{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T17:09:10Z","timestamp":1769620150940,"version":"3.49.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2062"],"award-info":[{"award-number":["U22B2062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172232"],"award-info":[{"award-number":["62172232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402228"],"award-info":[{"award-number":["62402228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172234"],"award-info":[{"award-number":["62172234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018537","name":"Jiangsu Provincial Science and Technology Major Project","doi-asserted-by":"publisher","award":["BG2024042"],"award-info":[{"award-number":["BG2024042"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20240699"],"award-info":[{"award-number":["BK20240699"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2026.3651948","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T21:59:20Z","timestamp":1768255160000},"page":"1184-1197","source":"Crossref","is-referenced-by-count":0,"title":["MAP-Mamba: Multi-Artifacts Perception Mamba for Generalizable Face Forgery Detection"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2817-180X","authenticated-orcid":false,"given":"Chi","family":"Wang","sequence":"first","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1019-3884","authenticated-orcid":false,"given":"Ziwen","family":"He","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-9276","authenticated-orcid":false,"given":"Xinjue","family":"Hu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7128-5002","authenticated-orcid":false,"given":"Weinan","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Data Science, The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8598-0831","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"New Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4363-2521","authenticated-orcid":false,"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3332218"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3747296"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3381823"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198275"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref12","article-title":"Striving for simplicity: The all convolutional net","author":"Springenberg","year":"2014","journal-title":"arXiv:1412.6806"},{"key":"ref13","volume-title":"Faceswapdevs","year":"2019"},{"key":"ref14","volume-title":"Faceswap","author":"Kowalski","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00345"},{"key":"ref16","volume-title":"Inswapper","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.52202\/079017-0925"},{"key":"ref18","first-page":"1","article-title":"Domain generalization with mixstyle","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhou"},{"key":"ref19","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3588574"},{"key":"ref22","first-page":"1","article-title":"Mamba: Linear-time sequence modeling with selective state spaces","volume-title":"Proc. 1st Conf. Lang. Model. (COLM)","author":"Gu"},{"key":"ref23","article-title":"Vision mamba: Efficient visual representation learning with bidirectional state space model","author":"Zhu","year":"2024","journal-title":"arXiv:2401.09417"},{"key":"ref24","first-page":"103031","article-title":"VMamba: Visual state space model","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Liu"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3425540"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.00424"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref28","volume-title":"Facial Landmarks Shape Predictor","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198503682.001.0001"},{"key":"ref30","first-page":"4534","article-title":"DeepfakeBench: A comprehensive benchmark of deepfake detection","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yan"},{"key":"ref31","article-title":"Orthogonal subspace decomposition for generalizable AI-generated image detection","author":"Yan","year":"2024","journal-title":"arXiv:2411.15633"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.01789"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516561"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02048"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00858"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3119403"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref47","article-title":"The DeepFake detection challenge (DFDC) dataset","author":"Dolhansky","year":"2020","journal-title":"arXiv:2006.07397"},{"key":"ref48","article-title":"The deepfake detection challenge (DFDC) preview dataset","author":"Dolhansky","year":"2019","journal-title":"arXiv:1910.08854"},{"key":"ref49","volume-title":"Deepfakedetection","year":"2019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00702"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00829"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00268"},{"key":"ref57","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"arXiv:2010.02502"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3746027.3758280"},{"key":"ref59","article-title":"DDL: A large-scale datasets for deepfake detection and localization in diversified real-world scenarios","author":"Miao","year":"2025","journal-title":"arXiv:2506.23292"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73016-0_7"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20203"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"issue":"86","key":"ref65","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11339520.pdf?arnumber=11339520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:12:01Z","timestamp":1769577121000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11339520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/tifs.2026.3651948","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}