{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:02:19Z","timestamp":1769472139595,"version":"3.49.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Comput. Graph. Interact. Tech."],"published-print":{"date-parts":[[2021,4,26]]},"abstract":"<jats:p>Game publishers and anti-cheat companies have been unsuccessful in blocking cheating in online gaming. We propose a novel, vision-based approach that captures the frame buffer's final state and detects illicit overlays. To this aim, we train and evaluate a DNN detector on a new dataset, collected using two first-person shooter games and three cheating software. We study the advantages and disadvantages of different DNN architectures operating on a local or global scale. We use output confidence analysis to avoid unreliable detections and inform when network retraining is required. In an ablation study, we show how to use Interval Bound Propagation (IBP) to build a detector that is also resistant to potential adversarial attacks and study IBP's interaction with confidence analysis. Our results show that robust and effective anti-cheating through machine learning is practically feasible and can be used to guarantee fair play in online gaming.<\/jats:p>","DOI":"10.1145\/3451259","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:37Z","timestamp":1619669857000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Robust Vision-Based Cheat Detection in Competitive Gaming"],"prefix":"10.1145","volume":"4","author":[{"given":"Aditya","family":"Jonnalagadda","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]},{"given":"Iuri","family":"Frosio","sequence":"additional","affiliation":[{"name":"NVIDIA, Santa Clara, California, USA"}]},{"given":"Seth","family":"Schneider","sequence":"additional","affiliation":[{"name":"NVIDIA, Santa Clara, California, USA"}]},{"given":"Morgan","family":"McGuire","sequence":"additional","affiliation":[{"name":"NVIDIA, Santa Clara, California, USA"}]},{"given":"Joohwan","family":"Kim","sequence":"additional","affiliation":[{"name":"NVIDIA, Santa Clara, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"Aimware. 2014. aimware. https:\/\/aimware.net\/  Aimware. 2014. aimware. https:\/\/aimware.net\/"},{"key":"e_1_2_2_2_1","doi-asserted-by":"crossref","unstructured":"H. Alayed Fotos Frangoudes and Clifford Neuman. 2013. Behavioral-based cheating detection in online first person shooters using machine learning techniques. 1--8. https:\/\/doi.org\/10.1109\/CIG.2013.6633617  H. Alayed Fotos Frangoudes and Clifford Neuman. 2013. Behavioral-based cheating detection in online first person shooters using machine learning techniques. 1--8. https:\/\/doi.org\/10.1109\/CIG.2013.6633617","DOI":"10.1109\/CIG.2013.6633617"},{"key":"e_1_2_2_3_1","volume-title":"forsaken caught cheating at eXTREMESLAND","author":"Burazin Zvonimir"},{"key":"e_1_2_2_4_1","unstructured":"Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow Aleksander Madry and Alexey Kurakin. 2019. On Evaluating Adversarial Robustness. arXiv:1902.06705 [cs.LG]  Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow Aleksander Madry and Alexey Kurakin. 2019. On Evaluating Adversarial Robustness. arXiv:1902.06705 [cs.LG]"},{"key":"e_1_2_2_5_1","volume-title":"Gabe Van Engel, and Matt Rhoten","author":"Cox Anthony John","year":"2019"},{"key":"e_1_2_2_6_1","volume-title":"On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks. CoRR abs\/1809.02861","author":"Demontis Ambra","year":"2018"},{"key":"e_1_2_2_7_1","unstructured":"FACEIT. 2021. FACEIT. https:\/\/www.faceit.com\/en\/anti-cheat  FACEIT. 2021. FACEIT. https:\/\/www.faceit.com\/en\/anti-cheat"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2011.6032016"},{"key":"e_1_2_2_9_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412","author":"Goodfellow Ian","year":"2015"},{"key":"e_1_2_2_10_1","volume-title":"On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models. CoRR abs\/1810.12715","author":"Gowal Sven","year":"2018"},{"key":"e_1_2_2_11_1","unstructured":"iNIURIA. 2021. iNIURIA Cheats. https:\/\/www.iniuria.us\/forum\/  iNIURIA. 2021. iNIURIA Cheats. https:\/\/www.iniuria.us\/forum\/"},{"key":"e_1_2_2_12_1","volume-title":"GCI: A GPU Based Transfer Learning Approach for Detecting Cheats of Computer Game","author":"Islam M. S.","year":"2020"},{"key":"e_1_2_2_13_1","unstructured":"Sergey Kastryulin Dzhamil Zakirov and Denis Prokopenko. 2019. PyTorch Image Quality: Metrics and Measure for Image Quality Assessment. https:\/\/github.com\/photosynthesis-team\/piq Open-source software available at https:\/\/github.com\/photosynthesis-team\/piq.  Sergey Kastryulin Dzhamil Zakirov and Denis Prokopenko. 2019. PyTorch Image Quality: Metrics and Measure for Image Quality Assessment. https:\/\/github.com\/photosynthesis-team\/piq Open-source software available at https:\/\/github.com\/photosynthesis-team\/piq."},{"key":"e_1_2_2_14_1","volume-title":"Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12","author":"Kingma Diederik","year":"2014"},{"key":"e_1_2_2_15_1","volume-title":"Computational Data and Social Networks","author":"Kotkov Denis"},{"key":"e_1_2_2_16_1","unstructured":"A. Kurakin Ian J. Goodfellow and S. Bengio. 2017. Adversarial examples in the physical world. ArXiv abs\/1607.02533 (2017).  A. Kurakin Ian J. Goodfellow and S. Bengio. 2017. Adversarial examples in the physical world. ArXiv abs\/1607.02533 (2017)."},{"key":"e_1_2_2_17_1","unstructured":"Evan Lahti. 2014. CS:GO cheating scandal casts shadow on competitive scene as three players are banned. https:\/\/www.pcgamer.com\/csgo-competitive-scene-embroiled-in-hacking-scandal-as-three-players-are-banned\/  Evan Lahti. 2014. CS:GO cheating scandal casts shadow on competitive scene as three players are banned. https:\/\/www.pcgamer.com\/csgo-competitive-scene-embroiled-in-hacking-scandal-as-three-players-are-banned\/"},{"key":"e_1_2_2_18_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Madry Aleksander","year":"2018"},{"key":"e_1_2_2_19_1","volume-title":"Valorant Hacks: Cheater gets exposed in the quarter-finals of the TGS Signature Series. https:\/\/www.sportskeeda.com\/esports\/valorant-hacks-cheater-gets-exposed-quarter-finals-tgs-signature-series","author":"Mallick Abhishek","year":"2020"},{"key":"e_1_2_2_20_1","volume-title":"Article arXiv:1811.06817 (Nov.","author":"Michelmore Rhiannon","year":"2018"},{"key":"e_1_2_2_21_1","volume-title":"Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 86--94","author":"Moosavi-Dezfooli S."},{"key":"e_1_2_2_22_1","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2574--2582","author":"Moosavi-Dezfooli S."},{"key":"e_1_2_2_23_1","volume-title":"Hinton","author":"Nair V.","year":"2010"},{"key":"e_1_2_2_24_1","unstructured":"OBS. 2016. OBS Studio. https:\/\/obsproject.com\/  OBS. 2016. OBS Studio. https:\/\/obsproject.com\/"},{"key":"e_1_2_2_25_1","volume-title":"Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. arXiv preprint arXiv:1610.00768","author":"Papernot Nicolas","year":"2018"},{"key":"e_1_2_2_26_1","volume-title":"Detecting Cheating in Computer Games using Data Mining Methods. American Journal of Computer Science and Information Technology 06 (01","author":"Philbert Alexandre","year":"2018"},{"key":"e_1_2_2_27_1","unstructured":"Punkbuster. 2000. Even Balance Inc. - PunkBuster Online Countermeasures. https:\/\/www.evenbalance.com\/  Punkbuster. 2000. Even Balance Inc. - PunkBuster Online Countermeasures. https:\/\/www.evenbalance.com\/"},{"key":"e_1_2_2_28_1","unstructured":"Pytorch. 2019. LogSigmoid Pytorch. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.LogSigmoid.html#torch.nn.LogSigmoid  Pytorch. 2019. LogSigmoid Pytorch. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.LogSigmoid.html#torch.nn.LogSigmoid"},{"key":"e_1_2_2_29_1","volume-title":"A Haar Wavelet-Based Perceptual Similarity Index for Image Quality Assessment. Signal Processing Image Communication 61 (02","author":"Reisenhofer Rafael","year":"2018"},{"key":"e_1_2_2_30_1","volume-title":"2017 IEEE International Conference on Computer Vision (ICCV). 618--626","author":"Selvaraju R. R."},{"key":"e_1_2_2_31_1","volume-title":"Advances in Neural Information Processing Systems 31","author":"Sensoy Murat"},{"key":"e_1_2_2_32_1","unstructured":"Skycheats. 2021. SKY Cheats - Undetected Hacks and Cheats for PC Games. https:\/\/www.skycheats.com\/  Skycheats. 2021. SKY Cheats - Undetected Hacks and Cheats for PC Games. https:\/\/www.skycheats.com\/"},{"key":"e_1_2_2_33_1","unstructured":"Stevewhims. 2018. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/dxgi\/nf-dxgi-idxgiswapchain-present  Stevewhims. 2018. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/dxgi\/nf-dxgi-idxgiswapchain-present"},{"key":"e_1_2_2_34_1","unstructured":"Valve Software. 2012. Counter-Strike: Global Offensive.  Valve Software. 2012. Counter-Strike: Global Offensive."},{"key":"e_1_2_2_35_1","unstructured":"Jess Wells. 2020. A CS:GO player has built an AI tool and it's caught 14 000 cheaters. https:\/\/www.theloadout.com\/csgo\/2eggs-hestianet  Jess Wells. 2020. A CS:GO player has built an AI tool and it's caught 14 000 cheaters. https:\/\/www.theloadout.com\/csgo\/2eggs-hestianet"},{"key":"e_1_2_2_36_1","volume-title":"Jain","author":"Xu Han","year":"2019"}],"container-title":["Proceedings of the ACM on Computer Graphics and Interactive Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3451259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:25Z","timestamp":1750268965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,4,26]]}},"alternative-id":["10.1145\/3451259"],"URL":"https:\/\/doi.org\/10.1145\/3451259","relation":{},"ISSN":["2577-6193"],"issn-type":[{"value":"2577-6193","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}