{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:35:07Z","timestamp":1774931707882,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,5]]},"DOI":"10.1109\/icaic63015.2025.10848832","type":"proceedings-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:02Z","timestamp":1738176242000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Understanding the Threat of Political Deepfakes"],"prefix":"10.1109","author":[{"given":"Kashifah","family":"Afroz","sequence":"first","affiliation":[{"name":"North Carolina Agricultural and Technical State University,Center for Cyber Defense,Greensboro,United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Swetha","family":"Chittam","sequence":"additional","affiliation":[{"name":"North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[{"name":"North Carolina Agricultural and Technical State University,Department of Computer Science,Greensboro,United States"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.56"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2022.113368"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103525"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1940161220944364"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.52282\/icr.v10i2.42"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","DOI":"10.1177\/2056305120903408","article-title":"Deepfakes and Disinformation: Exploring the Impact of Synthetic Political Video on Deception, Uncertainty, and Trust in News","volume":"6","author":"Vaccari","year":"2020","journal-title":"Social Media + Society"},{"issue":"4","key":"ref7","doi-asserted-by":"crossref","DOI":"10.1093\/jcmc\/zmac008","article-title":"The Detection of Political Deepfakes","volume":"27","author":"Appel","year":"2022","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"29","key":"ref8","article-title":"An Error Management Approach to Perceived Fakeness of deepfakes: The Moderating Role of Perceived Deepfake Targeted Politicians\u2019 Personality Characteristics","volume":"42","author":"Ng","year":"2022","journal-title":"Current Psychology"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"22081","DOI":"10.1109\/ACCESS.2023.3251417","article-title":"An Improved Dense CNN Architecture for Deepfake Image Detection","volume":"11","author":"Patel","year":"2023","journal-title":"IEEE Access"},{"key":"ref10","article-title":"How Deep Are the Fakes? Focusing on Audio Deepfake: A Survey","author":"Zahra","year":"2021"},{"key":"ref11","first-page":"38","article-title":"Protecting World Leaders Against Deep Fakes","volume-title":"CVPR workshops","volume":"1","author":"Agarwal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","article-title":"Deepfakes and beyond: A Survey of face manipulation and fake detection","volume":"64","author":"Tolosana","year":"2020","journal-title":"Information Fusion"},{"key":"ref14","first-page":"80847","article-title":"DEEPFAKE Image Synthesis for Data Augmentation","volume-title":"IEEE Access","volume":"10","author":"Waqas","year":"2022"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.37016\/mr-2020-153","article-title":"Beyond the deepfake hype: AI, democracy, and \u2018the Slovak case","author":"de Nadal","year":"2024","journal-title":"Harvard Kennedy School Misinformation Review"},{"issue":"11","key":"ref16","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.3390\/educsci13111073","article-title":"Knowledge, Integration and Scope of Deepfakes in Arts Education: The Development of Critical Thinking in Postgraduate Students in Primary Education and Master\u2019s Degree in Secondary Education","volume":"13","author":"Mutillo-Ligorred","year":"2023","journal-title":"Education Sciences"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.procs.2023.01.283","article-title":"The Effect of Deep Learning Methods on Deepfake Audio Detection for Digital Investigation","volume":"219","author":"Mcuba","year":"2023","journal-title":"Procedia Computer Science"},{"key":"ref18","first-page":"439","article-title":"Not made for each other- Audio-Visual Dissonance-based Deepfake Detection and Localization","volume-title":"Proceedings of the 28th ACM International Conference on Multimedia","author":"Chugh"},{"key":"ref19","first-page":"1","article-title":"FoR: A Dataset for Synthetic Speech Detection","volume-title":"2019 International Conference on Speech Technology and Human-Computer Dialogue (SpeD)","author":"Reimao"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"101114","DOI":"10.1016\/j.csl.2020.101114","article-title":"ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech","volume":"64","author":"Wang","year":"2020","journal-title":"Computer Speech & Language"},{"key":"ref21","article-title":"Wavefake: A Data Set to Facilitate Audio Deepfake Detection","author":"Frank","year":"2021","journal-title":"arXiv preprint"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2018-1929","article-title":"VoxCeleb2: Deep Speaker Recognition","author":"Chung","year":"2018","journal-title":"Interspeech 2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-108"},{"key":"ref24","article-title":"Faceforensics: A large-scale Video Dataset for Forgery Detection in Human Faces","author":"R\u00f6ssler","year":"2018","journal-title":"arXiv preprint"},{"key":"ref25","article-title":"Contributing Data to Deepfake Detection Research","author":"Dufour","year":"2019","journal-title":"research.google"},{"key":"ref26","article-title":"Deeperforensics1.0: A large-scale Dataset for real-world Face Forgery Detection","author":"Jiang","year":"2020"},{"key":"ref27","article-title":"Exposing Deep Fakes Using Inconsistent Head Poses","author":"Yang","year":"2018","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref29","first-page":"1831","article-title":"Two-Stream Neural Networks for Tampered Face Detection","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Zhou"}],"event":{"name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2025,2,5]]},"end":{"date-parts":[[2025,2,7]]}},"container-title":["2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10848546\/10848537\/10848832.pdf?arnumber=10848832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:34:07Z","timestamp":1738215247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icaic63015.2025.10848832","relation":{},"subject":[],"published":{"date-parts":[[2025,2,5]]}}}