{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:10:14Z","timestamp":1778166614383,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3394171.3413769","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T13:10:18Z","timestamp":1602508218000},"page":"2382-2390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":407,"title":["WildDeepfake"],"prefix":"10.1145","author":[{"given":"Bojia","family":"Zi","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Minghao","family":"Chang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Jingjing","family":"Chen","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Xingjun","family":"Ma","sequence":"additional","affiliation":[{"name":"Deakin University, Geelong, Australia"}]},{"given":"Yu-Gang","family":"Jiang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Deep Fake Detection Dataset. https:\/\/ai.googleblog.com\/2019\/09\/ contributing-data-to-deepfake-detection.html Accessed","year":"2019","unstructured":"2019. Deep Fake Detection Dataset. https:\/\/ai.googleblog.com\/2019\/09\/ contributing-data-to-deepfake-detection.html Accessed October 29, 2019 . 2019. Deep Fake Detection Dataset. https:\/\/ai.googleblog.com\/2019\/09\/ contributing-data-to-deepfake-detection.html Accessed October 29, 2019."},{"key":"e_1_3_2_2_2_1","volume-title":"Deepfakes github. https:\/\/github.com\/deepfakes\/faceswap Accessed","year":"2019","unstructured":"2019. Deepfakes github. https:\/\/github.com\/deepfakes\/faceswap Accessed October 29, 2019 . 2019. Deepfakes github. https:\/\/github.com\/deepfakes\/faceswap Accessed October 29, 2019."},{"key":"e_1_3_2_2_3_1","volume-title":"Deepfakes github shaoanlu version. https:\/\/github.com\/shaoanlu\/faceswapGAN Accessed","year":"2019","unstructured":"2019. Deepfakes github shaoanlu version. https:\/\/github.com\/shaoanlu\/faceswapGAN Accessed October 29, 2019 . 2019. Deepfakes github shaoanlu version. https:\/\/github.com\/shaoanlu\/faceswapGAN Accessed October 29, 2019."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/github.com\/MarekKowalski\/FaceSwap Accessed","year":"2019","unstructured":"2019. FaceSwap. https:\/\/github.com\/MarekKowalski\/FaceSwap Accessed October 29, 2019 . 2019. FaceSwap. https:\/\/github.com\/MarekKowalski\/FaceSwap Accessed October 29, 2019."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"D. Afchar V. Nozick J. Yamagishi and I. Echizen. 2018. MesoNet: a Compact Facial Video Forgery Detection Network. In WIFS.  D. Afchar V. Nozick J. Yamagishi and I. Echizen. 2018. MesoNet: a Compact Facial Video Forgery Detection Network. In WIFS.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"J. Carreira and A. Zisserman. 2017. Quo Vadis Action Recognition? A New Model and the Kinetics Dataset. In CVPR.  J. Carreira and A. Zisserman. 2017. Quo Vadis Action Recognition? A New Model and the Kinetics Dataset. In CVPR.","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_2_7_1","volume-title":"Xception: Deep learning with depthwise separable convolutions. In CVPR.","author":"Chollet F.","year":"2017","unstructured":"F. Chollet . 2017 . Xception: Deep learning with depthwise separable convolutions. In CVPR. F. Chollet. 2017. Xception: Deep learning with depthwise separable convolutions. In CVPR."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"U. Ciftci and I. Demir. 2019. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. In arXiv:1901.02212.  U. Ciftci and I. Demir. 2019. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. In arXiv:1901.02212.","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"e_1_3_2_2_9_1","unstructured":"B. Dolhansky R. Howes B. Pflaum N. Baram and C. Ferrer. 2019. The Deepfake Detection Challenge (DFDC) Preview Dataset. In arXiv:1910.08854.  B. Dolhansky R. Howes B. Pflaum N. Baram and C. Ferrer. 2019. The Deepfake Detection Challenge (DFDC) Preview Dataset. In arXiv:1910.08854."},{"key":"e_1_3_2_2_10_1","unstructured":"I. Goodfellow J. Pouget-Abadie M. Mirza B. Xu D. Warde-Farley S. Ozair A. Courville and Y. Bengio. 2014. Generative Adversarial Nets. In NIPS.  I. Goodfellow J. Pouget-Abadie M. Mirza B. Xu D. Warde-Farley S. Ozair A. Courville and Y. Bengio. 2014. Generative Adversarial Nets. In NIPS."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"D. G\u00fcera and E. Delp. 2018. Deepfake Video Detection Using Recurrent Neural Networks. In AVSS.  D. G\u00fcera and E. Delp. 2018. Deepfake Video Detection Using Recurrent Neural Networks. In AVSS.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_2_12_1","volume":"201","author":"He K.","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun. 201 6. Identity Mappings in Deep Residual Networks. In ECCV. K. He, X. Zhang, S. Ren, and J. Sun. 2016. Identity Mappings in Deep Residual Networks. In ECCV.","journal-title":"J. Sun."},{"key":"e_1_3_2_2_13_1","volume-title":"Dlib-Ml: A Machine Learning Toolkit. Journal of Machine Learning Research","author":"King D.","year":"2009","unstructured":"D. King . 2009. Dlib-Ml: A Machine Learning Toolkit. Journal of Machine Learning Research ( 2009 ). D. King. 2009. Dlib-Ml: A Machine Learning Toolkit. Journal of Machine Learning Research (2009)."},{"key":"e_1_3_2_2_14_1","volume":"201","author":"Kingma D.","unstructured":"D. Kingma and J. Ba. 201 4. Adam: A method for stochastic optimization. In arXiv:1412.6980. D. Kingma and J. Ba. 2014. Adam: A method for stochastic optimization. In arXiv:1412.6980.","journal-title":"J. Ba."},{"key":"e_1_3_2_2_15_1","unstructured":"P. Korshunov and S. Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. In arXiv:1812.08685.  P. Korshunov and S. Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. In arXiv:1812.08685."},{"key":"e_1_3_2_2_16_1","unstructured":"A. Krizhevsky I. Sutskever and G. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NIPS.  A. Krizhevsky I. Sutskever and G. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NIPS."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"L. Li J. Bao T. Zhang H. Yang D. Chen F. Wen and B. Guo. 2020 a. Face X-Ray for More General Face Forgery Detection. In CVPR.  L. Li J. Bao T. Zhang H. Yang D. Chen F. Wen and B. Guo. 2020 a. Face X-Ray for More General Face Forgery Detection. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Y. Li M. Chang and S. Lyu. 2018. In ictu oculi: Exposing ai created fake videos by detecting eye blinking. In WIFS.  Y. Li M. Chang and S. Lyu. 2018. In ictu oculi: Exposing ai created fake videos by detecting eye blinking. In WIFS.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"e_1_3_2_2_19_1","unstructured":"Y. Li and S. Lyu. 2018. Exposing deepfake videos by detecting face warping artifacts. In arXiv:1811.00656.  Y. Li and S. Lyu. 2018. Exposing deepfake videos by detecting face warping artifacts. In arXiv:1811.00656."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Y. Li P. Sun H. Qi and S. Lyu. 2020 b. Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics. In CVPR.  Y. Li P. Sun H. Qi and S. Lyu. 2020 b. Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics. In CVPR.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_2_21_1","unstructured":"L. Maaten and G. Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research (2008).  L. Maaten and G. Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research (2008)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Z. Qiu T. Yao and T. Mei. 2017. Learning Spatio-Temporal Representation with Pseudo-3D Residual Networks. In ICCV.  Z. Qiu T. Yao and T. Mei. 2017. Learning Spatio-Temporal Representation with Pseudo-3D Residual Networks. In ICCV.","DOI":"10.1109\/ICCV.2017.590"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"A. Rossler D. Cozzolino L. Verdoliva C. Riess J. Thies and M. Niessner. 2019. FaceForensics: Learning to Detect Manipulated Facial Images. In ICCV.  A. Rossler D. Cozzolino L. Verdoliva C. Riess J. Thies and M. Niessner. 2019. FaceForensics: Learning to Detect Manipulated Facial Images. In ICCV.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_24_1","unstructured":"C. Sanderson. 2004. The VidTIMIT Database.  C. Sanderson. 2004. The VidTIMIT Database."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"M. Sandler A. Howard M. Zhu A. Zhmoginov and L. Chen. 2018. MobileNetV2: Inverted Residuals and Linear Bottlenecks. In CVPR.  M. Sandler A. Howard M. Zhu A. Zhmoginov and L. Chen. 2018. MobileNetV2: Inverted Residuals and Linear Bottlenecks. In CVPR.","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_2_26_1","unstructured":"K. Simonyan and A. Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In ICLR.  K. Simonyan and A. Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In ICLR."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"C. Szegedy V. Vanhoucke S. Ioffe J. Shlens and Z. Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In CVPR.  C. Szegedy V. Vanhoucke S. Ioffe J. Shlens and Z. Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In CVPR.","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"J. Thies M. Zollh\u00f6fer and M. Nie\u00dfner. 2019. Deferred neural rendering: Image synthesis using neural textures. ACM Transactions on Graphics (2019).  J. Thies M. Zollh\u00f6fer and M. Nie\u00dfner. 2019. Deferred neural rendering: Image synthesis using neural textures. ACM Transactions on Graphics (2019).","DOI":"10.1145\/3306346.3323035"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"J. Thies M. Zollh\u00f6fer M. Stamminger C. Theobalt and M. Nie\u00dfner. 2016. Face2Face: Real-Time Face Capture and Reenactment of RGB Videos. In CVPR.  J. Thies M. Zollh\u00f6fer M. Stamminger C. Theobalt and M. Nie\u00dfner. 2016. Face2Face: Real-Time Face Capture and Reenactment of RGB Videos. In CVPR.","DOI":"10.1109\/CVPR.2016.262"},{"key":"e_1_3_2_2_30_1","unstructured":"D. Tran L. Bourdev R. Fergus L. Torresani and M. Paluri. 2014. C3D: Generic Features for Video Analysis. In arXiv:1412.0767.  D. Tran L. Bourdev R. Fergus L. Torresani and M. Paluri. 2014. C3D: Generic Features for Video Analysis. In arXiv:1412.0767."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"X. Yang Y. Li and S. Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. In ICASSP.  X. Yang Y. Li and S. Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. In ICASSP.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"K. Zhang Z. Zhang Z. Li and Y. Qiao. 2016. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks. IEEE Signal Processing Letters (2016).  K. Zhang Z. Zhang Z. Li and Y. Qiao. 2016. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks. IEEE Signal Processing Letters (2016).","DOI":"10.1109\/LSP.2016.2603342"}],"event":{"name":"MM '20: The 28th ACM International Conference on Multimedia","location":"Seattle WA USA","acronym":"MM '20","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 28th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394171.3413769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:17Z","timestamp":1750197677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413769"}},"subtitle":["A Challenging Real-World Dataset for Deepfake Detection"],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":32,"alternative-id":["10.1145\/3394171.3413769","10.1145\/3394171"],"URL":"https:\/\/doi.org\/10.1145\/3394171.3413769","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}