{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:07Z","timestamp":1750749007415,"version":"3.41.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/saci66288.2025.11030130","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:33Z","timestamp":1750699473000},"page":"571-576","source":"Crossref","is-referenced-by-count":0,"title":["AI-Manipulated Reality: Generation and Detection of Deepfake Content"],"prefix":"10.1109","author":[{"given":"B\u00e1lint Antal","family":"Csanky","sequence":"first","affiliation":[{"name":"&#x00D3;buda University,John von Neumann Faculty of Informatics,Budapest,Hungary"}]},{"given":"Szandra Anna","family":"Laczi","sequence":"additional","affiliation":[{"name":"Doctoral School of Applied Infromatics and Applied Mathematics, &#x00D3;buda University,Budapest,Hungary"}]},{"given":"Val\u00e9ria","family":"P\u00f3ser","sequence":"additional","affiliation":[{"name":"&#x00D3;buda University,John von Neumann Faculty of Informatics,Budapest,Hungary"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12700\/APH.21.10.2024.10.18"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.12700\/aph.20.4.2023.4.11"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC55078.2022.9987265"},{"issue":"10","key":"ref4","volume-title":"The state of deepfakes","volume":"8","author":"C.","year":"2019"},{"volume-title":"\u00c1l\/arc - A deepfake \u00e9s a digit\u00e1lis vide\u00f3manipul\u00e1ci\u00f3","year":"2020","author":"Mezriczky","key":"ref5"},{"volume-title":"Identity Fraud Report","year":"2023","key":"ref6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"volume-title":"Generative adversarial nets. Advances in neural information processing systems","year":"2014","author":"Goodfellow","key":"ref9"},{"volume-title":"DeepFaceLab","year":"2024","key":"ref10"},{"volume-title":"The eyes know it: FakeET-an eye-tracking database to understand Deepfake perception.","year":"2020","author":"G.","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413532"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2017-1452"},{"volume-title":"DEEP VOICE 3: SCALING TEXT-TO-SPEECH WITH CONVOLUTIONAL SEQUENCE LEARNING","year":"2018","key":"ref16"},{"key":"ref17","first-page":"83144","article-title":"Deepvision: Deepfakes detection using","author":"K.","year":"2020","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9089-1_19"},{"key":"ref20","first-page":"2223","article-title":"Unpaired image-to image translation using cycle-consistent adversarial. networks","volume-title":"Proceedings of the IEEE international conference on computer vision","author":"I.","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"volume-title":"A large-scale video dataset for forgery detection in human faces","year":"2018","author":"Rssler","key":"ref24"},{"volume-title":"The deepfake detection challenge (dfdc) dataset","year":"2020","author":"Dolhansky","key":"ref25"},{"volume-title":"Deepfakes: a new threat to face recognition? assessment and detection","year":"2018","author":"K.","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/CCC50068.2020.9188580"},{"key":"ref28","first-page":"2952","article-title":"SSTNet: Detecting manipulated faces through spatial, steganalysis and temporal features","volume-title":"Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)","author":"G.","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308428"},{"volume-title":"A Hybrid CNN-LSTM model for Video Deepfake Detection by Leveraging Optical Flow Features","year":"2022","author":"P.","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref32","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International conference on machine learning","author":"M.","year":"2019"},{"volume-title":"Rapid object detection using a boosted cascade of simple features. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","year":"2001","author":"P.","key":"ref33"},{"volume-title":"One millisecond face alignment with an ensemble of regression trees. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","year":"2018","author":"V.","key":"ref34"},{"volume-title":"Fortinet","year":"2024","key":"ref35"}],"event":{"name":"2025 IEEE 19th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2025,5,19]]},"location":"Timisoara, Romania","end":{"date-parts":[[2025,5,24]]}},"container-title":["2025 IEEE 19th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11030063\/11030073\/11030130.pdf?arnumber=11030130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:33:32Z","timestamp":1750746812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11030130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saci66288.2025.11030130","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}