{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:18Z","timestamp":1767339618648,"version":"3.37.3"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007250","name":"Mississippi State University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007250","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427659","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:29Z","timestamp":1707867329000},"page":"0721-0727","source":"Crossref","is-referenced-by-count":5,"title":["Deepfakes \u2013 Reality Under Threat?"],"prefix":"10.1109","author":[{"given":"Md Shohel","family":"Rana","sequence":"first","affiliation":[{"name":"Florida Gulf Coast University,Computing and Software Engineering,Fort Myers,United States"}]},{"given":"Md","family":"Solaiman","sequence":"additional","affiliation":[{"name":"Daffodil International University,Software Engineering,Dhaka,Bangladesh"}]},{"given":"Charan","family":"Gudla","sequence":"additional","affiliation":[{"name":"Mississippi State University,Computer Science and Engineering,Starkville,United States"}]},{"given":"Md Fahimuzzman","family":"Sohan","sequence":"additional","affiliation":[{"name":"Florida Gulf Coast University,Computing and Software Engineering,Fort Myers,United States"}]}],"member":"263","reference":[{"article-title":"FaceApp","key":"ref1"},{"article-title":"FaceApp","key":"ref2"},{"year":"2018","author":"Patrini","article-title":"The state of Deepfakes: reality under attack","key":"ref3"},{"year":"2019","author":"Ajder","article-title":"The State of Deepfakes: Landscape, Threats, and Impact","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CVPR.2016.262"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3072959.3073640"},{"article-title":"FaceApp","key":"ref7"},{"author":"Oberoi","article-title":"Exploring DeepFakes","key":"ref8"},{"author":"Hui","article-title":"How deep learning fakes videos (Deep-fake) and how to detect it?","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/WACVW.2019.00020"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TPAMI.2020.3009287"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3394171.3414034"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/access.2020.3023037"},{"year":"2020","author":"Wang","article-title":"Exposing Deep-faked Videos by Anomalous Co-motion Pattern Detection","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.5555\/2969033.2969125"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICASSP.2019.8683164"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/WIFS47025.2019.9035107"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/WIFS.2018.8630761"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CVPR.2017.195"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/WIFS.2018.8630787"},{"volume-title":"CVPR Workshops","author":"Li","article-title":"Exposing Deepfake videos by detecting face warping artifacts","key":"ref21"},{"year":"2020","author":"Ganiyusufoglu","article-title":"Spatio-temporal Features for Generalized Detection of Deepfake Videos","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-030-63830-6_27"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICICS49469.2020.239493"},{"year":"2020","author":"Dong","article-title":"Identity-Driven DeepFake Detection","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/WIFS49906.2020.9360901"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/3409501.3409542"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-030-69541-5_8"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/CVPR42600.2020.00582"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICASSP.2019.8682602"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/icpr48806.2021.9412711"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00021"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/AVSS.2018.8639163"},{"year":"2020","author":"Tariq","article-title":"A Convolutional LSTM based Residual Network for Deepfake Video Detection","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/978-3-030-58571-6_39"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/SSCI47803.2020.9308305"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/iccv48922.2021.01483"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.3390\/e22020249"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1145\/3394171.3413570"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2022.3154404"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/IIAI-AAI53430.2021.00079"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/ACCESS.2019.2905689"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/978-3-030-22868-2_34"},{"volume-title":"20th Irish Machine Vision and Image Processing conference (IMVIP 2018)","author":"Koopman","article-title":"Detection of Deepfake Video Manipulation","key":"ref44"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427659.pdf?arnumber=10427659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:40:00Z","timestamp":1727502000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427659","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}