{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:58:32Z","timestamp":1774969112847,"version":"3.50.1"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>Recent advances in artificial intelligence have led to deepfake images, enabling users to replace a real face with a genuine one. deepfake images have recently been used to malign public figures, politicians, and even average citizens. deepfake but realistic images have been used to stir political dissatisfaction, blackmail, propagate false news, and even carry out bogus terrorist attacks. Thus, identifying real images from fakes has got more challenging. To avoid these issues, this study employs transfer learning and data augmentation technique to classify deepfake images. For experimentation, 190,335 RGB-resolution deepfake and real images and image augmentation methods are used to prepare the dataset. The experiments use the deep learning models: convolutional neural network (CNN), Inception V3, visual geometry group (VGG19), and VGG16 with a transfer learning approach. Essential evaluation metrics (accuracy, precision, recall, F1-score, confusion matrix, and AUC-ROC curve score) are used to test the efficacy of the proposed approach. Results revealed that the proposed approach achieves an accuracy, recall, F1-score and AUC-ROC score of 90% and 91% precision, with our fine-tuned VGG16 model outperforming other DL models in recognizing real and deepfakes.<\/jats:p>","DOI":"10.1145\/3592615","type":"journal-article","created":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T12:37:30Z","timestamp":1681389450000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9081-3598","authenticated-orcid":false,"given":"Farkhund","family":"Iqbal","sequence":"first","affiliation":[{"name":"Zayed University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5768-7518","authenticated-orcid":false,"given":"Ahmed","family":"Abbasi","sequence":"additional","affiliation":[{"name":"Air university, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0570-1813","authenticated-orcid":false,"given":"Abdul Rehman","family":"Javed","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Lebanese American University, Byblos, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8665-1669","authenticated-orcid":false,"given":"Ahmad","family":"Almadhor","sequence":"additional","affiliation":[{"name":"Jouf University, Sakaka, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2531-2564","authenticated-orcid":false,"given":"Zunera","family":"Jalil","sequence":"additional","affiliation":[{"name":"Air university, Islambad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3393-1656","authenticated-orcid":false,"given":"Sajid","family":"Anwar","sequence":"additional","affiliation":[{"name":"Institute of Management Sciences, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2789-5070","authenticated-orcid":false,"given":"Imad","family":"Rida","sequence":"additional","affiliation":[{"name":"University of Technology of Compi\u00e8gne, Compi\u00e8gnee, France"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"1753","article-title":"Deep fakes: A looming challenge for privacy, democracy, and national security","volume":"107","author":"Chesney Bobby","year":"2019","unstructured":"Bobby Chesney and Danielle Citron. 2019. Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review 107 (2019), 1753.","journal-title":"California Law Review"},{"key":"e_1_3_2_3_2","unstructured":"Imad Rida. 2020. Data-driven audio recognition: A supervised dictionary approach. arXiv:2012.14761. Retrieved from https:\/\/arxiv.org\/abs\/2012.14761."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3166602"},{"key":"e_1_3_2_5_2","first-page":"693","volume-title":"Proceedings of the International Conference on Image Analysis and Processing","author":"Sobbahi Rayan Al","year":"2022","unstructured":"Rayan Al Sobbahi and Joe Tekli. 2022. Low-light image enhancement using image-to-frequency filter learning. In Proceedings of the International Conference on Image Analysis and Processing. Springer, 693\u2013705."},{"key":"e_1_3_2_6_2","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2018. Deepfakes: A new threat to face recognition? Assessment and detection. arXiv:1812.08685. Retrieved from https:\/\/arxiv.org\/abs\/1812.08685."},{"key":"e_1_3_2_7_2","first-page":"70","volume-title":"Proceedings of the Woodstock\u201922: Symposium on the Irreproducible Science","author":"Iqbal Farkhund","year":"2022","unstructured":"Farkhund Iqbal, Ahmed Abbasi, Abdul Rehman Javed, Zunera Jalil, and Jamal Al-Karaki. 2022. Deepfake audio detection via feature engineering and machine learning. In Proceedings of the Woodstock\u201922: Symposium on the Irreproducible Science. IEEE, 70\u201375."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3231480"},{"key":"e_1_3_2_9_2","first-page":"1","volume-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security","author":"Afchar Darius","year":"2018","unstructured":"Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: A compact facial video forgery detection network. In Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security. IEEE, 1\u20137."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2021.3124155"},{"issue":"2","key":"e_1_3_2_13_2","first-page":"38","article-title":"Security, privacy and steganographic analysis of FaceApp and TikTok","volume":"14","author":"Neyaz Ashar","year":"2020","unstructured":"Ashar Neyaz, Avinash Kumar, Sundar Krishnan, Jessica Placker, and Qingzhong Liu. 2020. Security, privacy and steganographic analysis of FaceApp and TikTok. International Journal of Computer Science and Security 14, 2 (2020), 38\u201359.","journal-title":"International Journal of Computer Science and Security"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"issue":"3","key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/TKDE.2020.2993326","article-title":"The use of fuzzy logic as augmentation to quantitative analysis to unleash knowledge of participants\u2019 uncertainty when filling a survey: Case of cloud computing","volume":"34","author":"Kouatli I.","year":"2020","unstructured":"I. Kouatli. 2020. The use of fuzzy logic as augmentation to quantitative analysis to unleash knowledge of participants\u2019 uncertainty when filling a survey: Case of cloud computing. IEEE Transactions on Knowledge and Data Engineering 34, 3 (2020), 1489\u20131500.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_17_2","first-page":"164","volume-title":"Proceedings of the FSDM","author":"Kouatli Issam M.","year":"2018","unstructured":"Issam M. Kouatli and Skander Ben Abdallah. 2018. An augmentation of fuzziness to randomness in project evaluation.. In Proceedings of the FSDM. 164\u2013173."},{"key":"e_1_3_2_18_2","article-title":"Proving reliability of image processing techniques in digital forensics applications","volume":"2022","author":"Iqbal Saima","year":"2022","unstructured":"Saima Iqbal, Wilayat Khan, Abdulrahman Alothaim, Aamir Qamar, Adi Alhudhaif, and Shtwai Alsubai. 2022. Proving reliability of image processing techniques in digital forensics applications. Security and Communication Networks 2022 (2022).","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_19_2","first-page":"289","volume-title":"Proceedings of the 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE\u201919)","author":"Ahn Ye-Chan","year":"2019","unstructured":"Ye-Chan Ahn and Chang-Sung Jeong. 2019. Natural language contents evaluation system for detecting fake news using deep learning. In Proceedings of the 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE\u201919). IEEE, 289\u2013292."},{"key":"e_1_3_2_20_2","first-page":"85","volume-title":"Proceedings of the 2020 IEEE 24th International Conference on Intelligent Engineering Systems (INES\u201920)","author":"Yanagi Yuta","year":"2020","unstructured":"Yuta Yanagi, Ryohei Orihara, Yuichi Sei, Yasuyuki Tahara, and Akihiko Ohsuga. 2020. Fake news detection with generated comments for news articles. In Proceedings of the 2020 IEEE 24th International Conference on Intelligent Engineering Systems (INES\u201920). IEEE, 85\u201390."},{"key":"e_1_3_2_21_2","first-page":"1","volume-title":"Proceedings of the 2018 13th International Conference on Knowledge, Information and Creativity Support Systems (KICSS\u201918)","author":"Seo Youngkyung","year":"2018","unstructured":"Youngkyung Seo and Chang-Sung Jeong. 2018. FaGoN: Fake news detection model using grammatic transformation on neural network. In Proceedings of the 2018 13th International Conference on Knowledge, Information and Creativity Support Systems (KICSS\u201918). IEEE, 1\u20135."},{"key":"e_1_3_2_22_2","first-page":"1","volume-title":"Proceedings of the 2017 International Conference on Computational Intelligence in Data Science (ICCIDS\u201917)","author":"Kumar G. A. Rajesh","year":"2017","unstructured":"G. A. Rajesh Kumar, Ravi Kant Kumar, and Goutam Sanyal. 2017. Discriminating real from fake smile using convolution neural network. In Proceedings of the 2017 International Conference on Computational Intelligence in Data Science (ICCIDS\u201917). IEEE, 1\u20136."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3027639"},{"key":"e_1_3_2_24_2","first-page":"2299","volume-title":"Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP\u201919)","author":"He Peisong","year":"2019","unstructured":"Peisong He, Haoliang Li, and Hongxia Wang. 2019. Detection of fake images via the ensemble of deep representations from multi color spaces. In Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP\u201919). IEEE, 2299\u20132303."},{"key":"e_1_3_2_25_2","first-page":"816","volume-title":"Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON\u201919)","author":"Sharma Sunidhi","year":"2019","unstructured":"Sunidhi Sharma and Dilip Kumar Sharma. 2019. Fake news detection: A long way to go. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON\u201919). IEEE, 816\u2013821."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352562"},{"key":"e_1_3_2_27_2","unstructured":"Thanh Thi Nguyen Quoc Viet Hung Nguyen Cuong M. Nguyen Dung Nguyen Duc Thanh Nguyen and Saeid Nahavandi. 2019. Deep learning for deepfakes creation and detection: A survey. arXiv:1909.11573. Retrieved from https:\/\/arxiv.org\/abs\/1909.11573."},{"issue":"4","key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1109\/TPAMI.2019.2903062","article-title":"Learning raw image reconstruction-aware deep image compressors","volume":"42","author":"Punnappurath Abhijith","year":"2019","unstructured":"Abhijith Punnappurath and Michael S. Brown. 2019. Learning raw image reconstruction-aware deep image compressors. IEEE Transactions on Pattern Analysis and Machine Intelligence 42, 4 (2019), 1013\u20131019.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"e_1_3_2_29_2","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/TMM.2019.2938345","article-title":"Energy compaction-based image compression using convolutional autoencoder","volume":"22","author":"Cheng Zhengxue","year":"2019","unstructured":"Zhengxue Cheng, Heming Sun, Masaru Takeuchi, and Jiro Katto. 2019. Energy compaction-based image compression using convolutional autoencoder. IEEE Transactions on Multimedia 22, 4 (2019), 860\u2013873.","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2938863"},{"key":"e_1_3_2_31_2","first-page":"70","volume-title":"Proceedings of the 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom\u201920)","author":"Rana Md Shohel","year":"2020","unstructured":"Md Shohel Rana and Andrew H. Sung. 2020. Deepfakestack: A deep ensemble-based learning technique for deepfake detection. In Proceedings of the 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom\u201920). IEEE, 70\u201375."},{"key":"e_1_3_2_32_2","first-page":"7252","volume-title":"Proceedings of the 2020 39th Chinese Control Conference (CCC\u201920)","author":"Chang Xu","year":"2020","unstructured":"Xu Chang, Jian Wu, Tongfeng Yang, and Guorui Feng. 2020. Deepfake face image detection based on improved VGG convolutional neural network. In Proceedings of the 2020 39th Chinese Control Conference (CCC\u201920). IEEE, 7252\u20137256."},{"key":"e_1_3_2_33_2","first-page":"1","volume-title":"Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT\u201920)","author":"Suratkar Shraddha","year":"2020","unstructured":"Shraddha Suratkar, Elvin Johnson, Karan Variyambat, Mihir Panchal, and Faruk Kazi. 2020. Employing transfer-learning based CNN architectures to enhance the generalizability of deepfake detection. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT\u201920). IEEE, 1\u20139."},{"key":"e_1_3_2_34_2","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/SIBGRAPI.2017.16","volume-title":"Proceedings of the 2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI\u201917)","author":"Rezende Edmar R. S. De","year":"2017","unstructured":"Edmar R. S. De Rezende, Guilherme C. S. Ruppert, and Tiago Carvalho. 2017. Detecting computer generated images with deep convolutional neural networks. In Proceedings of the 2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI\u201917). IEEE, 71\u201378."},{"key":"e_1_3_2_35_2","first-page":"1","volume-title":"Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP\u201918)","author":"\u015eeng\u00fcr Abdulkadir","year":"2018","unstructured":"Abdulkadir \u015eeng\u00fcr, Zahid Akhtar, Yaman Akbulut, Sami Ekici, and \u00dcmit Budak. 2018. Deep feature extraction for face liveness detection. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP\u201918). IEEE, 1\u20134."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206009"},{"key":"e_1_3_2_37_2","unstructured":"Tero Karras Timo Aila Samuli Laine and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality stability and variation. arXiv:1710.10196. Retrieved from https:\/\/arxiv.org\/abs\/1710.10196."},{"key":"e_1_3_2_38_2","first-page":"271","volume-title":"Proceedings of the 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST\u201921)","year":"2021","unstructured":"Qurat-ul-ain, Nudrat Nida, Aun Irtaza, and Nouman Ilyas. 2021. Forged face detection using ELA and deep learning techniques. In Proceedings of the 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST\u201921). IEEE, 271\u2013275."},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Leandro A. Passos Danilo Jodas Kelton AP da Costa Luis A. Souza J\u00fanior Danilo Colombo and Jo\u00e3o Paulo Papa. 2022. A review of deep learning-based approaches for deepfake content detection. arXiv:2202.06095. Retrieved from https:\/\/arxiv.org\/abs\/2202.06095.","DOI":"10.22541\/au.169735672.27713914\/v1"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00341"},{"issue":"5","key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/JSTSP.2020.3007250","article-title":"Ganprintr: Improved fakes and evaluation of the state-of-the-art in face manipulation detection","volume":"14","author":"Neves Joao C.","year":"2020","unstructured":"Joao C. Neves, Ruben Tolosana, Ruben Vera-Rodriguez, Vasco Lopes, Hugo Proen\u00e7a, and Julian Fierrez. 2020. Ganprintr: Improved fakes and evaluation of the state-of-the-art in face manipulation detection. IEEE Journal of Selected Topics in Signal Processing 14, 5 (2020), 1038\u20131048.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_2_43_2","first-page":"642","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","author":"Hulzebosch Nils","year":"2020","unstructured":"Nils Hulzebosch, Sarah Ibrahimi, and Marcel Worring. 2020. Detecting CNN-generated facial images in real-world scenarios. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops. 642\u2013643."},{"key":"e_1_3_2_44_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE International Conference on Multimedia and Expo (ICME\u201920)","author":"Chen Peng","year":"2020","unstructured":"Peng Chen, Jin Liu, Tao Liang, Guangzhi Zhou, Hongchao Gao, Jiao Dai, and Jizhong Han. 2020. Fsspotter: Spotting face-swapped video by spatial and temporal clues. In Proceedings of the 2020 IEEE International Conference on Multimedia and Expo (ICME\u201920). IEEE, 1\u20136."},{"key":"e_1_3_2_45_2","first-page":"86","volume-title":"Proceedings of the 2020 3rd International Conference on Information and Computer Technologies (ICICT\u201920)","author":"Ranjan Pranjal","year":"2020","unstructured":"Pranjal Ranjan, Sarvesh Patil, and Faruk Kazi. 2020. Improved generalizability of deep-fakes detection using transfer learning based CNN framework. In Proceedings of the 2020 3rd International Conference on Information and Computer Technologies (ICICT\u201920). IEEE, 86\u201390."},{"key":"e_1_3_2_46_2","unstructured":"R. Wang L. Ma F. Juefei-Xu X. Xie J. Wang and Y. Liu. Fakespotter: A simple baseline for spotting ai-synthesized fake faces. arXiv:1909.06122. Retrieved from https:\/\/arxiv.org\/abs\/1909.06122."},{"key":"e_1_3_2_47_2","unstructured":"Lakshmanan Nataraj Tajuddin Manhar Mohammed Shivkumar Chandrasekaran Arjuna Flenner Jawadul H. Bappy Amit K. Roy-Chowdhury and B. S. Manjunath. 2019. Detecting GAN generated fake images using co-occurrence matrices. arXiv:1903.06836. Retrieved from https:\/\/arxiv.org\/abs\/1903.06836."},{"key":"e_1_3_2_48_2","unstructured":"Ning Yu Larry Davis and Mario Fritz. 2018. Attributing fake images to gans: Analyzing fingerprints in generated images. arXiv:1811.08180. Retrieved from https:\/\/arxiv.org\/abs\/:1811.08180."},{"key":"e_1_3_2_49_2","first-page":"1","volume-title":"Proceedings of the 2019 IEEE International Workshop on Information Forensics and Security (WIFS\u201919)","author":"Marra Francesco","year":"2019","unstructured":"Francesco Marra, Cristiano Saltori, Giulia Boato, and Luisa Verdoliva. 2019. Incremental learning for the detection and classification of gan-generated images. In Proceedings of the 2019 IEEE International Workshop on Information Forensics and Security (WIFS\u201919). IEEE, 1\u20136."},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622018500128"},{"key":"e_1_3_2_51_2","unstructured":"Imad Rida Romain H\u00e9rault and Gilles Gasso. 2018. An efficient supervised dictionary learning method for audio signal recognition. arXiv:1812.04748. Retrieved from https:\/\/arxiv.org\/abs\/1812.04748."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31456-9_15"},{"key":"e_1_3_2_53_2","unstructured":"Polychronis Charitidis Giorgos Kordopatis-Zilos Symeon Papadopoulos and Ioannis Kompatsiaris. 2020. Investigating the impact of pre-processing and prediction aggregation on the deepfake detection task. arXiv:1701.00133. Retrieved from https:\/\/arxiv.org\/abs\/1701.00133."},{"key":"e_1_3_2_54_2","first-page":"116527","article-title":"Low-light homomorphic filtering network for integrating image enhancement and classification","volume":"100","author":"Sobbahi Rayan Al","year":"2022","unstructured":"Rayan Al Sobbahi and Joe Tekli. 2022. Low-light homomorphic filtering network for integrating image enhancement and classification. Signal Processing: Image Communication 100 (2022), 116527.","journal-title":"Signal Processing: Image Communication"},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","first-page":"897","DOI":"10.3389\/fneur.2019.00897","article-title":"MRI-based predictors of hemorrhagic transformation in patients with stroke treated by intravenous thrombolysis","volume":"10","author":"Nawar Rody El","year":"2019","unstructured":"Rody El Nawar, Jennifer Yeung, Julien Labreuche, Marie-Laure Chadenat, Duc Long Duong, Maxime De Malherbe, Yves-Sebastien Cordoliani, Bertrand Lapergue, and Fernando Pico. 2019. MRI-based predictors of hemorrhagic transformation in patients with stroke treated by intravenous thrombolysis. Frontiers in Neurology 10 (2019), 897.","journal-title":"Frontiers in Neurology"},{"issue":"8","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1080\/19368623.2020.1751371","article-title":"Examining an integrated model of green image, perceived quality, satisfaction, trust, and loyalty in upscale hotels","volume":"29","author":"Assaker Guy","year":"2020","unstructured":"Guy Assaker, Peter O\u2019Connor, and Rania El-Haddad. 2020. Examining an integrated model of green image, perceived quality, satisfaction, trust, and loyalty in upscale hotels. Journal of Hospitality Marketing and Management 29, 8 (2020), 934\u2013955.","journal-title":"Journal of Hospitality Marketing and Management"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-021-01650-9"},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Zoe Papakipos and Joanna Bitton. 2022. Augly: Data augmentations for robustness. arXiv:2201.06494. Retrieved from https:\/\/arxiv.org\/abs\/2201.06494.","DOI":"10.1109\/CVPRW56347.2022.00027"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22523-3"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:56Z","timestamp":1750183736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":58,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3592615"],"URL":"https:\/\/doi.org\/10.1145\/3592615","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2022-12-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}