{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:38:19Z","timestamp":1772725099870,"version":"3.50.1"},"reference-count":84,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179387","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1613-1630","source":"Crossref","is-referenced-by-count":32,"title":["Deepfake Text Detection: Limitations and Opportunities"],"prefix":"10.1109","author":[{"given":"Jiameng","family":"Pu","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Zain","family":"Sarwar","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Sifat Muhammad","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Abdullah","family":"Rehman","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Yoonjin","family":"Kim","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Parantapa","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Mobin","family":"Javed","sequence":"additional","affiliation":[{"name":"LUMS Pakistan"}]},{"given":"Bimal","family":"Viswanath","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Language Models are Unsupervised Multitask Learners","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"key":"ref2","article-title":"Language Models are Few-Shot Learners","volume-title":"Proc. of NeurIPS","author":"Brown"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.226"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K19-1074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3528"},{"key":"ref8","article-title":"Defending Against Neural Fake News","volume-title":"Proc. of NeurIPS","author":"Zellers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"ref10","article-title":"Automated email Generation for Targeted Attacks using Natural Language","volume-title":"Proc. of TA-COS","author":"Das"},{"key":"ref11","article-title":"The Radicalization Risks of GPT-3 and Advanced Neural Language Models","volume-title":"Proc. of CoRR abs\/2009.06807","author":"McGuffie"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p19-3019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.164"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.193"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3385003.3410925"},{"key":"ref17","article-title":"Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks","volume-title":"Proc. of CoRR abs\/2006.14042","author":"Li"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00387"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1082"},{"key":"ref21","article-title":"The Curious Case of Neural Text Degeneration","volume-title":"Proc. of CoRR abs\/1904.09751","author":"Holtzman"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0901_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1239"},{"key":"ref24","article-title":"Learning Internal Representations by Error Propagation","author":"Rumelhart","year":"1987","journal-title":"Neurocomputing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref28","article-title":"Neural Machine Translation by Jointly Learning to Align and Translate","volume-title":"Proc. of ICLR","author":"Bahdanau"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref30","article-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding","volume-title":"Proc. of NAACL","author":"Devlin"},{"key":"ref31","article-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach","volume-title":"Proc. of CoRR abs\/1907.11692","author":"Liu"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.121"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"ref35","article-title":"Common crawl: A nonprofit 501 organization that crawls the web and freely provides its archives and datasets to the public","year":"2019"},{"key":"ref36","article-title":"GROVER: Code for defending against neural fake news","year":"2019"},{"key":"ref37","article-title":"GLTR: Giant Language Model Test Room","year":"2019"},{"key":"ref38","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"JMLR"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w18-5446"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1264"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1082"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.9"},{"key":"ref43","article-title":"AI-Writer text generation service","year":"2020"},{"key":"ref44","article-title":"Article Forge: Get HIGH QUALITY Content In 60 Seconds","year":"2020"},{"key":"ref45","first-page":"1","article-title":"Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"JMLR"},{"key":"ref46","article-title":"Kafkai: AI Writer & AI Content Generator","year":"2020"},{"key":"ref47","article-title":"A GPT-3 bot posted comments on Reddit for a week and no one noticed (MIT Technology Review)","author":"Heaven","year":"2020"},{"key":"ref48","article-title":"Approximation Bounds for Hierarchical Clustering: Average Linkage, Bisecting K-means, and Local Search","volume-title":"Proc. of NeurIPS","author":"Moseley"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1031"},{"key":"ref50","article-title":"Revisiting Few-sample BERT Fine-tuning","volume-title":"Proc. of CoRR abs\/2006.05987","author":"Zhang"},{"key":"ref51","article-title":"Hugging Face: The AI community building the future","year":"2016"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1018"},{"key":"ref53","article-title":"Universal Sentence Encoder","volume-title":"Proc. of CoRR abs\/1803.11175","author":"Cer"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.4"},{"key":"ref55","article-title":"Leveraging Frequency Analysis for Deep Fake Image Recognition","volume-title":"Proc. of ICML","author":"Frank"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-06365-7_22","article-title":"Understanding the Security of Deepfake Detection","volume-title":"Proc. of CoRR abs\/2107.02045","author":"Cao"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref61","article-title":"Exposing DeepFake Videos By Detecting Face Warping Artifacts","volume-title":"Proc. of CoRR abs\/1811.00656","author":"Li"},{"key":"ref62","article-title":"FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals","author":"Ciftci","year":"2020","journal-title":"IEEE TPAMI"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988660"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.501"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.3115\/1073083.1073135","article-title":"BLEU: a Method for Automatic Evaluation of Machine Translation","volume-title":"Proc. of ACL","author":"Papineni"},{"key":"ref67","article-title":"METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments","volume-title":"Proc. of ACL Workshop","author":"Banerjee"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3115\/1289189.1289273"},{"key":"ref69","article-title":"ROUGE: A Package for Automatic Evaluation of Summaries","volume-title":"Proc. of ACL","author":"Lin"},{"key":"ref70","article-title":"Efficient Estimation of Word Representations in Vector Space","volume-title":"Proc. of ICLR Workshop","author":"Mikolov"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30950-2_116"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.104.2.211"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1103"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.742"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.64"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00290"},{"key":"ref78","article-title":"From Word Embeddings to Document Distances","volume-title":"Proc. of ICML","author":"Kusner"},{"key":"ref79","article-title":"ALBERT: A Lite BERT for Self-supervised Learning of Language Representations","volume-title":"Proc. of CoRR abs\/1909.11942","author":"Lan"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_114"},{"key":"ref81","article-title":"Release Strategies and the Social Impacts of Language Models","volume-title":"Proc. of CoRR abs\/1908.09203","author":"Solaiman"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0251415"},{"key":"ref83","article-title":"GridSearchCV in ScikitLearn","year":"2011"},{"key":"ref84","article-title":"Logistic Regression Classifier in ScikitLearn","year":"2011"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179387.pdf?arnumber=10179387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:16:53Z","timestamp":1721452613000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179387","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}