{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:10:45Z","timestamp":1771956645521,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Miami Foundation","award":["006409-002"],"award-info":[{"award-number":["006409-002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363269","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2613-2615","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Saniat Javid","family":"Sohrawardi","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Akash","family":"Chintha","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Bao","family":"Thai","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Sovantharith","family":"Seng","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Andrea","family":"Hickerson","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, SC, USA"}]},{"given":"Raymond","family":"Ptucha","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mesonet: A Compact Facial Video Forgery Detection Network. In WIFS.","author":"Afchar Darius","year":"2018"},{"key":"e_1_3_2_1_2_1","volume-title":"Protecting World Leaders Against Deep Fakes. In CVPR Workshops.","author":"Agarwal Shruti","year":"2019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Q. Cao L. Shen W. Xie O. M. Parkhi and A. Zisserman. 2018. VGGFace2: A Dataset for Recognizing Faces Across Pose and Age. In ICAFGR.  Q. Cao L. Shen W. Xie O. M. Parkhi and A. Zisserman. 2018. VGGFace2: A Dataset for Recognizing Faces Across Pose and Age. In ICAFGR.","DOI":"10.1109\/FG.2018.00020"},{"key":"e_1_3_2_1_4_1","volume-title":"FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. arXiv preprint arXiv:1901.02212","author":"Ciftci Umur Aybars","year":"2019"},{"key":"e_1_3_2_1_5_1","volume-title":"Forensictransfer: Weakly-supervised domain adaptation for forgery detection. arXiv preprint arXiv:1812.02510","author":"Cozzolino Davide","year":"2018"},{"key":"e_1_3_2_1_6_1","volume-title":"NOT REAL NEWS: Altered video makes Pelosi seem to slur words. https:\/\/apnews.com\/4841d0ebcc704524a38b1c8e213764d0","author":"Dupuy Beatrice","year":"2019"},{"key":"e_1_3_2_1_7_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems (NeurIPS). 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems (NeurIPS). 2672--2680."},{"key":"e_1_3_2_1_8_1","volume":"201","author":"G\u00fcera David","journal-title":"Edward J Delp."},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Residual Learning for Image Recognition. CoRR","author":"He Kaiming","year":"2015"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).  Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Iryna Korshunova Wenzhe Shi Joni Dambre and Lucas Theis. 2017. Fast Face-swap using Convolutional Neural Networks. In ICCV.  Iryna Korshunova Wenzhe Shi Joni Dambre and Lucas Theis. 2017. Fast Face-swap using Convolutional Neural Networks. In ICCV.","DOI":"10.1109\/ICCV.2017.397"},{"key":"e_1_3_2_1_12_1","unstructured":"Marek Kowalski. [n. d.]. faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap.  Marek Kowalski. [n. d.]. faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap."},{"key":"e_1_3_2_1_13_1","unstructured":"Yuezun Li Ming-Ching Chang Hany Farid and Siwei Lyu. 2018. In ictu oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking. arXiv preprint arXiv:1806.02877 (2018).  Yuezun Li Ming-Ching Chang Hany Farid and Siwei Lyu. 2018. In ictu oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking. arXiv preprint arXiv:1806.02877 (2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"The voice conversion challenge 2018: Promoting development of parallel and nonparallel methods. arXiv preprint arXiv:1804.04262","author":"Lorenzo-Trueba Jaime","year":"2018"},{"key":"e_1_3_2_1_15_1","unstructured":"Shao-An Lu. [n. d.]. faceswap-GAN. https:\/\/github.com\/shaoanlu\/faceswap-GAN. Commit: c563edc128e79c3b593da63825f0208acf7ea4d9.  Shao-An Lu. [n. d.]. faceswap-GAN. https:\/\/github.com\/shaoanlu\/faceswap-GAN. Commit: c563edc128e79c3b593da63825f0208acf7ea4d9."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Huy H. Nguyen Fuming Fang Junichi Yamagishi and Isao Echizen. 2019. Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos. arxiv: cs.CV\/1906.06876  Huy H. Nguyen Fuming Fang Junichi Yamagishi and Isao Echizen. 2019. Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos. arxiv: cs.CV\/1906.06876","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"e_1_3_2_1_17_1","volume-title":"Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos. arXiv preprint arXiv:1810.11215","author":"Nguyen Huy H","year":"2018"},{"key":"e_1_3_2_1_18_1","unstructured":"Andreas R\u00f6ssler Davide Cozzolino Luisa Verdoliva Christian Riess Justus Thies and Matthias Nie\u00dfner. 2019.  Andreas R\u00f6ssler Davide Cozzolino Luisa Verdoliva Christian Riess Justus Thies and Matthias Nie\u00dfner. 2019."},{"key":"e_1_3_2_1_19_1","volume-title":"Learning to Detect Manipulated Facial Images. arXiv preprint arXiv:1901.08971","year":"2019"},{"key":"e_1_3_2_1_20_1","volume-title":"Facenet: A Unified Embedding for Face Recognition and Clustering. In CVPR.","author":"Schroff Florian","year":"2015"},{"key":"e_1_3_2_1_21_1","volume-title":"Very Deep Convolutional Networks for Large-scale Image Recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Justus Thies Michael Zollhofer Marc Stamminger Christian Theobalt and Matthias Nie\u00dfner. 2016. Face2face: Real-time Face Capture and Reenactment of RGB Videos. In CVPR.  Justus Thies Michael Zollhofer Marc Stamminger Christian Theobalt and Matthias Nie\u00dfner. 2016. Face2face: Real-time Face Capture and Reenactment of RGB Videos. In CVPR.","DOI":"10.1109\/CVPR.2016.262"},{"key":"e_1_3_2_1_23_1","volume-title":"ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection. arXiv preprint arXiv:1904.05441","author":"Todisco Massimiliano","year":"2019"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363269"}},"subtitle":["Towards Robust Open-World Detection of Deepfakes"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":23,"alternative-id":["10.1145\/3319535.3363269","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363269","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}