{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:21:49Z","timestamp":1771467709427,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227763","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Cross-domain Deepfake Videos with Contrastive Prototype Learning"],"prefix":"10.1109","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[{"name":"Lancaster University,School of Computing and Communications,Lancaster,UK"}]},{"given":"Plamen","family":"Angelov","sequence":"additional","affiliation":[{"name":"Lancaster University,School of Computing and Communications,Lancaster,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11733-y"},{"key":"ref5","article-title":"Ukraine war: Deepfake video of Zelenskyy telling Ukrainians to \u2019lay down arms\u2019 debunked","author":"Burgess","year":"2023","journal-title":"Sky News"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref7","article-title":"The tug-of-war between deepfake generation and detection","volume-title":"Proceedings of the International Conference on Machine Learning (ICML)","author":"Lee"},{"key":"ref8","article-title":"ImplicitDeepfake: Plausible face-swapping through implicit deepfake generation using nerf and gaussian splatting","author":"Stanishevskii","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICME57554.2024.10687902"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1167\/jov.23.9.5327"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3392512"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00385"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304936"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3239223"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.191"},{"key":"ref19","article-title":"Domain generalisation with domain augmented supervised contrastive learning","volume-title":"Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI)","author":"Le"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3119927"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW67362.2025.00651"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i14.29536"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746941"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3216611"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73027-6_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00823"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.07.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43895-0_41"},{"key":"ref29","article-title":"Robust self-supervised learning for adversarial attack detection","volume-title":"Proceedings of Conference on Neural Information Processing Systems (NeurIPS)","author":"Li"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10651159"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2024.3473768"},{"key":"ref32","article-title":"Learning sparse prototypes for text generation","volume-title":"Proceedings of Conference on Neural Information Processing Systems (NeurIPS)","author":"He"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00082"},{"key":"ref34","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"Proceedings of International Conference on Machine Learning (ICML)","author":"Chen"},{"key":"ref35","article-title":"Contrastive learning with large memory bank and negative embedding subtraction for accurate copy detection","author":"Yokoo","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2921572"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3356122"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref39","article-title":"Learning multiple layers of features from tiny images","volume-title":"Master\u2019s thesis","author":"Krizhevsky","year":"2009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i17.34042"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00676"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00691"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201357"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01426"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00325"},{"key":"ref46","article-title":"Improving domain generalization with domain relations","volume-title":"Proceedings of International Conference on Learning Representations (ICLR)","author":"Yao"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00382"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534089"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00044"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","location":"Rome, Italy","start":{"date-parts":[[2025,6,30]]},"end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227763.pdf?arnumber=11227763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:38:32Z","timestamp":1763192312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227763","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}