{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:03:10Z","timestamp":1776182590292,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["IIS-1900990"],"award-info":[{"award-number":["IIS-1900990"]}]},{"name":"NSF","award":["CNS-1816497"],"award-info":[{"award-number":["CNS-1816497"]}]},{"name":"DARPA","award":["N66001-17-2-4031"],"award-info":[{"award-number":["N66001-17-2-4031"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3411892","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:06Z","timestamp":1603085466000},"page":"325-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Towards Generalizable Deepfake Detection with Locality-aware AutoEncoder"],"prefix":"10.1145","author":[{"given":"Mengnan","family":"Du","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Shiva","family":"Pentyala","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Yuening","family":"Li","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Xia","family":"Hu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_2_2_2_1","volume-title":"Protecting World Leaders Against Deep Fakes. In The Conference on Computer Vision and Pattern Recognition (CVPR) Workshop.","author":"Agarwal Shruti","year":"2019","unstructured":"Shruti Agarwal , Hany Farid , Yuming Gu , Mingming He , Koki Nagano , and Hao Li . 2019 . Protecting World Leaders Against Deep Fakes. In The Conference on Computer Vision and Pattern Recognition (CVPR) Workshop. Shruti Agarwal, Hany Farid, Yuming Gu, Mingming He, Koki Nagano, and Hao Li. 2019. Protecting World Leaders Against Deep Fakes. In The Conference on Computer Vision and Pattern Recognition (CVPR) Workshop."},{"key":"e_1_3_2_2_3_1","unstructured":"AWS Facebook Microsoft and academics. 2019. Deepfake Detection Challenge (DFDC).  AWS Facebook Microsoft and academics. 2019. Deepfake Detection Challenge (DFDC)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"e_1_3_2_2_8_1","volume-title":"ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection. arXiv preprint arXiv:1812.02510","author":"Cozzolino Davide","year":"2018","unstructured":"Davide Cozzolino , Justus Thies , Andreas R\u00f6ssler , Christian Riess , Matthias Nie\u00dfner , and Luisa Verdoliva . 2018. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection. arXiv preprint arXiv:1812.02510 ( 2018 ). Davide Cozzolino, Justus Thies, Andreas R\u00f6ssler, Christian Riess, Matthias Nie\u00dfner, and Luisa Verdoliva. 2018. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection. arXiv preprint arXiv:1812.02510 (2018)."},{"key":"e_1_3_2_2_9_1","unstructured":"DeepFake. 2019. https:\/\/github.com\/iperov\/DeepFaceLab.  DeepFake. 2019. https:\/\/github.com\/iperov\/DeepFaceLab."},{"key":"e_1_3_2_2_10_1","volume-title":"Thirtieth Conference on Neural Information Processing Systems (NIPS).","author":"Dosovitskiy Alexey","year":"2016","unstructured":"Alexey Dosovitskiy and Thomas Brox . 2016 . Generating images with perceptual similarity metrics based on deep networks . In Thirtieth Conference on Neural Information Processing Systems (NIPS). Alexey Dosovitskiy and Thomas Brox. 2016. Generating images with perceptual similarity metrics based on deep networks. In Thirtieth Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_2_11_1","volume-title":"Techniques for interpretable machine learning. Communications of the ACM (CACM)","author":"Du Mengnan","year":"2020","unstructured":"Mengnan Du , Ninghao Liu , and Xia Hu. 2020. Techniques for interpretable machine learning. Communications of the ACM (CACM) ( 2020 ). Mengnan Du, Ninghao Liu, and Xia Hu. 2020. Techniques for interpretable machine learning. Communications of the ACM (CACM) (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"Towards Explanation of DNN-based Prediction with Guided Feature Inversion. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"Du Mengnan","year":"2018","unstructured":"Mengnan Du , Ninghao Liu , Qingquan Song , and Xia Hu . 2018 . Towards Explanation of DNN-based Prediction with Guided Feature Inversion. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2018). Mengnan Du, Ninghao Liu, Qingquan Song, and Xia Hu. 2018. Towards Explanation of DNN-based Prediction with Guided Feature Inversion. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2018)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313545"},{"key":"e_1_3_2_2_14_1","unstructured":"Faceswap. 2019. https:\/\/github.com\/shaoanlu\/faceswap-GAN.  Faceswap. 2019. https:\/\/github.com\/shaoanlu\/faceswap-GAN."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"e_1_3_2_2_17_1","volume-title":"Globally and locally consistent image completion. ACM Transactions on Graphics (ToG)","author":"Iizuka Satoshi","year":"2017","unstructured":"Satoshi Iizuka , Edgar Simo-Serra , and Hiroshi Ishikawa . 2017. Globally and locally consistent image completion. ACM Transactions on Graphics (ToG) ( 2017 ). Satoshi Iizuka, Edgar Simo-Serra, and Hiroshi Ishikawa. 2017. Globally and locally consistent image completion. ACM Transactions on Graphics (ToG) (2017)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8553251"},{"key":"e_1_3_2_2_19_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_20_1","volume-title":"Thirty-second Conference on Neural Information Processing Systems (NeurIPS).","author":"Kingma Durk P","year":"2018","unstructured":"Durk P Kingma and Prafulla Dhariwal . 2018 . Glow: Generative flow with invertible 1x1 convolutions . In Thirty-second Conference on Neural Information Processing Systems (NeurIPS). Durk P Kingma and Prafulla Dhariwal. 2018. Glow: Generative flow with invertible 1x1 convolutions. In Thirty-second Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_21_1","volume-title":"Face X-ray for More General Face Forgery Detection. The Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Li Lingzhi","year":"2020","unstructured":"Lingzhi Li , Jianmin Bao , Ting Zhang , Hao Yang , Dong Chen , Fang Wen , and Baining Guo . 2020 . Face X-ray for More General Face Forgery Detection. The Conference on Computer Vision and Pattern Recognition (CVPR) (2020). Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, and Baining Guo. 2020. Face X-ray for More General Face Forgery Detection. The Conference on Computer Vision and Pattern Recognition (CVPR) (2020)."},{"key":"e_1_3_2_2_22_1","volume-title":"IEEE Workshop on Information Forensics and Security (WIFS)","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li , Ming-Ching Chang , Hany Farid , and Siwei Lyu . 2018 . In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking . IEEE Workshop on Information Forensics and Security (WIFS) (2018). Yuezun Li, Ming-Ching Chang, Hany Farid, and Siwei Lyu. 2018. In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking. IEEE Workshop on Information Forensics and Security (WIFS) (2018)."},{"key":"e_1_3_2_2_23_1","volume-title":"Workshop on Media Forensics (in conjuction with CVPR)","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu . 2019 . Exposing deepfake videos by detecting face warping artifacts . Workshop on Media Forensics (in conjuction with CVPR) (2019). Yuezun Li and Siwei Lyu. 2019. Exposing deepfake videos by detecting face warping artifacts. Workshop on Media Forensics (in conjuction with CVPR) (2019)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"e_1_3_2_2_27_1","volume-title":"Duc Thanh Nguyen, and Saeid Nahavandi. 2019 a. Deep Learning for Deepfakes Creation and Detection. arXiv preprint arXiv:1909.11573","author":"Nguyen Thanh Thi","year":"2019","unstructured":"Thanh Thi Nguyen , Cuong M Nguyen , Dung Tien Nguyen , Duc Thanh Nguyen, and Saeid Nahavandi. 2019 a. Deep Learning for Deepfakes Creation and Detection. arXiv preprint arXiv:1909.11573 ( 2019 ). Thanh Thi Nguyen, Cuong M Nguyen, Dung Tien Nguyen, Duc Thanh Nguyen, and Saeid Nahavandi. 2019 a. Deep Learning for Deepfakes Creation and Detection. arXiv preprint arXiv:1909.11573 (2019)."},{"key":"e_1_3_2_2_28_1","volume-title":"The International Conference on Learning Representations (ICLR)","author":"Radford Alec","year":"2016","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2016 . Unsupervised representation learning with deep convolutional generative adversarial networks . The International Conference on Learning Representations (ICLR) (2016). Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. The International Conference on Learning Representations (ICLR) (2016)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_2_33_1","volume-title":"The International Conference on Learning Representations (ICLR)","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very deep convolutional networks for large-scale image recognition . The International Conference on Learning Representations (ICLR) (2015). Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. The International Conference on Learning Representations (ICLR) (2015)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_2_35_1","volume-title":"DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. arXiv preprint arXiv:2001.00179","author":"Tolosana Ruben","year":"2020","unstructured":"Ruben Tolosana , Ruben Vera-Rodriguez , Julian Fierrez , Aythami Morales , and Javier Ortega-Garcia . 2020. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. arXiv preprint arXiv:2001.00179 ( 2020 ). Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales, and Javier Ortega-Garcia. 2020. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. arXiv preprint arXiv:2001.00179 (2020)."},{"key":"e_1_3_2_2_36_1","volume-title":"ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features. In The Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Wu Yue","year":"2019","unstructured":"Yue Wu , Wael AbdAlmageed , and Premkumar Natarajan . 2019 . ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features. In The Conference on Computer Vision and Pattern Recognition (CVPR). Yue Wu, Wael AbdAlmageed, and Premkumar Natarajan. 2019. ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features. In The Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_2_37_1","volume-title":"On the generalization of GAN image forensics. arXiv preprint arXiv:1902.11153","author":"Xuan Xinsheng","year":"2019","unstructured":"Xinsheng Xuan , Bo Peng , Jing Dong , and Wei Wang . 2019. On the generalization of GAN image forensics. arXiv preprint arXiv:1902.11153 ( 2019 ). Xinsheng Xuan, Bo Peng, Jing Dong, and Wei Wang. 2019. On the generalization of GAN image forensics. arXiv preprint arXiv:1902.11153 (2019)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00577"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3411892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3411892","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3411892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:21Z","timestamp":1750197681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3411892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":39,"alternative-id":["10.1145\/3340531.3411892","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3411892","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}