{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:06:12Z","timestamp":1765357572482,"version":"3.38.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021TQ0314","2021M703036"],"award-info":[{"award-number":["2021TQ0314","2021M703036"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271466"],"award-info":[{"award-number":["62271466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tetc.2024.3386960","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T17:24:55Z","timestamp":1713288295000},"page":"134-146","source":"Crossref","is-referenced-by-count":3,"title":["FakeTracer: Catching Face-Swap DeepFakes via Implanting Traces in Training"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5584-3433","authenticated-orcid":false,"given":"Pu","family":"Sun","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7947-1491","authenticated-orcid":false,"given":"Honggang","family":"Qi","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9299-1945","authenticated-orcid":false,"given":"Yuezun","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0992-685X","authenticated-orcid":false,"given":"Siwei","family":"Lyu","sequence":"additional","affiliation":[{"name":"University at Buffalo, SUNY, Amherst, NY, USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.5555\/2969033.2969125"},{"key":"ref2","article-title":"Auto-encoding variational Bayes","volume":"1050","author":"Kingma","year":"2014","journal-title":"Stat"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.cviu.2022.103525"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.patcog.2023.109628"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/WACV56688.2023.00518"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/jimaging9010018"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-030-35746-7_3"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CVPR46437.2021.00222"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CVPR42600.2020.00505"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-030-58610-2_6"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CVPR46437.2021.01605"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CVPR46437.2021.00639"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TMM.2018.2872863"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TMM.2020.3026868"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/tpami.2023.3301451"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1609\/aaai.v36i1.19954"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TCSVT.2023.3269841"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.eswa.2022.119361"},{"year":"2021","author":"Yang","article-title":"FaceGuard: Proactive deepfake detection","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3474085.3475518"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCV48922.2021.01418"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CVPR52688.2022.01495"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/WACVW50321.2020.9096939"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-030-66823-5_14"},{"year":"2020","author":"Segalis","article-title":"OGAN: Disrupting DeepFakes with an adversarial attack that survives training","key":"ref25"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TETC.2022.3184408"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/CVPR42600.2020.00327"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICIP46576.2022.9897756"},{"key":"ref29","first-page":"700","article-title":"Unsupervised image-to-image translation networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Liu"},{"key":"ref30","first-page":"1","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Karras"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/CVPR.2019.00453"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TMM.2019.2959443"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref34","first-page":"1","article-title":"Protecting world leaders against deep fakes","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops","author":"Agarwal"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.sigpro.2020.107616"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/WIFS.2018.8630761"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/CVPR46437.2021.01468"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-3-030-87664-7_12"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/tpami.2020.3009287"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ICCV48922.2021.01475"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/CVPR.2018.00068"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/CVPR42600.2020.00872"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10918563\/10502347.pdf?arnumber=10502347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T17:42:10Z","timestamp":1741628530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10502347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2024.3386960","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}