{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:15:56Z","timestamp":1777889756626,"version":"3.51.4"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/iccv51701.2025.00927","type":"proceedings-article","created":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:45:49Z","timestamp":1777491949000},"page":"9945-9954","source":"Crossref","is-referenced-by-count":0,"title":["NullSwap: Proactive Identity Cloaking Against Deepfake Face Swapping"],"prefix":"10.1109","author":[{"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[{"name":"Nanyang Technological University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuaicheng","family":"Niu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harry","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yinglong","family":"Wang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007961"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.00408"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52734.2025.01789"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3266702"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547923"},{"key":"ref12","article-title":"Stochastic neighbor embedding","author":"Hinton","year":"2002","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref14","article-title":"Learning to align from scratch","volume-title":"Conference on Neural Information Processing Systems","author":"Huang"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16254"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01606-8"},{"key":"ref19","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"International Conference on Learning Representations","author":"Karras"},{"key":"ref20","article-title":"Auto-encoding variational bayes","volume-title":"2nd International Conference on Learning Representations","author":"Kingma"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00829"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref25","author":"Perov","year":"2021","journal-title":"Deepfacelab: Integrated, flexible and extensible face-swapping framework"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372803"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02184-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3653457"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/107"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3588574"},{"key":"ref35","author":"Wang","year":"2023","journal-title":"Robust identity perceptual watermark against deepfake face swapping"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680869"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3354573"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3699710"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01450"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19784-0_4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533868"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3383648"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3461958"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00828"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262156"}],"event":{"name":"2025 IEEE\/CVF International Conference on Computer Vision (ICCV)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,10,19]]},"end":{"date-parts":[[2025,10,25]]}},"container-title":["2025 IEEE\/CVF International Conference on Computer Vision (ICCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11443115\/11443287\/11444256.pdf?arnumber=11444256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:20:18Z","timestamp":1777612818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11444256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/iccv51701.2025.00927","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}