fake Detection Dataset","year":"2019"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1177\/0272989x8900900307"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00516"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24261-3_7"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00229"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00072"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01495"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00329"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/107"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096939"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16254"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"ref127","article-title":"DiffFace: Diffusion-based face swapping with facial guidance","author":"Kim","year":"2022","journal-title":"arXiv:2212.13344"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10399770.pdf?arnumber=10399770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T08:56:31Z","timestamp":1706777791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10399770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":127,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3353785","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}