{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:50:17Z","timestamp":1774716617116,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006602","name":"AFRL","doi-asserted-by":"publisher","award":["FA8750-18-2-0057"],"award-info":[{"award-number":["FA8750-18-2-0057"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004672","name":"Accenture, Inc.","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004672","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9533868","type":"proceedings-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T21:27:41Z","timestamp":1632173261000},"page":"1-8","source":"Crossref","is-referenced-by-count":32,"title":["Defending against GAN-based DeepFake Attacks via Transformation-aware Adversarial Faces"],"prefix":"10.1109","author":[{"given":"Chaofei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Leah","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref30","article-title":"Ensemble adversarial training: Attacks and defenses","author":"tram\u00e8r","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref10","article-title":"Disrupting deepfakes: Adversarial attacks against conditional image translation networks and facial manipulation systems","author":"ruiz","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"Protecting against image translation deepfakes by leaking universal perturbations from black-box neural networks","author":"ruiz","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref16","article-title":"Cnn-generated images are surprisingly easy to spot&#x2026; for now","author":"wang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref18","article-title":"Hiding faces in plain sight: Disrupting ai face synthesis with adversarial perturbations","author":"li","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref19","article-title":"Disrupting deepfakes with an adversarial attack that survives training","author":"segalis","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref4","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/aic.690370209"},{"key":"ref6","article-title":"Exposing deep fake videos by detecting face warping artifacts","author":"li","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref2","first-page":"1","article-title":"Deep fakes: a looming challenge for privacy, democracy, and national security","author":"chesney","year":"2019","journal-title":"California Law Review"},{"key":"ref9","article-title":"Adversarial deepfakes: Evaluating vulnerability of deepfake detectors to adversarial examples","author":"neekhara","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref1","year":"2020","journal-title":"Faceswap"},{"key":"ref20","author":"lu","year":"2020","journal-title":"faceswap-gan"},{"key":"ref22","article-title":"Generative poisoning attack method against neural networks","author":"yang","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref21","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"0","journal-title":"European Conference on Computer Vision"},{"key":"ref24","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref23","first-page":"6103","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","author":"shafahi","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref26","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref25","author":"abadi","year":"2015","journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,18]]},"end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09533868.pdf?arnumber=9533868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:59Z","timestamp":1652197559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9533868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9533868","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}