{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:00:04Z","timestamp":1775145604916,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271345"],"award-info":[{"award-number":["62271345"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Fund of Ministry of Education for Equipment Pre-research","award":["8091B032254"],"award-info":[{"award-number":["8091B032254"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tmm.2023.3279993","type":"journal-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T17:33:17Z","timestamp":1685640797000},"page":"1333-1345","source":"Crossref","is-referenced-by-count":40,"title":["MCS-GAN: A Different Understanding for Generalization of Deep Forgery Detection"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4058-8120","authenticated-orcid":false,"given":"Shuai","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7321-7460","authenticated-orcid":false,"given":"Guipeng","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2558-552X","authenticated-orcid":false,"given":"Jiachen","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin, China"}]},{"given":"Wen","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9483-5724","authenticated-orcid":false,"given":"Qinggang","family":"Meng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Loughborough University, Loughborough, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-0037","authenticated-orcid":false,"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[{"name":"Chongqing Key Laboratory of Image Cognition, Chongqing University of Posts and Telecommunications, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3050067"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3156\/jsoft.29.5_177_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3098422"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2943204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2121056"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3007032"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102487"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2772438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref20","article-title":"The deepfake detection challenge dataset","author":"Dolhansky","year":"2020"},{"key":"ref21","first-page":"727","article-title":"Efficient GAN-based anomaly detection","volume-title":"Proc. IEEE Int. Conf. Data Mining","author":"Zenati","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2021.103170"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982705"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304909"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3086109"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3146781"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00111"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3119403"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00336"},{"key":"ref41","article-title":"Generalized zero and few-shot transfer for facial forgery detection","author":"Aneja","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00044"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA56598.2022.10034569"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00074"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3237322"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3048680"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_40"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00073"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78120-0_23"},{"key":"ref51","first-page":"325","article-title":"Towards generalizable forgery detection with locality-aware autoencoder","volume-title":"Proc. Conf. Inf. Knowl. Manage.","author":"Du","year":"2019"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/10384483\/10141892.pdf?arnumber=10141892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:48:56Z","timestamp":1705690136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10141892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/tmm.2023.3279993","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}