{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:09Z","timestamp":1750220169802,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568666","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"126-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Investigate Evolutionary Strategies for Black-box Attacks to Deepfake Forensic Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6573-4641","authenticated-orcid":false,"given":"Nguyen Thi My","family":"Binh","sequence":"first","affiliation":[{"name":"Hanoi University of Industry, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5208-1899","authenticated-orcid":false,"given":"Dao","family":"Hoang Long","sequence":"additional","affiliation":[{"name":"Hanoi University of Sciece and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7028-7658","authenticated-orcid":false,"given":"Nguyen","family":"Ngoc","sequence":"additional","affiliation":[{"name":"Hanoi University of Sciece and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1976-6113","authenticated-orcid":false,"given":"Huynh Thi","family":"Thanh Binh","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3691-2031","authenticated-orcid":false,"given":"Nguyen Khanh","family":"Phuong","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"CVPR Workshops. 38\u201345","author":"Agarwal Shruti","year":"2019","unstructured":"Shruti Agarwal , Hany Farid , Yuming Gu , Mingming He , Koki Nagano , and Hao Li . 2019 . Protecting World Leaders Against Deep Fakes .. In CVPR Workshops. 38\u201345 . Shruti Agarwal, Hany Farid, Yuming Gu, Mingming He, Koki Nagano, and Hao Li. 2019. Protecting World Leaders Against Deep Fakes.. In CVPR Workshops. 38\u201345."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_4_1","unstructured":"Joel Frank Thorsten Eisenhofer Lea Sch\u00f6nherr Asja Fischer Dorothea Kolossa and Thorsten Holz. 2020. Leveraging Frequency Analysis for Deep Fake Image Recognition. arXiv preprint arXiv:2003.08685(2020).  Joel Frank Thorsten Eisenhofer Lea Sch\u00f6nherr Asja Fischer Dorothea Kolossa and Thorsten Holz. 2020. Leveraging Frequency Analysis for Deep Fake Image Recognition. arXiv preprint arXiv:2003.08685(2020)."},{"key":"e_1_3_2_2_5_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672\u20132680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672\u20132680."},{"key":"e_1_3_2_2_6_1","unstructured":"Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014).  Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_8_1","unstructured":"Tero Karras Timo Aila Samuli Laine and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality stability and variation. arXiv preprint arXiv:1710.10196(2017).  Tero Karras Timo Aila Samuli Laine and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality stability and variation. arXiv preprint arXiv:1710.10196(2017)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035099"},{"key":"e_1_3_2_2_12_1","unstructured":"Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma Tom Brown Aurko Roy Alexander Matyasko Vahid Behzadan Karen Hambardzumyan Zhishuai Zhang Yi-Lin Juang Zhi Li Ryan Sheatsley Abhibhav Garg Jonathan Uesato Willi Gierke Yinpeng Dong David Berthelot Paul Hendricks Jonas Rauber and Rujun Long. 2018. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. arXiv preprint arXiv:1610.00768(2018).  Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma Tom Brown Aurko Roy Alexander Matyasko Vahid Behzadan Karen Hambardzumyan Zhishuai Zhang Yi-Lin Juang Zhi Li Ryan Sheatsley Abhibhav Garg Jonathan Uesato Willi Gierke Yinpeng Dong David Berthelot Paul Hendricks Jonas Rauber and Rujun Long. 2018. Technical Report on the CleverHans v2.1.0 Adversarial Examples Library. arXiv preprint arXiv:1610.00768(2018)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","acronym":"SoICT 2022","location":"Hanoi Vietnam"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":13,"alternative-id":["10.1145\/3568562.3568666","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568666","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}