{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:26:02Z","timestamp":1740101162948,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936117,62106037,62076052"],"award-info":[{"award-number":["U1936117,62106037,62076052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011222","name":"Open Project Program of the National Laboratory of Pattern Recognition (NLPR)","doi-asserted-by":"publisher","award":["202100032"],"award-info":[{"award-number":["202100032"]}],"id":[{"id":"10.13039\/501100011222","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["DUT21GF303,DUT20TD110,DUT20RC(3)088"],"award-info":[{"award-number":["DUT21GF303,DUT20TD110,DUT20RC(3)088"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/mmsp55362.2022.9949458","type":"proceedings-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T21:39:16Z","timestamp":1669153156000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Deepfake Detection with Data Privacy Protection"],"prefix":"10.1109","author":[{"given":"Mingkan","family":"Wu","sequence":"first","affiliation":[{"name":"Dalian University of Technology,Dalian,China"}]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,Dalian,China"}]},{"given":"Xiaohan","family":"Wu","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,Dalian,China"}]},{"given":"Fei","family":"Yu","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,Dalian,China"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,Dalian,China"}]},{"given":"Zengren","family":"Song","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/ Coordination Center of China,Beijing,China"}]}],"member":"263","reference":[{"journal-title":"Deepfake Detection Challenge Dataset","year":"2020","author":"dolhansky","key":"ref31"},{"key":"ref30","article-title":"Contributing data to deepfake detection research","author":"dufour","year":"2019","journal-title":"Google AI Blog"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref11","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"konecny","year":"2016","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"ref13","first-page":"133","article-title":"Detection of deepfake video manipulation","author":"koopman","year":"2018","journal-title":"Irish Machine Vision and Image Processing Conference (IMVIP"},{"key":"ref14","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"li","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00336"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00342"},{"key":"ref19","article-title":"Identity-driven deepfake detection","author":"dong","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"journal-title":"Faceswap","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref8","first-page":"1","article-title":"Mesonet: a compact facial video forgery detection network","author":"afchar","year":"2018","journal-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"journal-title":"Deepfake","year":"2018","key":"ref1"},{"key":"ref20","article-title":"Large-scale machine learning with stochastic gradi-ent descent","author":"bottou","year":"2010","journal-title":"Compstat"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/120880811"},{"key":"ref24","first-page":"3","article-title":"Cbam: Convolutional block attention module","author":"woo","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref23","first-page":"1251","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"chollet","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"}],"event":{"name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2022,9,26]]},"location":"Shanghai, China","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9948698\/9948704\/09949458.pdf?arnumber=9949458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:54:08Z","timestamp":1670874848000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9949458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/mmsp55362.2022.9949458","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}