{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:27:51Z","timestamp":1767994071082,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Department of State Global Engagement Center","award":["SGECPD18CA0024"],"award-info":[{"award-number":["SGECPD18CA0024"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["951911"],"award-info":[{"award-number":["951911"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3512732.3533587","type":"proceedings-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T22:34:13Z","timestamp":1656110053000},"page":"59-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["The MeVer DeepFake Detection Service: Lessons Learnt from Developing and Deploying in the Wild"],"prefix":"10.1145","author":[{"given":"Spiros","family":"Baxevanakis","sequence":"first","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]},{"given":"Giorgos","family":"Kordopatis-Zilos","sequence":"additional","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]},{"given":"Panagiotis","family":"Galopoulos","sequence":"additional","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]},{"given":"Lazaros","family":"Apostolidis","sequence":"additional","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]},{"given":"Killian","family":"Levacher","sequence":"additional","affiliation":[{"name":"IBM Research, Dublin, Ireland"}]},{"given":"Ipek","family":"Baris Schlicht","sequence":"additional","affiliation":[{"name":"Deutsche Welle, Bonn\/Berlin, Germany"}]},{"given":"Denis","family":"Teyssou","sequence":"additional","affiliation":[{"name":"Agence France-Presse, Paris, France"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]},{"given":"Symeon","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"ITI-CERTH, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2019","author":"Afchar Darius","year":"2019","unstructured":"Darius Afchar , Vincent Nozick , Junichi Yamagishi , and Isao Echizen . 2019 . MesoNet: A compact facial video forgery detection network . 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2019 ). https:\/\/doi.org\/10.1109\/WIFS.2018.8630761 ISBN: 9781538665367. 10.1109\/WIFS.2018.8630761 Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2019. MesoNet: A compact facial video forgery detection network. 10th IEEE International Workshop on Information Forensics and Security, WIFS 2018 (2019). https:\/\/doi.org\/10.1109\/WIFS.2018.8630761 ISBN: 9781538665367."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00021"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings - International Conference on Pattern Recognition (2020","author":"Bonettini Nicol\u00f2","year":"2020","unstructured":"Nicol\u00f2 Bonettini , Luca Bondi , Edoardo Daniele Cannas , Paolo Bestagini , Sara Mandelli , and Stefano Tubaro . 2020 . Video face manipulation detection through ensemble of CNNs . Proceedings - International Conference on Pattern Recognition (2020 ), 5012--5019. https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412711 ISBN: 9781728188089. 10.1109\/ICPR48806.2021.9412711 Nicol\u00f2 Bonettini, Luca Bondi, Edoardo Daniele Cannas, Paolo Bestagini, Sara Mandelli, and Stefano Tubaro. 2020. Video face manipulation detection through ensemble of CNNs. Proceedings - International Conference on Pattern Recognition (2020), 5012--5019. https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412711 ISBN: 9781728188089."},{"key":"e_1_3_2_2_4_1","first-page":"2","article-title":"Albumentations","volume":"11","author":"Buslaev Alexander","year":"2020","unstructured":"Alexander Buslaev , Vladimir I. Iglovikov , Eugene Khvedchenya , Alex Parinov , Mikhail Druzhinin , and Alexandr A. Kalinin . 2020 . Albumentations : Fast and Flexible Image Augmentations. Information 11 , 2 (Feb. 2020), 125. https:\/\/doi.org\/10.3390\/info11020125 Number: 2 Publisher: Multidisciplinary Digital Publishing Institute. 10.3390\/info11020125 Alexander Buslaev, Vladimir I. Iglovikov, Eugene Khvedchenya, Alex Parinov, Mikhail Druzhinin, and Alexandr A. Kalinin. 2020. Albumentations: Fast and Flexible Image Augmentations. Information 11, 2 (Feb. 2020), 125. https:\/\/doi.org\/10.3390\/info11020125 Number: 2 Publisher: Multidisciplinary Digital Publishing Institute.","journal-title":"Fast and Flexible Image Augmentations. Information"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 2020 Truth and Trust Online","author":"Charitidis Polychronis","year":"2020","unstructured":"Polychronis Charitidis , Giorgos Kordopatis-Zilos , Symeon Papadopoulos , and Ioannis Kompatsiaris . 2020 . Investigating the impact of pre-processing and prediction aggregation on the deepfake detection task . Proceedings of the 2020 Truth and Trust Online (2020), 44--54. Polychronis Charitidis, Giorgos Kordopatis-Zilos, Symeon Papadopoulos, and Ioannis Kompatsiaris. 2020. Investigating the impact of pre-processing and prediction aggregation on the deepfake detection task. Proceedings of the 2020 Truth and Trust Online (2020), 44--54."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_2_8_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Choquette-Choo Christopher A","year":"2021","unstructured":"Christopher A Choquette-Choo , Florian Tramer , Nicholas Carlini , and Nicolas Papernot . 2021 . Label-only membership inference attacks . In International Conference on Machine Learning. PMLR , 1964--1974. Christopher A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-only membership inference attacks. In International Conference on Machine Learning. PMLR, 1964--1974."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00421"},{"key":"e_1_3_2_2_10_1","volume-title":"Magnetic control of tokamak plasmas through deep reinforcement learning. Nature 602, 7897 (Feb","author":"Degrave Jonas","year":"2022","unstructured":"Jonas Degrave , Federico Felici , Jonas Buchli , Michael Neunert , Brendan Tracey , Francesco Carpanese , Timo Ewalds , Roland Hafner , Abbas Abdolmaleki , Diego de las Casas , Craig Donner , Leslie Fritz , Cristian Galperti , Andrea Huber , James Keeling , Maria Tsimpoukelli , Jackie Kay , Antoine Merle , Jean-Marc Moret , Seb Noury , Federico Pesamosca , David Pfau , Olivier Sauter , Cristian Sommariva , Stefano Coda , Basil Duval , Ambrogio Fasoli , Pushmeet Kohli , Koray Kavukcuoglu , Demis Hassabis , and Martin Riedmiller . 2022. Magnetic control of tokamak plasmas through deep reinforcement learning. Nature 602, 7897 (Feb . 2022 ), 414--419. https:\/\/doi.org\/10.1038\/s41586-021-04301--9 Number : 7897 Publisher : Nature Publishing Group . 10.1038\/s41586-021-04301--9 Jonas Degrave, Federico Felici, Jonas Buchli, Michael Neunert, Brendan Tracey, Francesco Carpanese, Timo Ewalds, Roland Hafner, Abbas Abdolmaleki, Diego de las Casas, Craig Donner, Leslie Fritz, Cristian Galperti, Andrea Huber, James Keeling, Maria Tsimpoukelli, Jackie Kay, Antoine Merle, Jean-Marc Moret, Seb Noury, Federico Pesamosca, David Pfau, Olivier Sauter, Cristian Sommariva, Stefano Coda, Basil Duval, Ambrogio Fasoli, Pushmeet Kohli, Koray Kavukcuoglu, Demis Hassabis, and Martin Riedmiller. 2022. Magnetic control of tokamak plasmas through deep reinforcement learning. Nature 602, 7897 (Feb. 2022), 414--419. https:\/\/doi.org\/10.1038\/s41586-021-04301--9 Number: 7897 Publisher: Nature Publishing Group."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_12_1","volume-title":"The DeepFake Detection Challenge (DFDC) Dataset. (2020). arXiv","author":"Dolhansky Brian","year":"2006","unstructured":"Brian Dolhansky , Joanna Bitton , Ben Pflaum , Jikuo Lu , Russ Howes , Menglin Wang , and Cristian Canton Ferrer . 2020. The DeepFake Detection Challenge (DFDC) Dataset. (2020). arXiv : 2006 .07397. Brian Dolhansky, Joanna Bitton, Ben Pflaum, Jikuo Lu, Russ Howes, Menglin Wang, and Cristian Canton Ferrer. 2020. The DeepFake Detection Challenge (DFDC) Dataset. (2020). arXiv: 2006.07397."},{"key":"e_1_3_2_2_13_1","unstructured":"Vincent Driessen. 2021. Python-RQ. https:\/\/python-rq.org\/docs\/.  Vincent Driessen. 2021. Python-RQ. https:\/\/python-rq.org\/docs\/."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411892"},{"key":"e_1_3_2_2_15_1","unstructured":"Tim Esler. 2022. Face Recognition Using Pytorch. https:\/\/github.com\/timesler\/facenet-pytorch original-date: 2019-05--25T01:29:24Z.  Tim Esler. 2022. Face Recognition Using Pytorch. https:\/\/github.com\/timesler\/facenet-pytorch original-date: 2019-05--25T01:29:24Z."},{"key":"#cr-split#-e_1_3_2_2_16_1.1","unstructured":"Joel Frank and Lea Sch\u00f6nherr. 2021. WaveFake: A data set to facilitate audio DeepFake detection. https:\/\/doi.org\/10.5281\/zenodo.5642694 Type: dataset. 10.5281\/zenodo.5642694"},{"key":"#cr-split#-e_1_3_2_2_16_1.2","unstructured":"Joel Frank and Lea Sch\u00f6nherr. 2021. WaveFake: A data set to facilitate audio DeepFake detection. https:\/\/doi.org\/10.5281\/zenodo.5642694 Type: dataset."},{"key":"e_1_3_2_2_17_1","volume-title":"Adversarial perturbations fool deepfake detectors. In 2020 international joint conference on neural networks (IJCNN)","author":"Gandhi Apurva","unstructured":"Apurva Gandhi and Shomik Jain . 2020. Adversarial perturbations fool deepfake detectors. In 2020 international joint conference on neural networks (IJCNN) . IEEE , 1--8. Apurva Gandhi and Shomik Jain. 2020. Adversarial perturbations fool deepfake detectors. In 2020 international joint conference on neural networks (IJCNN). IEEE, 1--8."},{"key":"e_1_3_2_2_18_1","volume-title":"misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism. Journalism","author":"Gregory Sam","year":"2021","unstructured":"Sam Gregory . 2021. Deepfakes , misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism. Journalism ( 2021 ), 14648849211060644. Sam Gregory. 2021. Deepfakes, misinformation and disinformation and authenticity infrastructure responses: Impacts on frontline witnessing, distant witnessing, and civic journalism. Journalism (2021), 14648849211060644."},{"key":"e_1_3_2_2_19_1","volume-title":"Deepfake Video Detection Using Recurrent Neural Networks. In 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). 1--6. https:\/\/doi.org\/10","author":"G\u00fcera David","year":"2018","unstructured":"David G\u00fcera and Edward J. Delp . 2018 . Deepfake Video Detection Using Recurrent Neural Networks. In 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). 1--6. https:\/\/doi.org\/10 .1109\/AVSS. 2018 .8639163 10.1109\/AVSS.2018.8639163 David G\u00fcera and Edward J. Delp. 2018. Deepfake Video Detection Using Recurrent Neural Networks. In 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). 1--6. https:\/\/doi.org\/10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_21_1","volume-title":"Attgan: Facial attribute editing by only changing what you want","author":"He Zhenliang","year":"2019","unstructured":"Zhenliang He , Wangmeng Zuo , Meina Kan , Shiguang Shan , and Xilin Chen . 2019 . Attgan: Facial attribute editing by only changing what you want . IEEE transactions on image processing 28, 11 (2019), 5464--5478. Zhenliang He, Wangmeng Zuo, Meina Kan, Shiguang Shan, and Xilin Chen. 2019. Attgan: Facial attribute editing by only changing what you want. IEEE transactions on image processing 28, 11 (2019), 5464--5478."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00224"},{"key":"e_1_3_2_2_23_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski , Nicholas Carlini , David Berthelot , Alex Kurakin , and Nicolas Papernot . 2020 . High accuracy and high fidelity extraction of neural networks . In 29th USENIX Security Symposium (USENIX Security 20) . 1345--1362. Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High accuracy and high fidelity extraction of neural networks. In 29th USENIX Security Symposium (USENIX Security 20). 1345--1362."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Anubhav Jain and Pavel Korshunov. 2021. Improving Generalization of Deepfake Detection by Training for Attribution. (2021). ISBN: 9781665432887.  Anubhav Jain and Pavel Korshunov. 2021. Improving Generalization of Deepfake Detection by Training for Attribution. (2021). ISBN: 9781665432887.","DOI":"10.1109\/MMSP53017.2021.9733468"},{"key":"e_1_3_2_2_25_1","volume-title":"Alias-free generative adversarial networks. Advances in Neural Information Processing Systems 34","author":"Karras Tero","year":"2021","unstructured":"Tero Karras , Miika Aittala , Samuli Laine , Erik H\u00e4rk\u00f6nen , Janne Hellsten , Jaakko Lehtinen , and Timo Aila . 2021. Alias-free generative adversarial networks. Advances in Neural Information Processing Systems 34 ( 2021 ). Tero Karras, Miika Aittala, Samuli Laine, Erik H\u00e4rk\u00f6nen, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2021. Alias-free generative adversarial networks. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_2_26_1","volume-title":"Analyzing and Improving the Image Quality of StyleGAN. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 8107--8116","author":"Karras Tero","year":"2020","unstructured":"Tero Karras , Samuli Laine , Miika Aittala , Janne Hellsten , Jaakko Lehtinen , and Timo Aila . 2020 . Analyzing and Improving the Image Quality of StyleGAN. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 8107--8116 . https:\/\/doi.org\/10.1109\/CVPR42600.2020.00813 ISSN: 2575--7075. 10.1109\/CVPR42600.2020.00813 Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2020. Analyzing and Improving the Image Quality of StyleGAN. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 8107--8116. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00813 ISSN: 2575--7075."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA49915.2021.9385719"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475332"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8553251"},{"key":"e_1_3_2_2_30_1","volume-title":"Add: Attention-based deepfake detection approach. Big Data and Cognitive Computing 5, 4","author":"Khormali Aminollah","year":"2021","unstructured":"Aminollah Khormali and Jiann Shiun Yuan . 2021 . Add: Attention-based deepfake detection approach. Big Data and Cognitive Computing 5, 4 (2021). https:\/\/doi.org\/10.3390\/bdcc5040049 10.3390\/bdcc5040049 Aminollah Khormali and Jiann Shiun Yuan. 2021. Add: Attention-based deepfake detection approach. Big Data and Cognitive Computing 5, 4 (2021). https:\/\/doi.org\/10.3390\/bdcc5040049"},{"key":"e_1_3_2_2_31_1","volume-title":"Woo","author":"Kim Minha","year":"2021","unstructured":"Minha Kim , Shahroz Tariq , and Simon S . Woo . 2021 . CoReD: Generalizing Fake Media Detection with Continual Representation using Distillation. Vol. 1 . Association for Computing Machinery . https:\/\/doi.org\/10.1145\/3474085.3475535 10.1145\/3474085.3475535 Minha Kim, Shahroz Tariq, and Simon S. Woo. 2021. CoReD: Generalizing Fake Media Detection with Continual Representation using Distillation. Vol. 1. Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3474085.3475535"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00111"},{"key":"e_1_3_2_2_33_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds .). Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00645"},{"key":"e_1_3_2_2_35_1","volume-title":"DnS: Distill-and-Select for Efficient and Accurate Video Indexing and Retrieval. CoRR abs\/2106.13266","author":"Kordopatis-Zilos Giorgos","year":"2021","unstructured":"Giorgos Kordopatis-Zilos , Christos Tzelepis , Symeon Papadopoulos , Ioannis Kompatsiaris , and Ioannis Patras . 2021. DnS: Distill-and-Select for Efficient and Accurate Video Indexing and Retrieval. CoRR abs\/2106.13266 ( 2021 ). arXiv:2106.13266 Giorgos Kordopatis-Zilos, Christos Tzelepis, Symeon Papadopoulos, Ioannis Kompatsiaris, and Ioannis Patras. 2021. DnS: Distill-and-Select for Efficient and Accurate Video Indexing and Retrieval. CoRR abs\/2106.13266 (2021). arXiv:2106.13266"},{"key":"e_1_3_2_2_36_1","volume-title":"DeepFakes: a New Threat to Face Recognition? Assessment and Detection. (2018), 1--5. arXiv","author":"Korshunov Pavel","year":"1812","unstructured":"Pavel Korshunov and Sebastien Marcel . 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. (2018), 1--5. arXiv : 1812 .08685. Pavel Korshunov and Sebastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. (2018), 1--5. arXiv: 1812.08685."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"e_1_3_2_2_38_1","volume-title":"Robust Deepfake On Unrestricted Media: Generation And Detection. CoRR abs\/2202.06228","author":"Le Trung-Nghia","year":"2022","unstructured":"Trung-Nghia Le , Huy H. Nguyen , Junichi Yamagishi , and Isao Echizen . 2022. Robust Deepfake On Unrestricted Media: Generation And Detection. CoRR abs\/2202.06228 ( 2022 ). arXiv:2202.06228 Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen. 2022. Robust Deepfake On Unrestricted Media: Generation And Detection. CoRR abs\/2202.06228 (2022). arXiv:2202.06228"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 10117--10127","author":"Le Trung-Nghia","year":"2021","unstructured":"Trung-Nghia Le , Huy H Nguyen , Junichi Yamagishi , and Isao Echizen . 2021 . Open-forensics: Large-scale challenging dataset for multi-face forgery detection and segmentation in-the-wild . In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 10117--10127 . Trung-Nghia Le, Huy H Nguyen, Junichi Yamagishi, and Isao Echizen. 2021. Open-forensics: Large-scale challenging dataset for multi-face forgery detection and segmentation in-the-wild. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 10117--10127."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_2_2_41_1","volume-title":"Exposing DeepFake Videos By Detecting Face Warping Artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu . 2019 . Exposing DeepFake Videos By Detecting Face Warping Artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). Yuezun Li and Siwei Lyu. 2019. Exposing DeepFake Videos By Detecting Face Warping Artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_2_43_1","volume-title":"DeepFake-o-meter: An Open Platform for DeepFake Detection. In 2021 IEEE Security and Privacy Workshops (SPW). IEEE, 277--281","author":"Li Yuezun","year":"2021","unstructured":"Yuezun Li , Cong Zhang , Pu Sun , Lipeng Ke , Yan Ju , Honggang Qi , and Siwei Lyu . 2021 . DeepFake-o-meter: An Open Platform for DeepFake Detection. In 2021 IEEE Security and Privacy Workshops (SPW). IEEE, 277--281 . Yuezun Li, Cong Zhang, Pu Sun, Lipeng Ke, Yan Ju, Honggang Qi, and Siwei Lyu. 2021. DeepFake-o-meter: An Open Platform for DeepFake Detection. In 2021 IEEE Security and Privacy Workshops (SPW). IEEE, 277--281."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151186"},{"key":"e_1_3_2_2_46_1","volume-title":"Ali Javed, and Aun Irtaza.","author":"Masood Momina","year":"2021","unstructured":"Momina Masood , Marriam Nawaz , Khalid Mahmood Malik , Ali Javed, and Aun Irtaza. 2021 . Deepfakes Generation and Detection : State-of-the-art , open challenges, countermeasures, and way forward. (2021). arXiv: 2103.00484. Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, and Aun Irtaza. 2021. Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward. (2021). arXiv: 2103.00484."},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications.","author":"Mehra Akul","unstructured":"Akul Mehra , Luuk Spreeuwers , and Nicola Strisciuglio . 2021. Deepfake Detection using Capsule Networks and Long Short-Term Memory Networks :. In Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. SCITEPRESS - Science and Technology Publications, Online Streaming , - Select a Country - , 407--414. https:\/\/doi.org\/10.5220\/0010289004070414 10.5220\/0010289004070414 Akul Mehra, Luuk Spreeuwers, and Nicola Strisciuglio. 2021. Deepfake Detection using Capsule Networks and Long Short-Term Memory Networks:. In Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. SCITEPRESS - Science and Technology Publications, Online Streaming, - Select a Country -, 407--414. https:\/\/doi.org\/10.5220\/0010289004070414"},{"key":"e_1_3_2_2_48_1","unstructured":"MinIO. 2022. MinIO. https:\/\/min.io.  MinIO. 2022. MinIO. https:\/\/min.io."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"e_1_3_2_2_52_1","volume-title":"Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez","author":"Nguyen Huy H.","unstructured":"Huy H. Nguyen , Junichi Yamagishi , and Isao Echizen . 2022. Capsule-Forensics Networks for Deepfake Detection . In Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez , and Christoph Busch (Eds.). Springer International Publishing , Cham , 275--301. https:\/\/doi.org\/10.1007\/978--3-030--87664--7_13 10.1007\/978--3-030--87664--7_13 Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen. 2022. Capsule-Forensics Networks for Deepfake Detection. In Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, and Christoph Busch (Eds.). Springer International Publishing, Cham, 275--301. https:\/\/doi.org\/10.1007\/978--3-030--87664--7_13"},{"key":"e_1_3_2_2_53_1","unstructured":"NVIDIA. 2022. NVIDIA TRITON INFERENCE SERVER. https:\/\/github.com\/triton-inference-server\/server.  NVIDIA. 2022. NVIDIA TRITON INFERENCE SERVER. https:\/\/github.com\/triton-inference-server\/server."},{"key":"e_1_3_2_2_54_1","unstructured":"OpenCV-team. 2022. OpenCV. https:\/\/opencv.org.  OpenCV-team. 2022. OpenCV. https:\/\/opencv.org."},{"key":"e_1_3_2_2_55_1","volume-title":"A Review of Deep Learning-based Approaches for Deepfake Content Detection. arXiv:2202.06095 [cs] (Feb","author":"Passos Leandro A.","year":"2022","unstructured":"Leandro A. Passos , Danilo Jodas , Kelton A. P. da Costa , Luis A. Souza J\u00fanior , Danilo Colombo , and Jo\u00e3o Paulo Papa . 2022. A Review of Deep Learning-based Approaches for Deepfake Content Detection. arXiv:2202.06095 [cs] (Feb . 2022 ). Leandro A. Passos, Danilo Jodas, Kelton A. P. da Costa, Luis A. Souza J\u00fanior, Danilo Colombo, and Jo\u00e3o Paulo Papa. 2022. A Review of Deep Learning-based Approaches for Deepfake Content Detection. arXiv:2202.06095 [cs] (Feb. 2022)."},{"key":"e_1_3_2_2_56_1","volume-title":"Deepfake videos in the wild: Analysis and detection","author":"Pu Jiameng","year":"2021","unstructured":"Jiameng Pu , Neal Mangaokar , Lauren Kelly , Parantapa Bhattacharya , Kavya Sundaram , Mobin Javed , Bolun Wang , and Bimal Viswanath . 2021. Deepfake videos in the wild: Analysis and detection . Vol. 1 . Association for Computing Machinery . https:\/\/doi.org\/10.1145\/3442381.3449978 Publication Title : The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021 Issue: 1. 10.1145\/3442381.3449978 Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, and Bimal Viswanath. 2021. Deepfake videos in the wild: Analysis and detection. Vol. 1. Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3442381.3449978 Publication Title: The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021 Issue: 1."},{"key":"e_1_3_2_2_57_1","unstructured":"PyTorch. 2022. TorchScript. https:\/\/pytorch.org\/docs\/stable\/jit.html.  PyTorch. 2022. TorchScript. https:\/\/pytorch.org\/docs\/stable\/jit.html."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194085.3194087"},{"key":"e_1_3_2_2_59_1","unstructured":"Redis. 2021. Redis. https:\/\/redis.io\/.  Redis. 2021. Redis. https:\/\/redis.io\/."},{"key":"e_1_3_2_2_60_1","volume-title":"ImageNet-21K Pretraining for the Masses. arXiv:2104.10972 [cs] (Aug","author":"Ridnik Tal","year":"2021","unstructured":"Tal Ridnik , Emanuel Ben-Baruch , Asaf Noy , and Lihi Zelnik-Manor . 2021. ImageNet-21K Pretraining for the Masses. arXiv:2104.10972 [cs] (Aug . 2021 ). Tal Ridnik, Emanuel Ben-Baruch, Asaf Noy, and Lihi Zelnik-Manor. 2021. ImageNet-21K Pretraining for the Masses. arXiv:2104.10972 [cs] (Aug. 2021)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_62_1","volume-title":"Dynamic routing between capsules. Advances in neural information processing systems 30","author":"Sabour Sara","year":"2017","unstructured":"Sara Sabour , Nicholas Frosst , and Geoffrey E Hinton . 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 ( 2017 ). Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton. 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00926"},{"key":"e_1_3_2_2_64_1","unstructured":"Yuyang Sun Zhiyong Zhang Changzhen Qiu Liang Wang and Zekai Wang. 2021. FakeTransformer: Exposing Face Forgery From Spatial-Temporal Representation Modeled By Facial Pixel Variations. (2021). arXiv: 2111.07601.  Yuyang Sun Zhiyong Zhang Changzhen Qiu Liang Wang and Zekai Wang. 2021. FakeTransformer: Exposing Face Forgery From Spatial-Temporal Representation Modeled By Facial Pixel Variations. (2021). arXiv: 2111.07601."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073640"},{"key":"e_1_3_2_2_66_1","volume-title":"International conference on machine learning. PMLR, 6105--6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le . 2019 . Efficientnet: Rethinking model scaling for convolutional neural networks . In International conference on machine learning. PMLR, 6105--6114 . Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105--6114."},{"key":"e_1_3_2_2_67_1","volume-title":"International Conference on Machine Learning. PMLR, 10096--10106","author":"Tan Mingxing","year":"2021","unstructured":"Mingxing Tan and Quoc Le . 2021 . Efficientnetv2: Smaller models and faster training . In International Conference on Machine Learning. PMLR, 10096--10106 . Mingxing Tan and Quoc Le. 2021. Efficientnetv2: Smaller models and faster training. In International Conference on Machine Learning. PMLR, 10096--10106."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449809"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132384.3132387"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_2_71_1","unstructured":"tiangolo. 2022. FastAPI. https:\/\/fastapi.tiangolo.com\/.  tiangolo. 2022. FastAPI. https:\/\/fastapi.tiangolo.com\/."},{"key":"e_1_3_2_2_72_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Tolias Giorgos","year":"2016","unstructured":"Giorgos Tolias , Ronan Sicre , and Herv\u00e9 J\u00e9gou . 2016 . Particular object retrieval with integral max-pooling of CNN activations . In Proceedings of the International Conference on Learning Representations. Giorgos Tolias, Ronan Sicre, and Herv\u00e9 J\u00e9gou. 2016. Particular object retrieval with integral max-pooling of CNN activations. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_2_73_1","volume-title":"Hoanh Su Le, and Ki Ryong Kwon.","author":"Tran Van Nhan","year":"2021","unstructured":"Van Nhan Tran , Suk Hwan Lee , Hoanh Su Le, and Ki Ryong Kwon. 2021 . High performance deepfake video detection on cnn-based with attention target-specific regions and manual distillation extraction. Applied Sciences (Switzerland) 11, 16 (2021). https:\/\/doi.org\/10.3390\/app11167678 10.3390\/app11167678 Van Nhan Tran, Suk Hwan Lee, Hoanh Su Le, and Ki Ryong Kwon. 2021. High performance deepfake video detection on cnn-based with attention target-specific regions and manual distillation extraction. Applied Sciences (Switzerland) 11, 16 (2021). https:\/\/doi.org\/10.3390\/app11167678"},{"key":"e_1_3_2_2_74_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017. Attention is all you need. Advances in neural information processing systems 30 ( 2017 ). Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_2_75_1","volume-title":"Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez","author":"Xu Ying","unstructured":"Ying Xu , Kiran Raja , Raghavendra Ramachandra , and Christoph Busch . 2022. Adversarial Attacks on Face Recognition Systems . In Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez , and Christoph Busch (Eds.). Springer International Publishing , Cham , 139--161. https:\/\/doi.org\/10.1007\/978--3-030--87664--7_7 10.1007\/978--3-030--87664--7_7 Ying Xu, Kiran Raja, Raghavendra Ramachandra, and Christoph Busch. 2022. Adversarial Attacks on Face Recognition Systems. In Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, and Christoph Busch (Eds.). Springer International Publishing, Cham, 139--161. https:\/\/doi.org\/10.1007\/978--3-030--87664--7_7"},{"key":"e_1_3_2_2_76_1","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings 2019-May (2019","author":"Yang Xin","year":"2019","unstructured":"Xin Yang , Yuezun Li , and Siwei Lyu . 2019 . Exposing Deep Fakes Using Inconsistent Head Poses. ICASSP , IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings 2019-May (2019 ), 8261--8265. https:\/\/doi.org\/10.1109\/ICASSP.2019.8683164 ISBN: 9781479981311. 10.1109\/ICASSP.2019.8683164 Xin Yang, Yuezun Li, and Siwei Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings 2019-May (2019), 8261--8265. https:\/\/doi.org\/10.1109\/ICASSP.2019.8683164 ISBN: 9781479981311."},{"key":"e_1_3_2_2_77_1","unstructured":"yt dl. 2022. Youtube-DL. https:\/\/youtube-dl.org.  yt dl. 2022. Youtube-DL. https:\/\/youtube-dl.org."},{"key":"e_1_3_2_2_78_1","unstructured":"yt dlp. 2022. Youtube-DLP. https:\/\/github.com\/yt-dlp\/yt-dlp.  yt dlp. 2022. Youtube-DLP. https:\/\/github.com\/yt-dlp\/yt-dlp."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/15230406.2021.1910075"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"}],"event":{"name":"ICMR '22: International Conference on Multimedia Retrieval","location":"Newark NJ USA","acronym":"ICMR '22","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 1st International Workshop on Multimedia AI against Disinformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512732.3533587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512732.3533587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:28Z","timestamp":1750183768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512732.3533587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":85,"alternative-id":["10.1145\/3512732.3533587","10.1145\/3512732"],"URL":"https:\/\/doi.org\/10.1145\/3512732.3533587","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}