{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:05:11Z","timestamp":1770465911032,"version":"3.49.0"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LZ23F020006"],"award-info":[{"award-number":["LZ23F020006"]}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LTGG24F020008"],"award-info":[{"award-number":["LTGG24F020008"]}]},{"name":"National Key R&amp;D Project","award":["2022YFB3102900"],"award-info":[{"award-number":["2022YFB3102900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172435"],"award-info":[{"award-number":["62172435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20305"],"award-info":[{"award-number":["U23A20305"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Henan Province Key R&amp;D Project of China","award":["221111321200"],"award-info":[{"award-number":["221111321200"]}]},{"name":"vigideo"},{"name":"UTT&#x0027;s AMI O-SPAR"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tmm.2024.3385286","type":"journal-article","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T19:38:56Z","timestamp":1712691536000},"page":"9047-9059","source":"Crossref","is-referenced-by-count":9,"title":["Deepfake Detection Fighting Against Noisy Label Attack"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4912-2132","authenticated-orcid":false,"given":"Tong","family":"Qiao","sequence":"first","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3142-3968","authenticated-orcid":false,"given":"Shichuang","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8127-9263","authenticated-orcid":false,"given":"Yanli","family":"Chen","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9273-4260","authenticated-orcid":false,"given":"Florent","family":"Retraint","sequence":"additional","affiliation":[{"name":"Laboratory of Computer Science and Digital Society, University of Technology of Troyes, Troyes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9922-3305","authenticated-orcid":false,"given":"Ran","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6062-2950","authenticated-orcid":false,"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2023.3274450"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3221532"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"issue":"1","key":"ref4","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3214768"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3193590"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3186803"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3531536.3532964"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460400"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.06.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref17","article-title":"The deepfake detection challenge (DFDC) dataset","author":"Dolhansky","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00339"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3464307"},{"key":"ref23","first-page":"3763","article-title":"Robust inference via generative classifiers for handling noisy labels","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Lee","year":"2019"},{"key":"ref24","first-page":"4006","article-title":"SIGUA: Forgetting may make learning with noisy labels more robust","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Han","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3446776"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3220849"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3058771"},{"key":"ref28","first-page":"1","article-title":"Toward robustness against label noise in training deep discriminative neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Vahdat","year":"2017"},{"key":"ref29","first-page":"21382","article-title":"A topological filter for learning with label noise","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wu","year":"2020"},{"key":"ref30","first-page":"825","article-title":"Confidence scores make instance-dependent label-noise learning possible","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Berthon"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00524"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10894"},{"key":"ref33","first-page":"1","article-title":"Learning with instance-dependent label noise: A sample sieve approach","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Cheng","year":"2021"},{"key":"ref34","article-title":"Robust long-tailed learning under label noise","author":"Wei","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00582"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00524"},{"key":"ref37","first-page":"11447","article-title":"Error-bounded correction of noisy labels","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zheng","year":"2020"},{"key":"ref38","first-page":"1","article-title":"Noise against noise: Stochastic label noise helps combat inherent label noise","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Chen","year":"2021"},{"key":"ref39","first-page":"2304","article-title":"MentorNet: Learning data-driven curriculum for very deep neural networks on corrupted labels","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Jiang","year":"2018"},{"key":"ref40","first-page":"1","article-title":"Dividemix: Learning with noisy labels as semi-supervised learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00515"},{"key":"ref42","first-page":"46","article-title":"Exposing deepfake videos by detecting face warping artifacts","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops","author":"Li","year":"2019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108832"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3182509"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3595353.3595882"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411892"},{"key":"ref52","article-title":"Self-supervised transformer for deepfake detection","author":"Zhao","year":"2022"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897792"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3209336"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref56","first-page":"6543","article-title":"Normalized loss functions for deep learning with noisy labels","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ma","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19809-0_24"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref60","first-page":"1755","article-title":"DLIB-ML: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1201775.882269"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525087"},{"key":"ref63","first-page":"18661","article-title":"Supervised contrastive learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Khosla","year":"2020"},{"issue":"2","key":"ref64","article-title":"Contributing data to deepfake detection research","volume":"1","author":"Dufour","year":"2019","journal-title":"Google AI Blog"},{"key":"ref65","article-title":"YouTube-8 M: A large-scale video classification benchmark","author":"Abu-El-Haija","year":"2016"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"ref69","volume-title":"Introduction to Information Retrieval","volume":"39","author":"Schtze","year":"2008"},{"issue":"11","key":"ref70","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/10384483\/10491334.pdf?arnumber=10491334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:24:17Z","timestamp":1725164657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10491334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/tmm.2024.3385286","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}