{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:12:35Z","timestamp":1775034755614,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Manipal Academy of Higher Education, Manipal, Karnataka, India"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3674500","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:24:47Z","timestamp":1773779087000},"page":"46763-46787","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Layer Knowledge Distillation With Custom Temperature Scaling for Deepfake Detection"],"prefix":"10.1109","volume":"14","author":[{"given":"Eva Hemantkumar","family":"Shah","sequence":"first","affiliation":[{"name":"Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, Karnataka, India"}]},{"given":"Utkarsh","family":"Dubey","sequence":"additional","affiliation":[{"name":"Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, Karnataka, India"}]},{"given":"Arshaq Shagihan","family":"Abdul Rahiman","sequence":"additional","affiliation":[{"name":"Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4738-4713","authenticated-orcid":false,"given":"Nisha P.","family":"Shetty","sequence":"additional","affiliation":[{"name":"Manipal Academy of Higher Education, Manipal Institute of Technology, Manipal, Karnataka, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCCM61016.2024.11039864"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-025-02774-0"},{"key":"ref4","volume-title":"Top 5 Cases of AI Deepfake Fraud From 2024 Exposed","year":"2024"},{"key":"ref5","volume-title":"Deepfakes, Explained","year":"2020"},{"key":"ref6","volume-title":"AI-Generated Deepfakes: Statistics, Market Insights, Trends, and Impacts","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2025.1569115"},{"key":"ref8","volume-title":"Beware the AI Voice Scam: A McAfee Global Study","year":"2023"},{"key":"ref9","volume-title":"1 in 10 Executives Say Their Companies Have Already Faced Deepfake Threats","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acea05"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/62922020"},{"key":"ref13","first-page":"1","article-title":"Advances in deepfake detection: Technologies, methods and future directions","volume-title":"Proc. Int. Conf. Data Sci. Bus. Syst. (ICDSBS)","author":"Tejaswi"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19906-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2025.e42273"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3300470"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3178128"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/math13122024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e25933"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1991"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2879"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-023-00614-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app15041954"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/app15179574"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2025.04.095"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging9060122"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13173433"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-025-03970-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2023.117010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3746027.3755786"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2024.104133"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.129256"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00111"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19886"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108341"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101792"},{"key":"ref39","article-title":"Deepfake and real images dataset","author":"Karki","year":"2024"},{"key":"ref40","volume-title":"Deepfake Detection Dataset","year":"2021"},{"key":"ref41","first-page":"5142","article-title":"Towards understanding knowledge distillation","volume-title":"Proc. 36th Int. Conf. Mach. Learn. (ICML)","author":"Phuong"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32095-8_1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.55524\/ijircst.2024.12.3.17"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.52202\/068431-0044"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683438"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1348\/000711010X522227"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/362"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.bpc.2025.107455"},{"key":"ref49","article-title":"Understanding AdamW through proximal methods and scale-freeness","author":"Zhuang","year":"2022","journal-title":"arXiv:2202.00089"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58595-2_40"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108170"},{"key":"ref52","article-title":"FitNets: Hints for thin deep nets","author":"Romero","year":"2015","journal-title":"arXiv:1412.6550"},{"key":"ref53","article-title":"Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer","author":"Zagoruyko","year":"2017","journal-title":"arXiv:1612.03928"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25236"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2024.100605"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1229\/1\/012055"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2765419"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11435908.pdf?arnumber=11435908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:08:45Z","timestamp":1775023725000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11435908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3674500","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}