{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:07:21Z","timestamp":1761898041538,"version":"3.33.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,15]]},"DOI":"10.1109\/icme57554.2024.10687795","type":"proceedings-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:24:16Z","timestamp":1727717056000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["ConfR: Conflict Resolving for Generalizable Deepfake Detection"],"prefix":"10.1109","author":[{"given":"Jin","family":"Chen","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Jiahe","family":"Tian","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Cai","family":"Yu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Xi","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Microelectronics,Beijing,China"}]},{"given":"Zhaoxing","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Yesheng","family":"Chai","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Jiao","family":"Dai","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Jizhong","family":"Han","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"article-title":"FaceShifter: Towards High Fidelity And Occlusion Aware Face Swapping","year":"2020","author":"Li","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR52729.2023.00829","article-title":"Fine-Grained Face Swapping via Regional GAN Inversion","author":"Liu","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/wifs.2018.8630761"},{"article-title":"In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking","year":"2018","author":"Li","key":"ref4"},{"key":"ref5","first-page":"1","article-title":"FaceForensics++: Learning to Detect Manipulated Facial Images","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"R\u00f6ssler"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/CVPRW56347.2022.00011","article-title":"CORE: Consistent Representation Learning for Face Forgery Detection","volume-title":"2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Ni"},{"key":"ref8","first-page":"24597","article-title":"OST: Improving Generalization of DeepFake Detection via One-Shot Test-Time Training","volume":"35","author":"Chen","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"article-title":"The DeepFake Detection Challenge (DFDC) Dataset","year":"2020","author":"Dolhansky","key":"ref10"},{"article-title":"WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection","year":"2021","author":"Zi","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16367"},{"article-title":"Exposing DeepFake Videos By Detecting Face Warping Artifacts","year":"2019","author":"Li","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00500"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.01475"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.00408"},{"article-title":"Gradient Surgery for Multi-Task Learning","year":"2020","author":"Yu","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00656"},{"key":"ref22","article-title":"DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection","volume-title":"Advances in Neural Information Processing Systems","author":"Yan","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICME55011.2023.00359"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859897"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102914"},{"article-title":"MarekKowalski\/FaceSwap","year":"2024","author":"Marek","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"article-title":"EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks","year":"2020","author":"Tan","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"article-title":"Invariant Risk Minimization","year":"2020","author":"Arjovsky","key":"ref31"},{"volume-title":"GitHub","key":"ref32","article-title":"f-dangel\/backpack: BackPACK - a backpropagation package built on top of PyTorch which efficiently computes quantities other than the gradient"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"article-title":"EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks","year":"2020","author":"Tan","key":"ref35"},{"article-title":"An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale","year":"2021","author":"Dosovitskiy","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"}],"event":{"name":"2024 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2024,7,15]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2024,7,19]]}},"container-title":["2024 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10685847\/10687354\/10687795.pdf?arnumber=10687795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:23:47Z","timestamp":1736969027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10687795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,15]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icme57554.2024.10687795","relation":{},"subject":[],"published":{"date-parts":[[2024,7,15]]}}}