{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:23:24Z","timestamp":1777735404909,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3461702.3462584","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:21:32Z","timestamp":1627694492000},"page":"736-744","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["The Deepfake Detection Dilemma"],"prefix":"10.1145","author":[{"given":"Claire R.","family":"Leibowicz","sequence":"first","affiliation":[{"name":"The Partnership on AI, San Francisco, CA, USA"}]},{"given":"Sean","family":"McGregor","sequence":"additional","affiliation":[{"name":"XPRIZE Foundation, Syntiant Corp, Irvine, CA, USA"}]},{"given":"Aviv","family":"Ovadya","sequence":"additional","affiliation":[{"name":"Thoughtful Technology Project, San Francisco, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"H. Ajder G. Patrini F. Cavalli and L. Cullen. 2019. The State of Deepfakes: Landscape Threats and Impact. Deeptrace Policy Brief.  H. Ajder G. Patrini F. Cavalli and L. Cullen. 2019. The State of Deepfakes: Landscape Threats and Impact. Deeptrace Policy Brief."},{"key":"e_1_3_2_1_2_1","unstructured":"D. Alba. 2020. Tool to Help Journalists Spot Doctored Images Is Unveiled by Jigsaw. The New York Times. https:\/\/www.nytimes.com\/2020\/02\/04\/technology\/jigsawdoctored- images-disinformation.html  D. Alba. 2020. Tool to Help Journalists Spot Doctored Images Is Unveiled by Jigsaw. The New York Times. https:\/\/www.nytimes.com\/2020\/02\/04\/technology\/jigsawdoctored- images-disinformation.html"},{"key":"e_1_3_2_1_3_1","unstructured":"J. Benton. 202"},{"key":"e_1_3_2_1_4_1","unstructured":"M. Bickert. 2020. Enforcing Against Manipulated Media.  M. Bickert. 2020. Enforcing Against Manipulated Media."},{"key":"e_1_3_2_1_5_1","unstructured":"T. Burt and E. Horvitz. 2020. New Steps to Combat Disinformation. Microsoft On the Issues.  T. Burt and E. Horvitz. 2020. New Steps to Combat Disinformation. Microsoft On the Issues."},{"key":"e_1_3_2_1_6_1","unstructured":"Rosie Campbell. 2020. Publication Norms for Responsible AI. Partnership on AI.  Rosie Campbell. 2020. Publication Norms for Responsible AI. Partnership on AI."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Cohen. 202"},{"key":"e_1_3_2_1_8_1","unstructured":"S Cole. 2019. This Horrifying App Undresses a Photo of Any Woman With a Single Click. Motherboard.  S Cole. 2019. This Horrifying App Undresses a Photo of Any Woman With a Single Click. Motherboard."},{"key":"e_1_3_2_1_9_1","volume-title":"Remembering the Case that Established Code as Speech","author":"Dame-Boyle A.","unstructured":"A. Dame-Boyle . 2015. Remembering the Case that Established Code as Speech . The Electronic Frontier Foundation . A. Dame-Boyle. 2015. Remembering the Case that Established Code as Speech. The Electronic Frontier Foundation."},{"key":"e_1_3_2_1_10_1","volume-title":"The DeepFake Detection Challenge (DFDC) Dataset. arXiv e-prints","author":"Dolhansky B.","year":"2019","unstructured":"B. Dolhansky , J. Bitton , B. Pflaum , J. Lu , R. Howes , M. Wang , and C. Canton Ferrer . 2019. The DeepFake Detection Challenge (DFDC) Dataset. arXiv e-prints ( 2019 ). B. Dolhansky, J. Bitton, B. Pflaum, J. Lu, R. Howes, M. Wang, and C. Canton Ferrer. 2019. The DeepFake Detection Challenge (DFDC) Dataset. arXiv e-prints (2019)."},{"key":"e_1_3_2_1_11_1","unstructured":"S. Fischer. 2020. Project Origin is watermarking media to fight fake news ahead of the election. Axios.  S. Fischer. 2020. Project Origin is watermarking media to fight fake news ahead of the election. Axios."},{"key":"e_1_3_2_1_12_1","unstructured":"S. Gregory. 2018. Prepare Don't Panic. WITNESS Blog.  S. Gregory. 2018. Prepare Don't Panic. WITNESS Blog."},{"key":"e_1_3_2_1_13_1","unstructured":"S. Gregory. 2019. Deepfakes and Synthetic Media: Updated Survey of Solutions Against Malicious Usages. WITNESS Blog.  S. Gregory. 2019. Deepfakes and Synthetic Media: Updated Survey of Solutions Against Malicious Usages. WITNESS Blog."},{"key":"e_1_3_2_1_14_1","unstructured":"S Gregory. 2020. Tracing trust: Why we must build authenticity infrastructure that works for all. WITNESS Blog.  S Gregory. 2020. Tracing trust: Why we must build authenticity infrastructure that works for all. WITNESS Blog."},{"key":"e_1_3_2_1_15_1","unstructured":"Christopher Hesse. 2017. Image-to-Image Demo: Interactive Image Translation with pix2pix-tensorflow. https:\/\/affinelayer.com\/pixsrv\/  Christopher Hesse. 2017. Image-to-Image Demo: Interactive Image Translation with pix2pix-tensorflow. https:\/\/affinelayer.com\/pixsrv\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.51593\/20190030"},{"key":"e_1_3_2_1_17_1","volume-title":"Imageto- Image Translation with Conditional Adversarial Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE. https: \/\/doi.org\/10","author":"Isola Phillip","year":"2017","unstructured":"Phillip Isola , Jun-Yan Zhu , Tinghui Zhou , and Alexei A. Efros . 2017 . Imageto- Image Translation with Conditional Adversarial Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE. https: \/\/doi.org\/10 .1109\/cvpr. 2017 .632 10.1109\/cvpr.2017.632 Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Imageto- Image Translation with Conditional Adversarial Networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE. https: \/\/doi.org\/10.1109\/cvpr.2017.632"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"C. Leibowicz. 2020. The Deepfake Detection Challenge: Insights and Recommendations for AI and Media Integrity. PAI Research Paper.  C. Leibowicz. 2020. The Deepfake Detection Challenge: Insights and Recommendations for AI and Media Integrity. PAI Research Paper.","DOI":"10.1145\/3461702.3462584"},{"key":"e_1_3_2_1_19_1","unstructured":"C. Leibowicz S. Adler and P. Eckersley. 2019. When Is It Appropriate to Publish High-Stakes AI Research? PAI Blog.  C. Leibowicz S. Adler and P. Eckersley. 2019. When Is It Appropriate to Publish High-Stakes AI Research? PAI Blog."},{"key":"e_1_3_2_1_20_1","unstructured":"C. Leibowicz J. Stray and E. Saltz. 2020. Manipulated Media Detection Requires More Than Tools: Community Insights on What's Needed. PAI Blog.  C. Leibowicz J. Stray and E. Saltz. 2020. Manipulated Media Detection Requires More Than Tools: Community Insights on What's Needed. PAI Blog."},{"key":"e_1_3_2_1_21_1","volume-title":"Adversarial Threats to DeepFake Detection: A Practical Perspective. arXiv preprint arXiv:2011.09957","author":"Neekhara Paarth","year":"2020","unstructured":"Paarth Neekhara , Brian Dolhansky , Joanna Bitton , and Cristian Canton Ferrer . 2020. Adversarial Threats to DeepFake Detection: A Practical Perspective. arXiv preprint arXiv:2011.09957 ( 2020 ). Paarth Neekhara, Brian Dolhansky, Joanna Bitton, and Cristian Canton Ferrer. 2020. Adversarial Threats to DeepFake Detection: A Practical Perspective. arXiv preprint arXiv:2011.09957 (2020)."},{"key":"e_1_3_2_1_22_1","unstructured":"Aviv Ovadya. 2019. Making deepfake tools doesn't have to be irresponsible. Here's how. MIT Technology Review.  Aviv Ovadya. 2019. Making deepfake tools doesn't have to be irresponsible. Here's how. MIT Technology Review."},{"key":"e_1_3_2_1_23_1","unstructured":"Aviv Ovadya. 2020. Making Sense of Deepfake Mitigations. Medium.  Aviv Ovadya. 2020. Making Sense of Deepfake Mitigations. Medium."},{"key":"e_1_3_2_1_24_1","volume":"201","author":"Ovadya A.","unstructured":"A. Ovadya and J. Whittlestone. 201 9. Reducing Malicious Use of Synthetic Media Research: Considerations and Potential Release Practices for Machine Learning. ArXiv. A. Ovadya and J. Whittlestone. 2019. Reducing Malicious Use of Synthetic Media Research: Considerations and Potential Release Practices for Machine Learning. ArXiv.","journal-title":"J. Whittlestone."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_4"},{"key":"e_1_3_2_1_26_1","unstructured":"L. Rosenthol A. Parsons E. Scouten J. Aythora B. MacCormack P. England M. Levallee J. Dotan S. Hanna H. Farid and S. Gregory. 2020. The Content Authenticity Initiative: Setting the Standard for Digital Content Attribution. Adobe Whitepaper.  L. Rosenthol A. Parsons E. Scouten J. Aythora B. MacCormack P. England M. Levallee J. Dotan S. Hanna H. Farid and S. Gregory. 2020. The Content Authenticity Initiative: Setting the Standard for Digital Content Attribution. Adobe Whitepaper."},{"key":"e_1_3_2_1_27_1","unstructured":"Y. Roth and A. Achuthan. 2020. Building rules in public: Our approach to synthetic and manipulated media. Twitter Blog.  Y. Roth and A. Achuthan. 2020. Building rules in public: Our approach to synthetic and manipulated media. Twitter Blog."},{"key":"e_1_3_2_1_28_1","unstructured":"E. Saltz L. Coleman and C.R. Leibowicz. 2020. Making AI Art Responsibly: A Field Guide. Medium.  E. Saltz L. Coleman and C.R. Leibowicz. 2020. Making AI Art Responsibly: A Field Guide. Medium."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"E. Saltz C. Leibowicz and C. Wardle. 2020. Encounters with Visual Misinformation and Labels Across Platforms: An Interview and Diary Study to Inform Ecosystem Approaches to Misinformation Interventions.  E. Saltz C. Leibowicz and C. Wardle. 2020. Encounters with Visual Misinformation and Labels Across Platforms: An Interview and Diary Study to Inform Ecosystem Approaches to Misinformation Interventions.","DOI":"10.1145\/3411763.3451807"},{"key":"e_1_3_2_1_30_1","volume-title":"Media Forensics and DeepFakes: An Overview","author":"Verdoliva L.","year":"2020","unstructured":"L. Verdoliva . 2020. Media Forensics and DeepFakes: An Overview . IEEE Journal of Selected Topics in Signal Processing ( 2020 ). L. Verdoliva. 2020. Media Forensics and DeepFakes: An Overview. IEEE Journal of Selected Topics in Signal Processing (2020)."},{"key":"e_1_3_2_1_31_1","unstructured":"C. Wardle. 2019. Understanding Information Disorder. First Draft News.  C. Wardle. 2019. Understanding Information Disorder. First Draft News."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335724"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"N. Yu V. Skripniuk and S. Abdelnabi. 2020. Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data. arXiv e-prints (2020).  N. Yu V. Skripniuk and S. Abdelnabi. 2020. Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data. arXiv e-prints (2020).","DOI":"10.1109\/ICCV48922.2021.01418"}],"event":{"name":"AIES '21: AAAI\/ACM Conference on AI, Ethics, and Society","location":"Virtual Event USA","acronym":"AIES '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"]},"container-title":["Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:05Z","timestamp":1750191425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462584"}},"subtitle":["A Multistakeholder Exploration of Adversarial Dynamics in Synthetic Media"],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":33,"alternative-id":["10.1145\/3461702.3462584","10.1145\/3461702"],"URL":"https:\/\/doi.org\/10.1145\/3461702.3462584","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}