{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T09:11:02Z","timestamp":1742807462140,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,21]]},"DOI":"10.1109\/m2vip58386.2023.10413387","type":"proceedings-article","created":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:28:38Z","timestamp":1706898518000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["ConTrans-Detect: A Multi-Scale Convolution-Transformer Network for DeepFake Video Detection"],"prefix":"10.1109","author":[{"given":"Weirong","family":"Sun","sequence":"first","affiliation":[{"name":"School of Mathematical and Computational Sciences, Massey University,Auckland,New Zealand"}]},{"given":"Yujun","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Mathematical and Computational Sciences, Massey University,Auckland,New Zealand"}]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical and Computational Sciences, Massey University,Auckland,New Zealand"}]},{"given":"Ruili","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematical and Computational Sciences, Massey University,Auckland,New Zealand"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref2","first-page":"121","article-title":"Stochastic gradient vb and the variational auto-encoder","volume-title":"Second international conference on learning representations, ICLR","volume":"19","author":"Kingma","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03867-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/M2VIP.2017.8211432"},{"key":"ref6","article-title":"Deepfake video detection using convolutional vision transformer","author":"Wodajo","year":"2021","journal-title":"arXiv preprint"},{"key":"ref7","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2015.7486599"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International conference on machine learning","author":"Tan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.092"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.079"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109884"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.047"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"ref19","article-title":"Improving entity linking through semantic reinforced entity embeddings","author":"Hou","year":"2021","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.05.040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2021.104108"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-022-00961-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612301"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05144-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109905"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"issue":"1","key":"ref28","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref29","article-title":"Densenet: Implementing efficient convnet descriptor pyramids","author":"Iandola","year":"2014","journal-title":"arXiv preprint"},{"key":"ref30","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746899"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3549555.3549588"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06433-3_19"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/info11020125"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3274783"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3087348"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00630"},{"key":"ref39","article-title":"The deepfake detection challenge (dfdc) dataset","author":"Dolhansky","year":"2020","journal-title":"arXiv preprint"},{"key":"ref40","article-title":"Deepfakes: a new threat to face recognition? assessment and detection","author":"Korshunov","year":"2018","journal-title":"arXiv preprint"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref43","article-title":"The deepfake detection challenge (dfdc) preview dataset","author":"Dolhansky","year":"2019","journal-title":"arXiv preprint"},{"key":"ref44","article-title":"Deepfake detection scheme based on vision transformer and distillation","author":"Heo","year":"2021","journal-title":"arXiv preprint"}],"event":{"name":"2023 29th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)","start":{"date-parts":[[2023,11,21]]},"location":"Queenstown, New Zealand","end":{"date-parts":[[2023,11,24]]}},"container-title":["2023 29th International Conference on Mechatronics and Machine Vision in Practice (M2VIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10413343\/10413344\/10413387.pdf?arnumber=10413387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T20:39:06Z","timestamp":1707251946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10413387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/m2vip58386.2023.10413387","relation":{},"subject":[],"published":{"date-parts":[[2023,11,21]]}}}