{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T06:45:29Z","timestamp":1768459529492,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,4]]},"DOI":"10.1109\/imcom51814.2021.9377373","type":"proceedings-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T20:18:40Z","timestamp":1616012320000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation"],"prefix":"10.1109","author":[{"given":"Eric","family":"Tjon","sequence":"first","affiliation":[]},{"given":"Melody","family":"Moh","sequence":"additional","affiliation":[]},{"given":"Teng-Sheng","family":"Moh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref11","article-title":"The deepfake detection challenge dataset","author":"dolhansky","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref12","article-title":"Detecting deepfakes for future robotic systems","author":"tjon","year":"2020","journal-title":"Safety Security and Reliability of Robotic Systems Algorithms Applications and Technologies B Gupta and N Nedja Eds"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00187"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00934-2_99"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref17","article-title":"Multi-task learning for detecting and segmenting manipulated facial images and videos","author":"nguyen","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"ref19","article-title":"Deep-fake detection using spatiotemporal convolutional networks","author":"de lima","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref4","first-page":"39","article-title":"Adversarial attacks and defense on deep learning models for big data and iot","author":"mani","year":"2019","journal-title":"Handbook of Research on Cloud Computing and Big Data Applications in IoT"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.2021010105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013408"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref7","article-title":"In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking","author":"li","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref1","article-title":"Generative adversarial networks for image synthesis and detection methods","author":"tjon","year":"2020","journal-title":"Adversary-Aware Learning Techniques and Trends in Cybersecurity P Dasgupta J Collins and R Mittu Eds"},{"key":"ref9","article-title":"Forensictransfer: Weakly-supervised domain adaptation for forgery detection","author":"cozzolino","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref20","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume":"abs 1905 11946","author":"tan","year":"2019","journal-title":"ArXiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.373"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00675"},{"key":"ref24","author":"seferbekov","year":"2020","journal-title":"Deepfake detection (dfdc) solution by selimsef GitHub Repository"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"}],"event":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","location":"Seoul, Korea (South)","start":{"date-parts":[[2021,1,4]]},"end":{"date-parts":[[2021,1,6]]}},"container-title":["2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377321\/9377322\/09377373.pdf?arnumber=9377373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:02Z","timestamp":1652197442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9377373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/imcom51814.2021.9377373","relation":{},"subject":[],"published":{"date-parts":[[2021,1,4]]}}}