{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:38:06Z","timestamp":1764333486338,"version":"3.29.0"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,15]]},"DOI":"10.1109\/ijcb62174.2024.10744491","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T18:38:05Z","timestamp":1731350285000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network"],"prefix":"10.1109","author":[{"given":"Yuyang","family":"Sun","sequence":"first","affiliation":[{"name":"The University of Tokyo,Japan"}]},{"given":"Huy H.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"National Institute of Informatics,Japan"}]},{"given":"Chun-Shien","family":"Lu","sequence":"additional","affiliation":[{"name":"Academia Sinica,Taiwan"}]},{"given":"ZhiYong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University,China"}]},{"given":"Lu","family":"Sun","sequence":"additional","affiliation":[{"name":"South China University of Technology,China"}]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref7","first-page":"38","article-title":"Protecting world leaders against deep fakes","volume-title":"CVPR workshops","volume":"1","author":"Agarwal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825953"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01118"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"journal-title":"The deepfake detection challenge (dfdc) dataset","year":"2020","author":"Dolhansky","key":"ref18"},{"journal-title":"The deepfake detection challenge (dfdc) preview dataset","year":"2019","author":"Dolhansky","key":"ref19"},{"journal-title":"Sharpness-aware minimization for efficiently improving generalization","year":"2020","author":"Foret","key":"ref20"},{"key":"ref21","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"ref24","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref26","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"International conference on machine learning","author":"Ioffe"},{"journal-title":"Progressive growing of gans for improved quality, stability, and variation","year":"2017","author":"Karras","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01051"},{"key":"ref31","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"Auto-encoding variational bayes","year":"2013","author":"Kingma","key":"ref32"},{"key":"ref33","first-page":"133","article-title":"Detection of deepfake video manipulation","volume-title":"The 20th Irish machine vision and image processing conference (IMVIP)","author":"Koopman"},{"journal-title":"Faceshifter: Towards high fidelity and occlusion aware face swapping","year":"2019","author":"Li","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"journal-title":"Exposing deepfake videos by detecting face warping artifacts","year":"2018","author":"Li","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"journal-title":"Detecting gan-generated imagery using color cues","year":"2018","author":"McCloskey","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"journal-title":"Bam: Bottleneck attention module","year":"2018","author":"Park","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"journal-title":"Faceforensics: A large-scale video dataset for forgery detection in human faces","year":"2018","author":"R\u00f6ssler","key":"ref50"},{"issue":"1","key":"ref51","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612386"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3172617"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00070"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"ref57","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International conference on machine learning","author":"Tan"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/157"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_38"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02048"},{"journal-title":"Deepfakebench: A comprehensive benchmark of deepfake detection","year":"2023","author":"Yan","key":"ref64"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547913"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00614"}],"event":{"name":"2024 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2024,9,15]]},"location":"Buffalo, NY, USA","end":{"date-parts":[[2024,9,18]]}},"container-title":["2024 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10744408\/10744424\/10744491.pdf?arnumber=10744491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:13:05Z","timestamp":1732691585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10744491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,15]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/ijcb62174.2024.10744491","relation":{},"subject":[],"published":{"date-parts":[[2024,9,15]]}}}