{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:42:30Z","timestamp":1777455750842,"version":"3.51.4"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62066011"],"award-info":[{"award-number":["62066011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012547","name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","doi-asserted-by":"publisher","award":["2022GXNSFAA035640"],"award-info":[{"award-number":["2022GXNSFAA035640"]}],"id":[{"id":"10.13039\/100012547","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012547","name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","doi-asserted-by":"publisher","award":["2023GXNSFAA026057"],"award-info":[{"award-number":["2023GXNSFAA026057"]}],"id":[{"id":"10.13039\/100012547","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018603","name":"Guangxi Key Laboratory of Embedded Technology and Intelligent System Foundation","doi-asserted-by":"publisher","award":["2019-2-4"],"award-info":[{"award-number":["2019-2-4"]}],"id":[{"id":"10.13039\/501100018603","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018603","name":"Guangxi Key Laboratory of Embedded Technology and Intelligent System Foundation","doi-asserted-by":"publisher","award":["2019-2-5"],"award-info":[{"award-number":["2019-2-5"]}],"id":[{"id":"10.13039\/501100018603","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3499353","type":"journal-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T18:49:48Z","timestamp":1731696588000},"page":"180135-180145","source":"Crossref","is-referenced-by-count":2,"title":["Meta-Learning With Relation Embedding for Few-Shot Deepfake Detection"],"prefix":"10.1109","volume":"12","author":[{"given":"Xiaoyong","family":"Liu","sequence":"first","affiliation":[{"name":"College of Physics and Electronic Information Engineering, Guilin University of Technology, Guilin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pengcheng","family":"Song","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Embedded Technology and Intelligent System, Guilin University of Technology, Guilin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6284-5805","authenticated-orcid":false,"given":"Pei","family":"Lu","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Embedded Technology and Intelligent System, Guilin University of Technology, Guilin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanjun","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Embedded Technology and Intelligent System, Guilin University of Technology, Guilin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Goodfellow"},{"key":"ref2","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00787"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19784-0_17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03766-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108832"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3588574"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3249566"},{"key":"ref11","article-title":"On first-order meta-learning algorithms","author":"Nichol","year":"2018","journal-title":"arXiv:1803.02999"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"ref17","article-title":"DeepFake detection based on the discrepancy between the face and its context","author":"Nirkin","year":"2020","journal-title":"arXiv:2008.12262"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app10010370"},{"key":"ref22","article-title":"ForensicTransfer: Weakly-supervised domain adaptation for forgery detection","author":"Cozzolino","year":"2018","journal-title":"arXiv:1812.02510"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00051"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref25","article-title":"Meta-SGD: Learning to learn quickly for few-shot learning","author":"Li","year":"2017","journal-title":"arXiv:1707.09835"},{"key":"ref26","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref27","first-page":"1","article-title":"Matching networks for one shot learning","volume":"29","author":"Vinyals","year":"2016","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00676"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3043128"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00870"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3700-8"},{"key":"ref33","article-title":"A closer look at few-shot classification","author":"Chen","year":"2019","journal-title":"arXiv:1904.04232"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3243616"},{"key":"ref35","article-title":"The caltech-ucsd birds-200\u20132011 dataset","author":"Wah","year":"2011"},{"issue":"1","key":"ref36","first-page":"1","article-title":"Novel dataset for fine-grained image categorization: Stanford dogs","volume-title":"Proc. CVPR Workshop Fine-Grained Vis. Categorization (FGVC)","volume":"2","author":"Khosla"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00245"},{"key":"ref38","article-title":"Meta-learning with warped gradient descent","author":"Flennerhag","year":"2019","journal-title":"arXiv:1909.00025"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295163"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00743"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00419"},{"issue":"3","key":"ref42","first-page":"689","article-title":"Few-shot learning method based on class enhancement and multi-scale adaptation","volume":"39","author":"Dong","year":"2024","journal-title":"J. Data Acquisition Process."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11735-w"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3001510"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107797"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10754643.pdf?arnumber=10754643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:02:59Z","timestamp":1733882579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10754643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3499353","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}