{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:49:32Z","timestamp":1776440972311,"version":"3.51.2"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of Home Affairs, Government of India"},{"name":"Prime Minister&#x0027;s Research Fellowship"},{"name":"UGC-Net Junior Research Fellowship"},{"name":"IBM Fellowship"},{"name":"Swarnajayanti Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tai.2023.3299894","type":"journal-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T13:49:10Z","timestamp":1690811350000},"page":"1573-1585","source":"Crossref","is-referenced-by-count":19,"title":["Low-Quality Deepfake Detection via Unseen Artifacts"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7943-8424","authenticated-orcid":false,"given":"Saheb","family":"Chhabra","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2528-9950","authenticated-orcid":false,"given":"Kartik","family":"Thakral","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8910-4161","authenticated-orcid":false,"given":"Surbhi","family":"Mittal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5952-2274","authenticated-orcid":false,"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4060-4573","authenticated-orcid":false,"given":"Richa","family":"Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093628"},{"key":"ref4","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","volume-title":"Proc. Int. Conf Neural Inf. Process. Syst.","author":"Ilyas","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2381872"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1419512"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169959"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2013.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2024156.2024164"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201283"},{"key":"ref15","article-title":"FaceSwap","year":"2016"},{"key":"ref16","article-title":"Deepfakes FaceSwap","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00379"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.135"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref22","article-title":"FaceForensics: A large-scale video dataset for forgery detection in human faces","author":"Rssler","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00327"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007968"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00939"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042797"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref29","article-title":"Exploiting human social cognition for the detection of fake and fraudulent faces via memory networks","author":"Fernando","year":"2019"},{"key":"ref30","article-title":"Exposing deepFake videos by detecting face warping artifacts","author":"Li","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref32","first-page":"38","article-title":"Protecting world leaders against deep fakes","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops","author":"Agarwal","year":"2019"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00890"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FG47880.2020.00089"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"ref44","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053969"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref48","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Krizhevsky","year":"2012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2227726"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"ref53","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan","year":"2019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3201887"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/10495741\/10197527.pdf?arnumber=10197527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T19:00:56Z","timestamp":1764270056000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10197527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tai.2023.3299894","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}