{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:12:17Z","timestamp":1776885137681,"version":"3.51.2"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,6]]},"DOI":"10.1109\/wifs49906.2020.9360901","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:12:41Z","timestamp":1614287561000},"page":"1-6","source":"Crossref","is-referenced-by-count":73,"title":["Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection"],"prefix":"10.1109","author":[{"given":"Luca","family":"Bondi","sequence":"first","affiliation":[]},{"given":"Edoardo","family":"Daniele Cannas","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Bestagini","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tubaro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","author":"tan","year":"2019","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref32","article-title":"Blazeface: Sub-millisecond neural face detection on mobile gpus","volume":"abs 1907 5047","author":"bazarevsky","year":"2019","journal-title":"CoRR"},{"key":"ref31","article-title":"Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics","author":"li","year":"2020","journal-title":"IEEE Conf Computer Vision and Patt Recog (CVPR)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref37","article-title":"Albumentations: fast and flexible image augmentations","volume":"abs 1809 6839","author":"buslaev","year":"2018","journal-title":"CoRR"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.180"},{"key":"ref35","article-title":"PyTorch: An imperative style, high-performance deep learning library","author":"paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref34","article-title":"FaceForensics++","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2012.2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260814"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2541960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2951313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2013.6659337"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2804768"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2205568"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854801"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref19","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"li","year":"2019","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"},{"key":"ref28","article-title":"The deepfake detection challenge dataset","volume":"abs 2006 7397","author":"dolhansky","year":"2020","journal-title":"CoRR"},{"key":"ref4","article-title":"Advancing High Fidelity Identity Swapping for Forgery Detection","author":"li","year":"2020","journal-title":"IEEE Conf Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref27","article-title":"DeepFake Detection Challenge Results","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref6","article-title":"Faceswap","year":"0"},{"key":"ref29","article-title":"Cnn-generated images are surprisingly easy to spot&#x2026; for now","volume":"abs 1912 11035","author":"wang","year":"2019","journal-title":"CoRR"},{"key":"ref5","article-title":"Deepfakes github","year":"0"},{"key":"ref8","article-title":"Doublicat","year":"0"},{"key":"ref7","article-title":"Impressions","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978805"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13382"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref24","article-title":"Video Face Manipulation Detection Through Ensemble of CNNs","author":"bonettini","year":"2020","journal-title":"International Conference on Pattern Recognition (ICPR)"},{"key":"ref23","article-title":"On the detection of digital face manipulation","volume":"abs 1910 1717","author":"dang","year":"2019","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref25","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"2019","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"}],"event":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"New York, NY, USA","start":{"date-parts":[[2020,12,6]]},"end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9360831\/9360880\/09360901.pdf?arnumber=9360901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:40Z","timestamp":1656602320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/wifs49906.2020.9360901","relation":{},"subject":[],"published":{"date-parts":[[2020,12,6]]}}}