{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:49:50Z","timestamp":1761709790595,"version":"3.37.3"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1109\/vcip49819.2020.9301796","type":"proceedings-article","created":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T21:00:33Z","timestamp":1609275633000},"page":"431-434","source":"Crossref","is-referenced-by-count":6,"title":["Low Resolution Facial Manipulation Detection"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Han","sequence":"first","affiliation":[]},{"given":"Zhongyi","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Wenmin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"DeepFakes: a New Threat to Face Recognition? Assessment and Detection","author":"korshunov","year":"2018","journal-title":"arXiv Computer Vision and Pattern Recognition"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-03398-9","article-title":"Exposing DeepFake ?&#x00BE;deos By Detecting Face Warping Artifacts","author":"li","year":"2018","journal-title":"arXiv Computer Vision and Pattern Recognition"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/WIFS.2018.8630761"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2909827.2930786"},{"key":"ref14","first-page":"80","article-title":"Recurrent Convolutional Strategies for Face Manipulation Detection in Videos","author":"sabir","year":"2019"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/BTAS.2017.8272713"},{"year":"2014","author":"yang","article-title":"Learn convolutional neural network for face anti-spoofing","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref5","first-page":"389398","article-title":"Leaming deep models for face antispoofing: Binaiy or auxiliary supervision","author":"liu","year":"2018","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"year":"0","author":"stehouwer","article-title":"On the Detection of Digital Face Manipulation","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/BTAS46853.2019.9185974","article-title":"Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos","author":"nguyen","year":"2019"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2016.2578288"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICCV.2019.00009"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICCV.2019.00009"}],"event":{"name":"2020 IEEE International Conference on Visual Communications and Image Processing (VCIP)","start":{"date-parts":[[2020,12,1]]},"location":"Macau, China","end":{"date-parts":[[2020,12,4]]}},"container-title":["2020 IEEE International Conference on Visual Communications and Image Processing (VCIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9301747\/9301748\/09301796.pdf?arnumber=9301796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T10:09:23Z","timestamp":1724148563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9301796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/vcip49819.2020.9301796","relation":{},"subject":[],"published":{"date-parts":[[2020,12,1]]}}}