{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:39:15Z","timestamp":1774449555981,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,5]]},"DOI":"10.1109\/icme51207.2021.9428361","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:14:21Z","timestamp":1623273261000},"page":"1-6","source":"Crossref","is-referenced-by-count":74,"title":["DefakeHop: A Light-Weight High-Performance Deepfake Detector"],"prefix":"10.1109","author":[{"given":"Hong-Shuo","family":"Chen","sequence":"first","affiliation":[{"name":"University of Southern California,Los Angeles,California,USA"}]},{"given":"Mozhdeh","family":"Rouhsedaghat","sequence":"additional","affiliation":[{"name":"University of Southern California,Los Angeles,California,USA"}]},{"given":"Hamza","family":"Ghani","sequence":"additional","affiliation":[{"name":"University of Southern California,Los Angeles,California,USA"}]},{"given":"Shuowen","family":"Hu","sequence":"additional","affiliation":[{"name":"Army Research Laboratory,Adelphi,Maryland,USA"}]},{"given":"Suya","family":"You","sequence":"additional","affiliation":[{"name":"Army Research Laboratory,Adelphi,Maryland,USA"}]},{"given":"C.-C.","family":"Jay Kuo","sequence":"additional","affiliation":[{"name":"University of Southern California,Los Angeles,California,USA"}]}],"member":"263","reference":[{"key":"ref10","first-page":"38","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"2019","journal-title":"CVPR Workshops"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9191012"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.jvcir.2016.11.003","article-title":"Understanding convolutional neural net-works with a mathematical model","volume":"41","author":"jay kuo","year":"2016","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.jvcir.2019.03.010","article-title":"Interpretable convolutional neural net-works via feedforward design","volume":"60","author":"jay kuo","year":"2019","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"ref15","article-title":"Facehop: A light-weight low-resolution face gender classification method","author":"rouhsedaghat","year":"2020"},{"key":"ref16","article-title":"Low-resolution face recognition in resource-constrained environments","author":"rouhsedaghat","year":"2020"},{"key":"ref17","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"li","year":"2019","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Work-shops (CVPRW)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00019"},{"key":"ref19","article-title":"Deep-fakes and beyond: A survey of face manipulation and fake detection","author":"tolosana","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref6","article-title":"Use of a capsule network to detect fake images and videos","author":"nguyen","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref8","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref7","first-page":"1","article-title":"Deepfake video detection using recurrent neural networks","author":"g\u00fcera","year":"2018","journal-title":"2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref1","article-title":"Deepfakes evolution: Analysis of facial regions and fake detection performance","author":"tolosana","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"}],"event":{"name":"2021 IEEE International Conference on Multimedia and Expo (ICME)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,5]]},"end":{"date-parts":[[2021,7,9]]}},"container-title":["2021 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9428049\/9428068\/09428361.pdf?arnumber=9428361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:28:08Z","timestamp":1656365288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9428361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icme51207.2021.9428361","relation":{},"subject":[],"published":{"date-parts":[[2021,7,5]]}}}