{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:15:18Z","timestamp":1771467318246,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["82261138629"],"award-info":[{"award-number":["82261138629"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306061"],"award-info":[{"award-number":["62306061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372325"],"award-info":[{"award-number":["62372325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515010688"],"award-info":[{"award-number":["2023A1515010688"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015805","name":"Shenzhen Municipal Science and Technology Innovation Council","doi-asserted-by":"publisher","award":["JCYJ20220531101412030"],"award-info":[{"award-number":["JCYJ20220531101412030"]}],"id":[{"id":"10.13039\/501100015805","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China"},{"name":"Shandong Province National Talents Supporting Program","award":["2023GJJLJRC-070"],"award-info":[{"award-number":["2023GJJLJRC-070"]}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["23JCZDJC00280"],"award-info":[{"award-number":["23JCZDJC00280"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Project Toward the Integration of Education and Industry","award":["2022JBZ01-03"],"award-info":[{"award-number":["2022JBZ01-03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3461958","type":"journal-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T17:41:18Z","timestamp":1726508478000},"page":"8559-8572","source":"Crossref","is-referenced-by-count":7,"title":["GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8442-2777","authenticated-orcid":false,"given":"Yaning","family":"Zhang","sequence":"first","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0422-6616","authenticated-orcid":false,"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, Great Bay University, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2920-6099","authenticated-orcid":false,"given":"Tianyi","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]},{"given":"Xiaobin","family":"Huang","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1420-0815","authenticated-orcid":false,"given":"Linlin","family":"Shen","sequence":"additional","affiliation":[{"name":"Computer Vision Institute, College of Computer Science and Software Engineering, the National Engineering Laboratory for Big Data System Computing Technology, and Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-5741","authenticated-orcid":false,"given":"Zan","family":"Gao","sequence":"additional","affiliation":[{"name":"Shandong Artificial Intelligence Institute, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"given":"Jianfeng","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham Ningbo China (UNNC), Ningbo, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987255"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/476"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref6","article-title":"The DeepFake detection challenge (DFDC) dataset","author":"Dolhansky","year":"2020","journal-title":"arXiv:2006.07397"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"ref10","article-title":"Generated faces in the wild: Quantitative comparison of stable diffusion, midjourney and DALL-E 2","author":"Borji","year":"2022","journal-title":"arXiv:2210.00586"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00095"},{"key":"ref12","article-title":"DiffusionFace: Towards a comprehensive dataset for diffusion-based face forgery analysis","author":"Chen","year":"2024","journal-title":"arXiv:2403.18471"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2106.12423"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref18","article-title":"Denoising diffusion probabilistic models","author":"Ho","year":"2020","journal-title":"arXiv:2006.11239"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00589"},{"key":"ref20","volume-title":"From Porn To Scams, Deepfakes Are Becoming a Big Racket and That\u2019s Unnerving Bus. Leaders and Lawmakers","author":"Croft","year":"2020"},{"key":"ref21","volume-title":"Deepfakes\u2019 Ranked As Most Serious AI Crime Threat","author":"London","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01353"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.11.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3326675"},{"key":"ref25","article-title":"Learning disentangled representation for one-shot progressive face swapping","author":"Li","year":"2022","journal-title":"arXiv:2203.12985"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00749"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01036"},{"key":"ref29","article-title":"DiffFace: Diffusion-based face swapping with facial guidance","author":"Kim","year":"2022","journal-title":"arXiv:2212.13344"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"ref32","article-title":"Deepfake video detection using convolutional vision transformer","author":"Wodajo","year":"2021","journal-title":"arXiv:2102.11126"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06433-3_19"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref35","article-title":"Inception transformer","volume-title":"Proc. 36th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Si"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/4.996"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0734-189X(89)80036-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.1980.0020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223784"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3512527.3531415"},{"key":"ref42","first-page":"26","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Karras"},{"key":"ref43","article-title":"FaceForensics: A large-scale video dataset for forgery detection in human faces","author":"R\u00f6ssler","year":"2018","journal-title":"arXiv:1803.09179"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref45","volume-title":"Deepfake","year":"2020"},{"key":"ref46","volume-title":"FaceSwap","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"ref48","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref57","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Simonyan"},{"key":"ref58","first-page":"16","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dosovitskiy"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/info11020125"},{"key":"ref61","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Kingma"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/VCIP53242.2021.9675329"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10681109.pdf?arnumber=10681109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:44:57Z","timestamp":1727372697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10681109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3461958","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}