{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:50:31Z","timestamp":1777654231866,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3503161.3547806","type":"proceedings-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T15:42:35Z","timestamp":1665416555000},"page":"4102-4111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Face Forgery Detection via Symmetric Transformer"],"prefix":"10.1145","author":[{"given":"Luchuan","family":"Song","sequence":"first","affiliation":[{"name":"University of Rochester, Rochester, NY, USA"}]},{"given":"Xiaodan","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Zheng","family":"Fang","sequence":"additional","affiliation":[{"name":"Shopee Inc., Shanghai, China"}]},{"given":"Zhenchao","family":"Jin","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China"}]},{"given":"YueFeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Chenliang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Rochester, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"(n.d.). Deepfakes. https:\/\/github.com\/deepfakes\/faceswap\/.  (n.d.). Deepfakes. https:\/\/github.com\/deepfakes\/faceswap\/."},{"key":"e_1_3_2_2_2_1","unstructured":"(n.d.). Faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap\/.  (n.d.). Faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap\/."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_2_2_6_1","volume-title":"A short note on the kinetics-700 human action dataset. arXiv preprint arXiv:1907.06987","author":"Carreira Joao","year":"2019","unstructured":"Joao Carreira , Eric Noland , Chloe Hillier , and Andrew Zisserman . 2019. A short note on the kinetics-700 human action dataset. arXiv preprint arXiv:1907.06987 ( 2019 ). Joao Carreira, Eric Noland, Chloe Hillier, and Andrew Zisserman. 2019. A short note on the kinetics-700 human action dataset. arXiv preprint arXiv:1907.06987 (2019)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_2_8_1","volume-title":"What makes fake images detectable? Understanding properties that generalize. arXiv preprint arXiv:2008.10588","author":"Chai Lucy","year":"2020","unstructured":"Lucy Chai , David Bau , Ser-Nam Lim , and Phillip Isola . 2020. What makes fake images detectable? Understanding properties that generalize. arXiv preprint arXiv:2008.10588 ( 2020 ). Lucy Chai, David Bau, Ser-Nam Lim, and Phillip Isola. 2020. What makes fake images detectable? Understanding properties that generalize. arXiv preprint arXiv:2008.10588 (2020)."},{"key":"e_1_3_2_2_9_1","volume-title":"Pre-trained image processing transformer. arXiv preprint arXiv:2012.00364","author":"Chen Hanting","year":"2020","unstructured":"Hanting Chen , Yunhe Wang , Tianyu Guo , Chang Xu , Yiping Deng , Zhenhua Liu , Siwei Ma , Chunjing Xu , Chao Xu , and Wen Gao . 2020. Pre-trained image processing transformer. arXiv preprint arXiv:2012.00364 ( 2020 ). Hanting Chen, Yunhe Wang, Tianyu Guo, Chang Xu, Yiping Deng, Zhenhua Liu, Siwei Ma, Chunjing Xu, Chao Xu, and Wen Gao. 2020. Pre-trained image processing transformer. arXiv preprint arXiv:2012.00364 (2020)."},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 8351--8361","author":"Chen Tianlong","year":"2019","unstructured":"Tianlong Chen , Shaojin Ding , Jingyi Xie , Ye Yuan , Wuyang Chen , Yang Yang , Zhou Ren , and ZhangyangWang. 2019 . Abd-net: Attentive but diverse person reidentification . In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 8351--8361 . Tianlong Chen, Shaojin Ding, Jingyi Xie, Ye Yuan, Wuyang Chen, Yang Yang, Zhou Ren, and ZhangyangWang. 2019. Abd-net: Attentive but diverse person reidentification. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 8351--8361."},{"key":"e_1_3_2_2_11_1","volume-title":"Manipulated Face Detector: Joint Spatial and Frequency Domain Attention Network. arXiv preprint arXiv:2005.02958","author":"Chen Zehao","year":"2020","unstructured":"Zehao Chen and Hua Yang . 2020. Manipulated Face Detector: Joint Spatial and Frequency Domain Attention Network. arXiv preprint arXiv:2005.02958 ( 2020 ). Zehao Chen and Hua Yang. 2020. Manipulated Face Detector: Joint Spatial and Frequency Domain Attention Network. arXiv preprint arXiv:2005.02958 (2020)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6693"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_2_2_17_1","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly etal 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020).  Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_2_18_1","volume-title":"Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686","author":"Durall Ricard","year":"2019","unstructured":"Ricard Durall , Margret Keuper , Franz-Josef Pfreundt , and Janis Keuper . 2019. Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686 ( 2019 ). Ricard Durall, Margret Keuper, Franz-Josef Pfreundt, and Janis Keuper. 2019. Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686 (2019)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00630"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00326"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v7.i1.pp131-137"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00685"},{"key":"e_1_3_2_2_25_1","volume-title":"Deep Residual Learning for Image Recognition. arXiv preprint arXiv:1512.03385","author":"He Kaiming","year":"2015","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2015. Deep Residual Learning for Image Recognition. arXiv preprint arXiv:1512.03385 ( 2015 ). Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. arXiv preprint arXiv:1512.03385 (2015)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"e_1_3_2_2_29_1","volume-title":"Detection of deep network generated images using disparities in color components. arXiv preprint arXiv:1808.07276","author":"Li Haodong","year":"2018","unstructured":"Haodong Li , Bin Li , Shunquan Tan , and Jiwu Huang . 2018. Detection of deep network generated images using disparities in color components. arXiv preprint arXiv:1808.07276 ( 2018 ). Haodong Li, Bin Li, Shunquan Tan, and Jiwu Huang. 2018. Detection of deep network generated images using disparities in color components. arXiv preprint arXiv:1808.07276 (2018)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_2_2_31_1","volume-title":"Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li and Siwei Lyu . 2018. Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 ( 2018 ). Yuezun Li and Siwei Lyu. 2018. Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 (2018)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00342"},{"key":"e_1_3_2_2_35_1","volume-title":"Shenoy Pratik Gurudatt","author":"Masi Iacopo","year":"2020","unstructured":"Iacopo Masi , Aditya Killekar , Royston Marian Mascarenhas , Shenoy Pratik Gurudatt , andWael AbdAlmageed. 2020 . Two-branch Recurrent Network for Isolating Deepfakes in Videos . arXiv preprint arXiv:2008.03412 (2020). Iacopo Masi, Aditya Killekar, Royston Marian Mascarenhas, Shenoy Pratik Gurudatt, andWael AbdAlmageed. 2020. Two-branch Recurrent Network for Isolating Deepfakes in Videos. arXiv preprint arXiv:2008.03412 (2020)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_2_37_1","volume-title":"Detecting gan-generated imagery using color cues. arXiv preprint arXiv:1812.08247","author":"McCloskey Scott","year":"2018","unstructured":"Scott McCloskey and Michael Albright . 2018. Detecting gan-generated imagery using color cues. arXiv preprint arXiv:1812.08247 ( 2018 ). Scott McCloskey and Michael Albright. 2018. Detecting gan-generated imagery using color cues. arXiv preprint arXiv:1812.08247 (2018)."},{"key":"e_1_3_2_2_38_1","volume-title":"Multitask learning for detecting and segmenting manipulated facial images and videos. arXiv preprint arXiv:1906.06876","author":"Nguyen Huy H","year":"2019","unstructured":"Huy H Nguyen , Fuming Fang , Junichi Yamagishi , and Isao Echizen . 2019. Multitask learning for detecting and segmenting manipulated facial images and videos. arXiv preprint arXiv:1906.06876 ( 2019 ). Huy H Nguyen, Fuming Fang, Junichi Yamagishi, and Isao Echizen. 2019. Multitask learning for detecting and segmenting manipulated facial images and videos. arXiv preprint arXiv:1906.06876 (2019)."},{"key":"e_1_3_2_2_39_1","volume-title":"Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467","author":"Nguyen Huy H","year":"2019","unstructured":"Huy H Nguyen , Junichi Yamagishi , and Isao Echizen . 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467 ( 2019 ). Huy H Nguyen, Junichi Yamagishi, and Isao Echizen. 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467 (2019)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"e_1_3_2_2_41_1","volume-title":"Thinking in Frequency: Face Forgery Detection by Mining Frequency-aware Clues. arXiv preprint arXiv:2007.09355","author":"Qian Yuyang","year":"2020","unstructured":"Yuyang Qian , Guojun Yin , Lu Sheng , Zixuan Chen , and Jing Shao . 2020. Thinking in Frequency: Face Forgery Detection by Mining Frequency-aware Clues. arXiv preprint arXiv:2007.09355 ( 2020 ). Yuyang Qian, Guojun Yin, Lu Sheng, Zixuan Chen, and Jing Shao. 2020. Thinking in Frequency: Face Forgery Detection by Mining Frequency-aware Clues. arXiv preprint arXiv:2007.09355 (2020)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_44_1","volume-title":"An Isotropic 3x3 Image Gradient Operator. Presentation at Stanford A.I. Project 1968 (02","author":"Sobel Irwin","year":"2014","unstructured":"Irwin Sobel . 2014. An Isotropic 3x3 Image Gradient Operator. Presentation at Stanford A.I. Project 1968 (02 2014 ). Irwin Sobel. 2014. An Isotropic 3x3 Image Gradient Operator. Presentation at Stanford A.I. Project 1968 (02 2014)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475196"},{"key":"e_1_3_2_2_46_1","volume-title":"Bottleneck Transformers for Visual Recognition. arXiv preprint arXiv:2101.11605","author":"Srinivas Aravind","year":"2021","unstructured":"Aravind Srinivas , Tsung-Yi Lin , Niki Parmar , Jonathon Shlens , Pieter Abbeel , and Ashish Vaswani . 2021. Bottleneck Transformers for Visual Recognition. arXiv preprint arXiv:2101.11605 ( 2021 ). Aravind Srinivas, Tsung-Yi Lin, Niki Parmar, Jonathon Shlens, Pieter Abbeel, and Ashish Vaswani. 2021. Bottleneck Transformers for Visual Recognition. arXiv preprint arXiv:2101.11605 (2021)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00452"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_2_50_1","volume-title":"DeepFakes Evolution: Analysis of Facial Regions and Fake Detection Performance. arXiv preprint arXiv:2004.07532","author":"Tolosana Ruben","year":"2020","unstructured":"Ruben Tolosana , Sergio Romero-Tapiador , Julian Fierrez , and Ruben Vera-Rodriguez . 2020. DeepFakes Evolution: Analysis of Facial Regions and Fake Detection Performance. arXiv preprint arXiv:2004.07532 ( 2020 ). Ruben Tolosana, Sergio Romero-Tapiador, Julian Fierrez, and Ruben Vera-Rodriguez. 2020. DeepFakes Evolution: Analysis of Facial Regions and Fake Detection Performance. arXiv preprint arXiv:2004.07532 (2020)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"e_1_3_2_2_52_1","volume-title":"Attention is all you need. arXiv preprint arXiv:1706.03762","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017. Attention is all you need. arXiv preprint arXiv:1706.03762 ( 2017 ). Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. arXiv preprint arXiv:1706.03762 (2017)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00871"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_2"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_2_56_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 7794--7803","author":"Girshick Ross","year":"2018","unstructured":"XiaolongWang, Ross Girshick , Abhinav Gupta , and Kaiming He . 2018 . Non-local neural networks . In Proceedings of the IEEE conference on computer vision and pattern recognition. 7794--7803 . XiaolongWang, Ross Girshick, Abhinav Gupta, and Kaiming He. 2018. Non-local neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7794--7803."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG47880.2020.00089"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_2_2_59_1","unstructured":"Hengshuang Zhao Jiaya Jia and Vladlen Koltun. 2020. Exploring Self-attention for Image Recognition. In CVPR.  Hengshuang Zhao Jiaya Jia and Vladlen Koltun. 2020. Exploring Self-attention for Image Recognition. In CVPR."},{"key":"e_1_3_2_2_60_1","volume-title":"End-to-End Object Detection with Adaptive Clustering Transformer. arXiv preprint arXiv:2011.09315","author":"Zheng Minghang","year":"2020","unstructured":"Minghang Zheng , Peng Gao , Xiaogang Wang , Hongsheng Li , and Hao Dong . 2020. End-to-End Object Detection with Adaptive Clustering Transformer. arXiv preprint arXiv:2011.09315 ( 2020 ). Minghang Zheng, Peng Gao, Xiaogang Wang, Hongsheng Li, and Hao Dong. 2020. End-to-End Object Detection with Adaptive Clustering Transformer. arXiv preprint arXiv:2011.09315 (2020)."},{"key":"e_1_3_2_2_61_1","volume-title":"Informer: Beyond Efficient Transformer for Long Sequence Time-Series Forecasting. arXiv preprint arXiv:2012.07436","author":"Zhou Haoyi","year":"2020","unstructured":"Haoyi Zhou , Shanghang Zhang , Jieqi Peng , Shuai Zhang , Jianxin Li , Hui Xiong , and Wancai Zhang . 2020 . Informer: Beyond Efficient Transformer for Long Sequence Time-Series Forecasting. arXiv preprint arXiv:2012.07436 (2020). Haoyi Zhou, Shanghang Zhang, Jieqi Peng, Shuai Zhang, Jianxin Li, Hui Xiong, and Wancai Zhang. 2020. Informer: Beyond Efficient Transformer for Long Sequence Time-Series Forecasting. arXiv preprint arXiv:2012.07436 (2020)."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"}],"event":{"name":"MM '22: The 30th ACM International Conference on Multimedia","location":"Lisboa Portugal","acronym":"MM '22","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 30th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3547806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503161.3547806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:34Z","timestamp":1750186954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3547806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":62,"alternative-id":["10.1145\/3503161.3547806","10.1145\/3503161"],"URL":"https:\/\/doi.org\/10.1145\/3503161.3547806","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2022-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}