{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:14:37Z","timestamp":1769152477110,"version":"3.49.0"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["62121002, 62232006, U1936210, U19B2038, 62102127"],"award-info":[{"award-number":["62121002, 62232006, U1936210, U19B2038, 62102127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>Recently, advanced development of facial manipulation techniques threatens web information security, thus, face forgery detection attracts a lot of attention. It is clear that both spatial and temporal information of facial videos contains the crucial manipulation traces, which are inevitably created during the generation process. However, most existing face forgery detectors only focus on the spatial artifacts or the temporal incoherence, and they are struggling to learn a significant and general kind of representations for manipulated facial videos. In this work, we propose to construct spatial-temporal graphs for fake videos to capture the spatial inconsistency and the temporal incoherence at the same time. To model the spatial-temporal relationship among the graph nodes, a novel forgery detector named Spatio-Temporal Graph Network (STGN) is proposed, which contains two kinds of graph-convolution-based units, the Spatial Relation Graph Unit (SRGU) and the Temporal Attention Graph Unit (TAGU). To exploit spatial information, the SRGU models the inconsistency between each pair of patches in the same frame, instead of focusing on the low-level local spatial artifacts which are vulnerable to samples created by unseen manipulation methods. And, the TAGU is proposed to model the long-distance temporal relation among the patches at the same spatial position in different frames with a graph attention mechanism based on the inter-node similarity. With the SRGU and the TAGU, our STGN can combine the discriminative power of spatial inconsistency and the generalization capacity of temporal incoherence for face forgery detection. Our STGN achieves state-of-the-art performances on several popular forgery detection datasets. Extensive experiments demonstrate both the superiority of our STGN on intra manipulation evaluation and the effectiveness for new sorts of face forgery videos on cross manipulation evaluation.<\/jats:p>","DOI":"10.1145\/3580512","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T11:56:46Z","timestamp":1675079806000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Constructing Spatio-Temporal Graphs for Face Forgery Detection"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8511-4618","authenticated-orcid":false,"given":"Zhihua","family":"Shang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-9434","authenticated-orcid":false,"given":"Hongtao","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6403-761X","authenticated-orcid":false,"given":"Lingyun","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2510-8993","authenticated-orcid":false,"given":"Zhengjun","family":"Zha","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1151-1792","authenticated-orcid":false,"given":"Yongdong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,22]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"[2022]. Deepfakes. https:\/\/github.com\/deepfakes\/faceswap. Accessed January 26 2022."},{"key":"e_1_3_1_3_2","unstructured":"[2022]. FaceSwap. https:\/\/github.com\/MarekKowalski\/FaceSwap. Accessed January 26 2022."},{"key":"e_1_3_1_4_2","first-page":"1","volume-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS)","author":"Afchar Darius","year":"2018","unstructured":"Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: A compact facial video forgery detection network. In Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1\u20137."},{"key":"e_1_3_1_5_2","first-page":"0","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops","author":"Amerini Irene","year":"2019","unstructured":"Irene Amerini, Leonardo Galteri, Roberto Caldelli, and Alberto Del Bimbo. 2019. Deepfake video detection through optical flow based cnn. In Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops. 0\u20130."},{"key":"e_1_3_1_6_2","first-page":"6299","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Carreira Joao","year":"2017","unstructured":"Joao Carreira and Andrew Zisserman. 2017. Quo vadis, action recognition? A new model and the kinetics dataset. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6299\u20136308."},{"key":"e_1_3_1_7_2","first-page":"103","volume-title":"Proceedings of the European Conference on Computer Vision","author":"Chai Lucy","year":"2020","unstructured":"Lucy Chai, David Bau, Ser-Nam Lim, and Phillip Isola. 2020. What makes fake images detectable? Understanding properties that generalize. In Proceedings of the European Conference on Computer Vision. Springer, 103\u2013120."},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2021.05.006","article-title":"Locally GAN-generated face detection based on an improved Xception","volume":"572","author":"Chen Beijing","year":"2021","unstructured":"Beijing Chen, Xingwang Ju, Bin Xiao, Weiping Ding, Yuhui Zheng, and Victor Hugo C de Albuquerque. 2021. Locally GAN-generated face detection based on an improved Xception. Information Sciences 572 (2021), 16\u201328.","journal-title":"Information Sciences"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3116679"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"3506","DOI":"10.1109\/TMM.2020.3026868","article-title":"A serial image copy-move forgery localization scheme with source\/target distinguishment","volume":"23","author":"Chen Beijing","year":"2020","unstructured":"Beijing Chen, Weijin Tan, Gouenou Coatrieux, Yuhui Zheng, and Yun-Qing Shi. 2020. A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Transactions on Multimedia 23 (2020), 3506\u20133517.","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2927224"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_1_13_2","first-page":"433","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Chen Yunpeng","year":"2019","unstructured":"Yunpeng Chen, Marcus Rohrbach, Zhicheng Yan, Yan Shuicheng, Jiashi Feng, and Yannis Kalantidis. 2019. Graph-based global reasoning networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 433\u2013442."},{"key":"e_1_3_1_14_2","first-page":"1251","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Chollet Fran\u00e7ois","year":"2017","unstructured":"Fran\u00e7ois Chollet. 2017. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1251\u20131258."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_1_16_2","first-page":"11467","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Dang Lingwei","year":"2021","unstructured":"Lingwei Dang, Yongwei Nie, Chengjiang Long, Qing Zhang, and Guiqing Li. 2021. MSR-GCN: Multi-scale residual graph convolution networks for human motion prediction. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 11467\u201311476."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3001937"},{"key":"e_1_3_1_18_2","first-page":"5203","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Deng Jiankang","year":"2020","unstructured":"Jiankang Deng, Jia Guo, Evangelos Ververas, Irene Kotsia, and Stefanos Zafeiriou. 2020. Retinaface: Single-shot multi-level face localisation in the wild. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5203\u20135212."},{"key":"e_1_3_1_19_2","unstructured":"Brian Dolhansky Russ Howes Ben Pflaum Nicole Baram and Cristian Canton-Ferrer. 2019. The deepfake detection challenge (dfdc) preview dataset. arXiv preprint arXiv:1910.08854 2019."},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"2615","DOI":"10.1145\/3474085.3475439","volume-title":"Proceedings of the 29th ACM International Conference on Multimedia","author":"Dong Xinzhi","year":"2021","unstructured":"Xinzhi Dong, Chengjiang Long, Wenju Xu, and Chunxia Xiao. 2021. Dual graph convolutional networks with transformer and curriculum learning for image captioning. In Proceedings of the 29th ACM International Conference on Multimedia. 2615\u20132624."},{"key":"e_1_3_1_21_2","first-page":"7890","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Durall Ricard","year":"2020","unstructured":"Ricard Durall, Margret Keuper, and Janis Keuper. 2020. Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7890\u20137899."},{"key":"e_1_3_1_23_2","first-page":"2672","volume-title":"Proceedings of Advances Neural Information Processing Systems Conference","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. In Proceedings of Advances Neural Information Processing Systems Conference. 2672\u20132680."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475508"},{"key":"e_1_3_1_25_2","first-page":"5039","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Haliassos Alexandros","year":"2021","unstructured":"Alexandros Haliassos, Konstantinos Vougioukas, Stavros Petridis, and Maja Pantic. 2021. Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5039\u20135049."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_27_2","first-page":"4360","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"He Yinan","year":"2021","unstructured":"Yinan He, Bei Gan, Siyu Chen, Yichun Zhou, Guojun Yin, Luchuan Song, Lu Sheng, Jing Shao, and Ziwei Liu. 2021. ForgeryNet: A versatile benchmark for comprehensive forgery analysis. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4360\u20134369."},{"issue":"8","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735\u20131780.","journal-title":"Neural Computation"},{"key":"e_1_3_1_29_2","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"Hu Ziheng","year":"2021","unstructured":"Ziheng Hu, Hongtao Xie, Yuxin Wang, Jiahong Li, Zhongyuan Wang, and Yongdong Zhang. 2021. Dynamic inconsistency-aware deepfake video detection. In Proceedings of the International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_1_30_2","first-page":"2889","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Jiang Liming","year":"2020","unstructured":"Liming Jiang, Ren Li, Wayne Wu, Chen Qian, and Chen Change Loy. 2020. Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2889\u20132898."},{"key":"e_1_3_1_31_2","first-page":"1","volume-title":"Proceedings of the 7th Workshop on Multimedia and Security","author":"Johnson Micah K.","year":"2005","unstructured":"Micah K. Johnson and Hany Farid. 2005. Exposing digital forgeries by detecting inconsistencies in lighting. In Proceedings of the 7th Workshop on Multimedia and Security. 1\u201310."},{"key":"e_1_3_1_32_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Kipf Thomas N.","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2767134"},{"key":"e_1_3_1_34_2","first-page":"6458","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Li Jiaming","year":"2021","unstructured":"Jiaming Li, Hongtao Xie, Jiahong Li, Zhongyuan Wang, and Yongdong Zhang. 2021. Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 6458\u20136467."},{"key":"e_1_3_1_35_2","first-page":"5001","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Li Lingzhi","year":"2020","unstructured":"Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, and Baining Guo. 2020. Face x-ray for more general face forgery detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5001\u20135010."},{"key":"e_1_3_1_36_2","first-page":"1864","volume-title":"Proceedings of the 28th ACM International Conference on Multimedia","author":"Li Xiaodan","year":"2020","unstructured":"Xiaodan Li, Yining Lang, Yuefeng Chen, Xiaofeng Mao, Yuan He, Shuhui Wang, Hui Xue, and Quan Lu. 2020. Sharp multiple instance learning for deepfake video detection. In Proceedings of the 28th ACM International Conference on Multimedia. 1864\u20131872."},{"key":"e_1_3_1_37_2","volume-title":"Proceedings of the IEEE international workshop on information forensics and security","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li, Ming-Ching Chang, and Siwei Lyu. 2018. In ictu oculi: Exposing ai created fake videos by detecting eye blinking. In Proceedings of the IEEE international workshop on information forensics and security."},{"key":"e_1_3_1_38_2","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu. 2019. Exposing deepFake videos by detecting face warping artifacts. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops."},{"key":"e_1_3_1_39_2","first-page":"3207","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Li Yuezun","year":"2020","unstructured":"Yuezun Li, Xin Yang, Pu Sun, Honggang Qi, and Siwei Lyu. 2020. Celeb-df: A large-scale challenging dataset for deepfake forensics. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 3207\u20133216."},{"key":"e_1_3_1_40_2","first-page":"11669","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Liu Zhaoyang","year":"2020","unstructured":"Zhaoyang Liu, Donghao Luo, Yabiao Wang, Limin Wang, Ying Tai, Chengjie Wang, Jilin Li, Feiyue Huang, and Tong Lu. 2020. Teinet: Towards an efficient architecture for video recognition. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 11669\u201311676."},{"issue":"2","key":"e_1_3_1_41_2","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Lukas Jan","year":"2006","unstructured":"Jan Lukas, Jessica Fridrich, and Miroslav Goljan. 2006. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205\u2013214.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"e_1_3_1_42_2","first-page":"648","article-title":"An adaptive semisupervised feature analysis for video semantic recognition","volume":"48","author":"Luo Minnan","year":"2017","unstructured":"Minnan Luo, Xiaojun Chang, Liqiang Nie, Yi Yang, Alexander G. Hauptmann, and Qinghua Zheng. 2017. An adaptive semisupervised feature analysis for video semantic recognition. IEEE Transactions on Cybernetics 48, 2 (2017), 648\u2013660.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_1_43_2","first-page":"667","volume-title":"Proceedings of the European Conference on Computer Vision","author":"Masi Iacopo","year":"2020","unstructured":"Iacopo Masi, Aditya Killekar, Royston Marian Mascarenhas, Shenoy Pratik Gurudatt, and Wael AbdAlmageed. 2020. Two-branch recurrent network for isolating deepfakes in videos. In Proceedings of the European Conference on Computer Vision. Springer, 667\u2013684."},{"key":"e_1_3_1_44_2","first-page":"2465","volume-title":"Proceedings of the 29th ACM International Conference on Multimedia","author":"Mo Shentong","year":"2021","unstructured":"Shentong Mo and Xin Miao. 2021. OsGG-Net: One-step graph generation network for unbiased head pose estimation. In Proceedings of the 29th ACM International Conference on Multimedia. 2465\u20132473."},{"key":"e_1_3_1_45_2","first-page":"1","volume-title":"IEEE 10th International Conference on Biometrics Theory, Applications and Systems","author":"Nguyen Huy H.","year":"2019","unstructured":"Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, and Isao Echizen. 2019. Multi-task learning for detecting and segmenting manipulated facial images and videos. IEEE 10th International Conference on Biometrics Theory, Applications and Systems. 1\u20138."},{"issue":"6","key":"e_1_3_1_46_2","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1109\/TKDE.2019.2959991","article-title":"Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification","volume":"33","author":"Peng Hao","year":"2019","unstructured":"Hao Peng, Jianxin Li, Senzhang Wang, Lihong Wang, Qiran Gong, Renyu Yang, Bo Li, S. Yu Philip, and Lifang He. 2019. Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification. IEEE Transactions on Knowledge and Data Engineering 33, 6 (2019), 2505\u20132519.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.043"},{"issue":"4","key":"e_1_3_1_48_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3490181","article-title":"Reinforced neighborhood selection guided multi-relational graph neural networks","volume":"40","author":"Peng Hao","year":"2021","unstructured":"Hao Peng, Ruitong Zhang, Yingtong Dou, Renyu Yang, Jingyi Zhang, and Philip S. Yu. 2021. Reinforced neighborhood selection guided multi-relational graph neural networks. ACM Transactions on Information Systems (TOIS) 40, 4 (2021), 1\u201346.","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"issue":"1","key":"e_1_3_1_49_2","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TPAMI.2022.3144993","article-title":"Reinforced, incremental and cross-lingual event detection from social messages","volume":"45","author":"Peng Hao","year":"2023","unstructured":"Hao Peng, Ruitong Zhang, Shaoning Li, Yuwei Cao, Shirui Pan, and Philip Yu. 2023. Reinforced, incremental and cross-lingual event detection from social messages. IEEE Transactions on Pattern Analysis and Machine Intelligence 45, 1 (2023), 980\u2013998.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2005.855406"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"e_1_3_1_53_2","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Rossler Andreas","year":"2019","unstructured":"Andreas Rossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nie\u00dfner. 2019. Faceforensics++: Learning to detect manipulated facial images. In Proceedings of the IEEE International Conference on Computer Vision. 1\u201311."},{"key":"e_1_3_1_54_2","first-page":"1","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir Ekraam","year":"2019","unstructured":"Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, and Prem Natarajan. 2019. Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI) 3 (2019), 1.","journal-title":"Interfaces (GUI)"},{"issue":"1","key":"e_1_3_1_55_2","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir Ekraam","year":"2019","unstructured":"Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, and Prem Natarajan. 2019. Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI) 3, 1 (2019), 80\u201387.","journal-title":"Interfaces (GUI)"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_1_57_2","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/ICDAR.2019.00130","volume-title":"Proceedings of the 2019 International Conference on Document Analysis and Recognition (ICDAR)","author":"Sheng Fenfen","year":"2019","unstructured":"Fenfen Sheng, Zhineng Chen, and Bo Xu. 2019. NRTR: A no-recurrence sequence-to-sequence model for scene text recognition. In Proceedings of the 2019 International Conference on Document Analysis and Recognition (ICDAR). IEEE, 781\u2013786."},{"key":"e_1_3_1_58_2","first-page":"7912","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Shi Lei","year":"2019","unstructured":"Lei Shi, Yifan Zhang, Jian Cheng, and Hanqing Lu. 2019. Skeleton-based action recognition with directed graph neural networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7912\u20137921."},{"key":"e_1_3_1_59_2","doi-asserted-by":"crossref","first-page":"2613","DOI":"10.1145\/3319535.3363269","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Sohrawardi Saniat Javid","year":"2019","unstructured":"Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond Ptucha, and Matthew Wright. 2019. Poster: Towards robust open-world detection of deepfakes. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2613\u20132615."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"e_1_3_1_63_2","unstructured":"Gengxing Wang Jiahuan Zhou and Ying Wu. 2020. Exposing deep-faked videos by anomalous co-motion pattern detection. arXiv:2008.04848. Retrieved from https:\/\/arxiv.org\/abs\/2008.04848."},{"issue":"10","key":"e_1_3_1_64_2","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1109\/TPAMI.2020.2983686","article-title":"Deep high-resolution representation learning for visual recognition","volume":"43","author":"Wang Jingdong","year":"2020","unstructured":"Jingdong Wang, Ke Sun, Tianheng Cheng, Borui Jiang, Chaorui Deng, Yang Zhao, Dong Liu, Yadong Mu, Mingkui Tan, Xinggang Wang, Wenyu Liu, and Bin Xiao. 2020. Deep high-resolution representation learning for visual recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 10 (2021), 3349\u20133364.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_1_65_2","first-page":"8695","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Wang Sheng-Yu","year":"2020","unstructured":"Sheng-Yu Wang, Oliver Wang, Richard Zhang, Andrew Owens, and Alexei A. Efros. 2020. CNN-generated images are surprisingly easy to spot... for now. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 8695\u20138704."},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_25"},{"key":"e_1_3_1_67_2","first-page":"13708","volume-title":"IEEE International Conference on Robotics and Automation","author":"Wang Yongxin","year":"2021","unstructured":"Yongxin Wang, Kris Kitani, and Xinshuo Weng. 2021. Joint object detection and multi-object tracking with graph neural networks. IEEE International Conference on Robotics and Automation. 13708\u201313715."},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098859"},{"key":"e_1_3_1_69_2","doi-asserted-by":"crossref","first-page":"8261","DOI":"10.1109\/ICASSP.2019.8683164","volume-title":"Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Yang Xin","year":"2019","unstructured":"Xin Yang, Yuezun Li, and Siwei Lyu. 2019. Exposing deep fakes using inconsistent head poses. In Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 8261\u20138265."},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3146781"},{"key":"e_1_3_1_71_2","first-page":"7094","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Zeng Runhao","year":"2019","unstructured":"Runhao Zeng, Wenbing Huang, Mingkui Tan, Yu Rong, Peilin Zhao, Junzhou Huang, and Chuang Gan. 2019. Graph convolutional networks for temporal action localization. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 7094\u20137103."},{"issue":"7","key":"e_1_3_1_72_2","doi-asserted-by":"crossref","first-page":"3033","DOI":"10.1109\/TCYB.2019.2905157","article-title":"Making sense of spatio-temporal preserving representations for EEG-based human intention recognition","volume":"50","author":"Zhang Dalin","year":"2019","unstructured":"Dalin Zhang, Lina Yao, Kaixuan Chen, Sen Wang, Xiaojun Chang, and Yunhao Liu. 2019. Making sense of spatio-temporal preserving representations for EEG-based human intention recognition. IEEE Transactions on Cybernetics 50, 7 (2019), 3033\u20133044.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_1_73_2","first-page":"15044","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Zheng Yinglin","year":"2021","unstructured":"Yinglin Zheng, Jianmin Bao, Dong Chen, Ming Zeng, and Fang Wen. 2021. Exploring temporal coherence for more general video face forgery detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 15044\u201315054."},{"key":"e_1_3_1_74_2","first-page":"2382","volume-title":"Proceedings of the 28th ACM International Conference on Multimedia","author":"Zi Bojia","year":"2020","unstructured":"Bojia Zi, Minghao Chang, Jingjing Chen, Xingjun Ma, and Yu-Gang Jiang. 2020. Wilddeepfake: A challenging real-world dataset for deepfake detection. In Proceedings of the 28th ACM International Conference on Multimedia. 2382\u20132390."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:35Z","timestamp":1750178795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3580512"],"URL":"https:\/\/doi.org\/10.1145\/3580512","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,22]]},"assertion":[{"value":"2022-01-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}