{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T03:39:12Z","timestamp":1775273952526,"version":"3.50.1"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276198"],"award-info":[{"award-number":["62276198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2035"],"award-info":[{"award-number":["U22A2035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2096"],"award-info":[{"award-number":["U22A2096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62571405"],"award-info":[{"award-number":["62571405"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306227"],"award-info":[{"award-number":["62306227"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Independent Research Topic Program of Shaanxi Key Laboratory of Intelligent Policing","award":["SXZJ25ZZ02"],"award-info":[{"award-number":["SXZJ25ZZ02"]}]},{"name":"Innovation Capability Support Plan in Shaanxi Province","award":["2025ZC-KJXX-22"],"award-info":[{"award-number":["2025ZC-KJXX-22"]}]},{"name":"Scientific and Technological Innovation Teams in Shaanxi Province","award":["2025RS-CXTD-011"],"award-info":[{"award-number":["2025RS-CXTD-011"]}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}]},{"name":"Shaanxi Province Core Technology Research and Development Project","award":["2024QY2-GJHX-11"],"award-info":[{"award-number":["2024QY2-GJHX-11"]}]},{"name":"Open Research Project of Key Laboratory of Artificial Intelligence Ministry of Education","award":["AI202401"],"award-info":[{"award-number":["AI202401"]}]},{"DOI":"10.13039\/501100018925","name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health","doi-asserted-by":"publisher","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100018925","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["QTZX23083"],"award-info":[{"award-number":["QTZX23083"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["QTZX23042"],"award-info":[{"award-number":["QTZX23042"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tcsvt.2025.3621207","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T17:41:57Z","timestamp":1760463717000},"page":"3848-3861","source":"Crossref","is-referenced-by-count":2,"title":["DeepFidelity: Perceptual Forgery Fidelity Assessment for Deepfake Detection"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-2514","authenticated-orcid":false,"given":"Chunlei","family":"Peng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Huiqing","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6550-212X","authenticated-orcid":false,"given":"Decheng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4695-6134","authenticated-orcid":false,"given":"Nannan","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Ruimin","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-0037","authenticated-orcid":false,"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00112"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01453"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534089"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3172845"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3289321"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3246793"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659461"},{"key":"ref18","article-title":"DeepFakes: A new threat to face recognition? Assessment and detection","author":"Korshunov","year":"2018","journal-title":"arXiv:1812.08685"},{"key":"ref19","article-title":"Generalized visual quality assessment of GAN-generated face images","author":"Tian","year":"2022","journal-title":"arXiv:2201.11975"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803740"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00283"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3390945"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"issue":"1","key":"ref28","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00342"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3074259"},{"key":"ref31","article-title":"ForensicTransfer: Weakly-supervised domain adaptation for forgery detection","author":"Cozzolino","year":"2018","journal-title":"arXiv:1812.02510"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411892"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475347"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3217950"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3209336"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3278310"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2347419"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00569"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3282631"},{"key":"ref42","article-title":"LocalViT: Analyzing locality in vision transformers","author":"Li","year":"2021","journal-title":"arXiv:2104.05707"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref48","article-title":"Fixing weight decay regularization in Adam","author":"Loshchilov","year":"2017","journal-title":"arXiv:1711.05101"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref50","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3512527.3531415"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16367"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26351-4_4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103587"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02274-6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref62","first-page":"3247","article-title":"Leveraging frequency analysis for deep fake image recognition","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Frank"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS55630.2022.00039"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2227726"},{"key":"ref66","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/76\/11424237\/11203008.pdf?arnumber=11203008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:01:39Z","timestamp":1773086499000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11203008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":66,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2025.3621207","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}