{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:01:10Z","timestamp":1768341670360,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10877153","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning"],"prefix":"10.1109","author":[{"given":"Shahad","family":"Altamimi","sequence":"first","affiliation":[{"name":"Princess Sumaya University for Technology,Cyber Security Department,Amman,Jordan"}]},{"given":"Walid","family":"Salameh","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology,Computer Science Department,Amman,Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icccs49678.2020.9277436"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icngis54955.2022.10079802"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icccs49678.2020.9277436"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icngis54955.2022.10079802"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/iit59782.2023.10366475"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3239223"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT55367.2022.9972081"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAfS52090.2021.9606067"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151186"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO56286.2022.9964871"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IATMSI60426.2024.10502574"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3342107"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartTechCon57526.2023.10391497"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCMI56532.2022.10068449"},{"key":"ref15","first-page":"663","article-title":"A Survey on Video-Based Fake News Detection Techniques","volume-title":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Agrawal"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP57908.2023.10270932"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CBMI50038.2021.9461905"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148347"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190655"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEAS58693.2023.10429877"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS61402.2024.10482344"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ODICON54453.2022.10010086"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS49678.2020.9277436"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION49465.2021.9626932"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/UPCON52273.2021.9667591"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIIME59043.2023.00098"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IC2PCT60090.2024.10486232"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","location":"Zarqa, Jordan","start":{"date-parts":[[2024,12,10]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10877153.pdf?arnumber=10877153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:04Z","timestamp":1740081484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10877153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10877153","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}