{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:12:11Z","timestamp":1730304731995,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1109\/wcnc55385.2023.10118664","type":"proceedings-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T13:35:33Z","timestamp":1683898533000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Self-supervised Multi-Modal Video Forgery Attack Detection"],"prefix":"10.1109","author":[{"given":"Chenhui","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Michigan,Department of Electrical and Computer Engineering,Ann Arbor,USA"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Carnegia Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,USA"}]},{"given":"Rabih","family":"Younes","sequence":"additional","affiliation":[{"name":"Duke University,Department of Electrical and Computer Engineering,Durham,USA"}]}],"member":"263","reference":[{"key":"ref13","first-page":"2961","article-title":"Mask RCNN","author":"he","year":"2017","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_38"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref34"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3222643"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20032"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324928"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2993004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116066"},{"key":"ref33","first-page":"26","article-title":"Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude","volume":"4","author":"tieleman","year":"2012","journal-title":"COURSERA Neural Networks for Machine Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3501-3_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/87.974338"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488798"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00555"},{"article-title":"R 2vos: Robust referring video object segmentation via relational multimodal cycle consistency","year":"2022","author":"li","key":"ref17"},{"article-title":"Online video instance segmentation via robust context fusion","year":"2022","author":"li","key":"ref16"},{"key":"ref19","first-page":"5693","article-title":"Deep high-resolution representation learning for human pose estimation","author":"sun","year":"2019","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition"},{"article-title":"Panoramic video salient object detection with ambisonic audio guidance","year":"2022","author":"li","key":"ref18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s17051177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0901-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00768"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2816795.2818072"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.288"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.07.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3410530.3414367"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230579"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0575-8_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668344"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380900"},{"key":"ref3","article-title":"Forgery attack detection in surveillance video streams using wi-fi channel state information","author":"huang","year":"2021","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2961890"}],"event":{"name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2023,3,26]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2023,3,29]]}},"container-title":["2023 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10118584\/10118587\/10118664.pdf?arnumber=10118664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T13:30:31Z","timestamp":1685367031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10118664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/wcnc55385.2023.10118664","relation":{},"subject":[],"published":{"date-parts":[[2023,3]]}}}