{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T13:37:55Z","timestamp":1775741875572,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002885","name":"China Meteorological Administration","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002885","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010144","name":"Chengdu University of Information Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651330","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:35:05Z","timestamp":1725888905000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["Masked Conditional Diffusion Model for Enhancing Deepfake Detection"],"prefix":"10.1109","author":[{"given":"Tiewen","family":"Chen","sequence":"first","affiliation":[{"name":"Chengdu University of Information Technology"}]},{"given":"Shanmin","family":"Yang","sequence":"additional","affiliation":[{"name":"Chengdu University of Information Technology"}]},{"given":"Shu","family":"Hu","sequence":"additional","affiliation":[{"name":"Purdue University in Indianapolis"}]},{"given":"Zhenghan","family":"Fang","sequence":"additional","affiliation":[{"name":"Johns Hopkins University"}]},{"given":"Ying","family":"Fu","sequence":"additional","affiliation":[{"name":"Chengdu University of Information Technology"}]},{"given":"Xi","family":"Wu","sequence":"additional","affiliation":[{"name":"Chengdu University of Information Technology"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"University at Albany, State University of New York (SUNY)"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Generative adversarial nets","volume-title":"Advances in neural information processing systems","volume":"27","author":"Goodfellow"},{"key":"ref2","volume-title":"Improved denoising diffusion probabilistic models","author":"Nichol","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03766-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3528233.3530757"},{"key":"ref5","first-page":"8780","article-title":"Diffusion models beat gans on image synthesis","volume-title":"Advances in neural information processing systems","volume":"34","author":"Dhariwal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43895-0_71"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43895-0_32"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0012422000003660"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00094"},{"key":"ref11","article-title":"Robustness and generalizability of deepfake detection: A study with diffusion models","author":"Song","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref13","article-title":"Faceswap","author":"Kowalski","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref15","article-title":"Deep reinforcement learning for image-to-image translation","author":"Wang","year":"2023"},{"key":"ref16","article-title":"End-to-end speech-driven realistic facial animation with temporal gans","volume-title":"Computer Vision and Pattern Recognition, Computer Vision and Pattern Recognition","author":"Vougioukas"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw.2017.229"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108832"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3157297"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3296062"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_41"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01450"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icassp48485.2024.10447611"},{"key":"ref29","article-title":"X-transfer: A transfer learning-based framework for robust gan-generated fake image detection","author":"Zhang","year":"2023"},{"key":"ref30","article-title":"Improving cross-dataset deepfake detection with deep information decomposition","author":"Yang","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR59079.2023.00035"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00459"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR54900.2022.00047"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746597"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref38","article-title":"Mover: Mask and recovery based facial part consistency aware method for deepfake video detection","author":"Hu","year":"2023"},{"key":"ref39","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Advances in neural information processing systems","volume":"33","author":"Ho"},{"key":"ref40","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International Conference on machine learning","author":"Tan"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4414\/bms.2019.17951"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.262"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00327"},{"key":"ref46","volume-title":"Faceforensics: A large-scale video dataset for forgery detection in human faces","author":"R\u00f6ssler","year":"2018"},{"key":"ref47","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","volume-title":"Advances in neural information processing systems","volume":"30","author":"Heusel"},{"key":"ref48","article-title":"Progressive growing of gans for improved quality, stability, and variation","volume-title":"International Conference on Learning Representations, International Conference on Learning Representations","author":"Karras"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2009.5206848"},{"key":"ref50","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01228-7"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","location":"Yokohama, Japan","start":{"date-parts":[[2024,6,30]]},"end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651330.pdf?arnumber=10651330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T18:58:20Z","timestamp":1764183500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651330","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}