{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:02:39Z","timestamp":1761897759532,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,20]]},"DOI":"10.1109\/secon55815.2022.9918605","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:16:42Z","timestamp":1667517402000},"page":"425-433","source":"Crossref","is-referenced-by-count":5,"title":["DeepFake Videos Detection via Spatiotemporal Inconsistency Learning and Interactive Fusion"],"prefix":"10.1109","author":[{"given":"Xiangling","family":"Ding","sequence":"first","affiliation":[{"name":"Shenzhen The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing Zhengzhou Xinda Institute of Advanced Technology,The School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security,Guangzhou,P. R. China"}]},{"given":"Wenjie","family":"Zhu","sequence":"additional","affiliation":[{"name":"The School of Computer and Communication Engineering Changsha University of Science and Technology,Changsha,P. R. China"}]},{"given":"Dengyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"The School of Computer and Communication Engineering Changsha University of Science and Technology,Changsha,P. R. China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref2","article-title":"Exposing deep-faked videos by anomalous co-motion pattern detection","author":"Wang","year":"2020","journal-title":"arXiv preprint"},{"key":"ref3","first-page":"103170","article-title":"Fake face detection via adaptive manipulation traces extraction network","volume-title":"Computer Vision and Image Understanding","volume":"204","author":"Guo","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref7","article-title":"A convolutional lstm based residual network for deepfake video detection","author":"Tariq","year":"2020","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/int.22499"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00193"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2021.3122146"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107616"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3074259"},{"key":"ref19","article-title":"Unmasking deepfakes with simple features","author":"Durall","year":"2019","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00319"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref24","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref25","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"The Journal of Machine Learning Research"},{"key":"ref26","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363269"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19955"},{"key":"ref31","first-page":"23822390","volume-title":"WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection","author":"Zi","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102487"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref35","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"Li","year":"2018","journal-title":"arXiv preprint"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360901"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00871"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/178"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475508"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.237"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-020-00711-6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2852799"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3086109"},{"volume-title":"Deepfakes github","year":"2019","key":"ref50"}],"event":{"name":"2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","start":{"date-parts":[[2022,9,20]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2022,9,23]]}},"container-title":["2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9918189\/9918161\/09918605.pdf?arnumber=9918605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T04:07:50Z","timestamp":1706069270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9918605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,20]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/secon55815.2022.9918605","relation":{},"subject":[],"published":{"date-parts":[[2022,9,20]]}}}