{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:02:17Z","timestamp":1771480937197,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":122,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Leibniz Association Competition","doi-asserted-by":"publisher","award":["P101\/2020"],"award-info":[{"award-number":["P101\/2020"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678922","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"513-530","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7186-3634","authenticated-orcid":false,"given":"Jonas","family":"Ricker","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9219-1956","authenticated-orcid":false,"given":"Dennis","family":"Assenmacher","sequence":"additional","affiliation":[{"name":"GESIS - Leibniz Institute for the Social Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-1264","authenticated-orcid":false,"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1916-7033","authenticated-orcid":false,"given":"Asja","family":"Fischer","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7170-1274","authenticated-orcid":false,"given":"Erwin","family":"Quiring","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany and International Computer Science Institute, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Albright Michael","year":"2019","unstructured":"Michael Albright and Scott McCloskey. 2019. Source Generator Attribution via Inversion. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_1_2_1","volume-title":"Dos and Don\u2019ts of Machine Learning in Computer Security. In USENIX Security Symposium.","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don\u2019ts of Machine Learning in Computer Security. In USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","volume-title":"Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign","author":"Badawy Adam","unstructured":"Adam Badawy, Emilio Ferrara, and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign. In IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)."},{"key":"e_1_3_2_1_4_1","volume-title":"BlazeFace: Sub-millisecond Neural Face Detection on Mobile GPUs. arXiv preprint","author":"Bazarevsky Valentin","year":"2019","unstructured":"Valentin Bazarevsky, Yury Kartynnik, Andrey Vakunov, Karthik Raveendran, and Matthias Grundmann. 2019. BlazeFace: Sub-millisecond Neural Face Detection on Mobile GPUs. arXiv preprint (2019)."},{"key":"e_1_3_2_1_5_1","volume-title":"Anti-Abuse and Spam Conference (CEAS).","author":"Benevenuto Fabr\u00edcio","year":"2010","unstructured":"Fabr\u00edcio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virg\u00edlio Almeida. 2010. Detecting Spammers on Twitter. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)."},{"key":"e_1_3_2_1_6_1","volume-title":"Social Bots Distort the 2016 US Presidential Election Online Discussion. First Monday","author":"Bessi Alessandro","year":"2016","unstructured":"Alessandro Bessi and Emilio Ferrara. 2016. Social Bots Distort the 2016 US Presidential Election Online Discussion. First Monday (2016)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007988"},{"key":"e_1_3_2_1_8_1","unstructured":"Johannes Buchner. 2024. ImageHash: An image hashing library written in Python.https:\/\/github.com\/JohannesBuchner\/imagehash."},{"key":"e_1_3_2_1_9_1","volume-title":"Understanding Properties That Generalize. In European Conference on Computer Vision (ECCV).","author":"Chai Lucy","year":"2020","unstructured":"Lucy Chai, David Bau, Ser-Nam Lim, and Phillip Isola. 2020. What Makes Fake Images Detectable? Understanding Properties That Generalize. In European Conference on Computer Vision (ECCV)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00712"},{"key":"e_1_3_2_1_11_1","volume-title":"SSD-GAN: Measuring the Realness in the Spatial and Spectral Domains. In AAAI Conference on Artificial Intelligence (AAAI).","author":"Chen Yuanqi","year":"2021","unstructured":"Yuanqi Chen, Ge Li, Cece Jin, Shan Liu, and Thomas Li. 2021. SSD-GAN: Measuring the Realness in the Spatial and Spectral Domains. In AAAI Conference on Artificial Intelligence (AAAI)."},{"key":"e_1_3_2_1_12_1","volume-title":"StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Choi Yunjey","year":"2018","unstructured":"Yunjey Choi, Minje Choi, Munyoung Kim, Jung-Woo Ha, Sunghun Kim, and Jaegul Choo. 2018. StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_13_1","unstructured":"Nick Clegg. 2024. Labeling AI-Generated Images on Facebook Instagram and Threads. https:\/\/about.fb.com\/news\/2024\/02\/labeling-ai-generated-images-on-facebook-instagram-and-threads\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Samantha Cole. 2017. AI-assisted Fake Porn Is Here and We\u2019re All Fucked. https:\/\/www.vice.com\/en\/article\/gydydm\/gal-gadot-fake-ai-porn."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"e_1_3_2_1_16_1","volume-title":"Towards Universal GAN Image Detection. In International Conference on Visual Communications and Image Processing (VCIP).","author":"Cozzolino Davide","year":"2021","unstructured":"Davide Cozzolino, Diego Gragnaniello, Giovanni Poggi, and Luisa Verdoliva. 2021. Towards Universal GAN Image Detection. In International Conference on Visual Communications and Image Processing (VCIP)."},{"key":"e_1_3_2_1_17_1","volume-title":"SpoC: Spoofing Camera Fingerprints. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Cozzolino Davide","year":"2021","unstructured":"Davide Cozzolino, Justus Thies, Andreas R\u00f6ssler, Matthias Niessner, and Luisa Verdoliva. 2021. SpoC: Spoofing Camera Fingerprints. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_1_18_1","volume-title":"A Decade of Social Bot Detection. Commun. ACM","author":"Cresci Stefano","year":"2020","unstructured":"Stefano Cresci. 2020. A Decade of Social Bot Detection. Commun. ACM (2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313184"},{"key":"e_1_3_2_1_20_1","unstructured":"Jesse Damiani. 2019. A Voice Deepfake Was Used to Scam a CEO out of $243 000. https:\/\/www.forbes.com\/sites\/jessedamiani\/2019\/09\/03\/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion Models Beat GANs on Image Synthesis. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. 2020. An Image Is Worth 16x16 Words: Transformers for Image Recognition at Scale. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Knowledge Discovery and Data Mining (KDD).","author":"Ester Martin","year":"1996","unstructured":"Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu. 1996. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In International Conference on Knowledge Discovery and Data Mining (KDD)."},{"key":"e_1_3_2_1_25_1","unstructured":"Europol Innovation Lab. 2024. Facing reality? Law enforcement and the challenge of deepfakes. https:\/\/www.europol.europa.eu\/publications-events\/publications\/facing-reality-law-enforcement-and-challenge-of-deepfakes."},{"key":"e_1_3_2_1_26_1","volume-title":"TweetsKB: A Public and Large-Scale RDF Corpus of Annotated Tweets. In European Semantic Web Conference (ESWC).","author":"Fafalios Pavlos","year":"2018","unstructured":"Pavlos Fafalios, Vasileios Iosifidis, Eirini Ntoutsi, and Stefan Dietze. 2018. TweetsKB: A Public and Large-Scale RDF Corpus of Annotated Tweets. In European Semantic Web Conference (ESWC)."},{"key":"e_1_3_2_1_27_1","volume-title":"TweepFake: About Detecting Deepfake Tweets. PLoS ONE","author":"Fagni Tiziano","year":"2021","unstructured":"Tiziano Fagni, Fabrizio Falchi, Margherita Gambini, Antonio Martella, and Maurizio Tesconi. 2021. TweepFake: About Detecting Deepfake Tweets. PLoS ONE (2021)."},{"key":"e_1_3_2_1_28_1","volume-title":"An Overview of Perceptual Hashing. Journal of Online Trust and Safety","author":"Farid Hany","year":"2021","unstructured":"Hany Farid. 2021. An Overview of Perceptual Hashing. Journal of Online Trust and Safety (2021)."},{"key":"e_1_3_2_1_29_1","unstructured":"Federal Bureau of Investigation (FBI) Cyber Division. 2021. Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations. https:\/\/www.ic3.gov\/Media\/News\/2021\/210310-2.pdf."},{"key":"e_1_3_2_1_30_1","volume-title":"The Stable Signature: Rooting Watermarks in Latent Diffusion Models. In IEEE\/CVF International Conference on Computer Vision (ICCV).","author":"Fernandez Pierre","year":"2023","unstructured":"Pierre Fernandez, Guillaume Couairon, Herv\u00e9 J\u00e9gou, Matthijs Douze, and Teddy Furon. 2023. The Stable Signature: Rooting Watermarks in Latent Diffusion Models. In IEEE\/CVF International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v27i12.12872"},{"key":"e_1_3_2_1_32_1","volume-title":"Social Bot Detection in the Age of ChatGPT: Challenges and Opportunities. First Monday","author":"Ferrara Emilio","year":"2023","unstructured":"Emilio Ferrara. 2023. Social Bot Detection in the Age of ChatGPT: Challenges and Opportunities. First Monday (2023)."},{"key":"e_1_3_2_1_33_1","volume-title":"Leveraging Frequency Analysis for Deep Fake Image Recognition. In International Conference on Machine Learning (ICML).","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Thorsten Eisenhofer, Lea Sch\u00f6nherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz. 2020. Leveraging Frequency Analysis for Deep Fake Image Recognition. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00159"},{"key":"e_1_3_2_1_35_1","volume-title":"Voice Impersonation Using Generative Adversarial Networks. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Gao Yang","year":"2018","unstructured":"Yang Gao, Rita Singh, and Bhiksha Raj. 2018. Voice Impersonation Using Generative Adversarial Networks. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_36_1","volume-title":"Images and Misinformation in Political Groups: Evidence from WhatsApp in India. Harvard Kennedy School (HKS) Misinformation Review","author":"Garimella Kiran","year":"2020","unstructured":"Kiran Garimella and Dean Eckles. 2020. Images and Misinformation in Political Groups: Evidence from WhatsApp in India. Harvard Kennedy School (HKS) Misinformation Review (2020)."},{"key":"e_1_3_2_1_37_1","volume-title":"Goldstein and Ren\u00e9e DiResta","author":"A.","year":"2022","unstructured":"Josh\u00a0A. Goldstein and Ren\u00e9e DiResta. 2022. Research Note: This Salesperson Does Not Exist: How Tactics from Political Influence Operations on Social Media Are Deployed for Commercial Lead Generation. Harvard Kennedy School (HKS) Misinformation Review (2022)."},{"key":"e_1_3_2_1_38_1","volume-title":"Goldstein and Shelby Grossman","author":"A.","year":"2021","unstructured":"Josh\u00a0A. Goldstein and Shelby Grossman. 2021. How Disinformation Evolved in 2020. https:\/\/www.brookings.edu\/articles\/how-disinformation-evolved-in-2020\/."},{"key":"e_1_3_2_1_39_1","volume-title":"Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations. arXiv preprint","author":"Goldstein A.","year":"2023","unstructured":"Josh\u00a0A. Goldstein, Girish Sastry, Micah Musser, Renee DiResta, Matthew Gentzel, and Katerina Sedova. 2023. Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations. arXiv preprint (2023)."},{"key":"e_1_3_2_1_40_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_41_1","volume-title":"IEEE International Conference on Multimedia and Expo (ICME).","author":"Gragnaniello D.","unstructured":"D. Gragnaniello, D. Cozzolino, F. Marra, G. Poggi, and L. Verdoliva. 2021. Are GAN Generated Images Easy to Detect? A Critical Analysis of the State-of-the-Art. In IEEE International Conference on Multimedia and Expo (ICME)."},{"key":"e_1_3_2_1_42_1","unstructured":"Graphika Team. 2020. Step into My Parler. https:\/\/graphika.com\/reports\/step-into-my-parler."},{"key":"e_1_3_2_1_43_1","unstructured":"Graphika Team. 2021. Fake Cluster Boosts Huawei. https:\/\/graphika.com\/reports\/fake-cluster-boosts-huawei."},{"key":"e_1_3_2_1_44_1","volume-title":"Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Guo Hui","year":"2022","unstructured":"Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, and Siwei Lyu. 2022. Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789187.2789206"},{"key":"e_1_3_2_1_46_1","unstructured":"Harmon Joshua Roesslein and other contributors. 2024. Tweepy. https:\/\/github.com\/tweepy\/tweepy."},{"key":"e_1_3_2_1_47_1","volume-title":"Deep Residual Learning for Image Recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_48_1","volume-title":"Auditing Elon Musk\u2019s Impact on Hate Speech and Bots. In International AAAI Conference on Web and Social Media (ICWSM).","author":"Hickey Daniel","year":"2023","unstructured":"Daniel Hickey, Matheus Schmitz, Daniel Fessler, Paul\u00a0E. Smaldino, Goran Muric, and Keith Burghardt. 2023. Auditing Elon Musk\u2019s Impact on Hate Speech and Bots. In International AAAI Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_49_1","unstructured":"Jonathan Ho Ajay Jain and Pieter Abbeel. 2020. Denoising Diffusion Probabilistic Models. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_50_1","volume-title":"Exposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Hu Shu","year":"2021","unstructured":"Shu Hu, Yuezun Li, and Siwei Lyu. 2021. Exposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_51_1","volume-title":"Detecting CNN-generated Facial Images in Real-World Scenarios. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Hulzebosch Nils","year":"2020","unstructured":"Nils Hulzebosch, Sarah Ibrahimi, and Marcel Worring. 2020. Detecting CNN-generated Facial Images in Real-World Scenarios. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00976"},{"key":"e_1_3_2_1_53_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_54_1","unstructured":"Tero Karras Miika Aittala Samuli Laine Erik H\u00e4rk\u00f6nen Janne Hellsten Jaakko Lehtinen and Timo Aila. 2021. Alias-Free Generative Adversarial Networks. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_56_1","volume-title":"Analyzing and Improving the Image Quality of StyleGAN. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Karras Tero","year":"2020","unstructured":"Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2020. Analyzing and Improving the Image Quality of StyleGAN. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_57_1","volume-title":"Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR).","author":"P.","unstructured":"Diederik\u00a0P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_58_1","volume-title":"Auto-Encoding Variational Bayes. In International Conference on Learning Representations (ICLR).","author":"P.","unstructured":"Diederik\u00a0P. Kingma and Max Welling. 2014. Auto-Encoding Variational Bayes. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_59_1","volume-title":"More Real than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner]","author":"Lago Federica","year":"2022","unstructured":"Federica Lago, Cecilia Pasquini, Rainer B\u00f6hme, H\u00e9l\u00e8ne Dumont, Val\u00e9rie Goffaux, and Giulia Boato. 2022. More Real than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner]. IEEE Signal Processing Magazine (2022)."},{"key":"e_1_3_2_1_60_1","volume-title":"Evolution of Bot and Human Behavior During Elections. First Monday","author":"Luceri Luca","year":"2019","unstructured":"Luca Luceri, Ashok Deb, Silvia Giordano, and Emilio Ferrara. 2019. Evolution of Bot and Human Behavior During Elections. First Monday (2019)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360903"},{"key":"e_1_3_2_1_62_1","volume-title":"Detection of Manipulated Face Videos over Social Networks: A Large-Scale Study. Journal of Imaging","author":"Marcon Federico","year":"2021","unstructured":"Federico Marcon, Cecilia Pasquini, and Giulia Boato. 2021. Detection of Manipulated Face Videos over Social Networks: A Large-Scale Study. Journal of Imaging (2021)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2018.00084"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_1_66_1","volume-title":"Detecting GAN-generated Imagery Using Saturation Cues. In IEEE International Conference on Image Processing (ICIP).","author":"McCloskey Scott","year":"2019","unstructured":"Scott McCloskey and Michael Albright. 2019. Detecting GAN-generated Imagery Using Saturation Cues. In IEEE International Conference on Image Processing (ICIP)."},{"key":"e_1_3_2_1_67_1","volume-title":"UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. arXiv preprint","author":"McInnes Leland","year":"2020","unstructured":"Leland McInnes, John Healy, and James Melville. 2020. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. arXiv preprint (2020)."},{"key":"e_1_3_2_1_68_1","volume-title":"USENIX Security Symposium.","author":"Mink Jaron","year":"2022","unstructured":"Jaron Mink, Licheng Luo, Nat\u00e3\u00a0M. Barbosa, Olivia Figueira, Yang Wang, and Gang Wang. 2022. DeepPhish: Understanding User Trust towards Artificially Generated Profiles in Online Social Networks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Yisroel Mirsky and Wenke Lee. 2021. The Creation and Detection of Deepfakes: A Survey. ACM Comput. Surv. (2021).","DOI":"10.1145\/3425780"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Lakshmanan Nataraj Tajuddin\u00a0Manhar Mohammed B.\u00a0S. Manjunath Shivkumar Chandrasekaran Arjuna Flenner Jawadul\u00a0H. Bappy and Amit\u00a0K. Roy-Chowdhury. 2019. Detecting GAN Generated Fake Images Using Co-Occurrence Matrices. IS&T International Symposium on Electronic Imaging: Media Watermarking Security and Forensics.","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"key":"e_1_3_2_1_71_1","volume-title":"Synthetic Faces: How Perceptually Convincing Are They?Journal of Vision","author":"Nightingale Sophie","year":"2021","unstructured":"Sophie Nightingale, Shruti Agarwal, Erik H\u00e4rk\u00f6nen, Jaakko Lehtinen, and Hany Farid. 2021. Synthetic Faces: How Perceptually Convincing Are They?Journal of Vision (2021)."},{"key":"e_1_3_2_1_72_1","volume-title":"Nightingale and Hany Farid","author":"J.","year":"2022","unstructured":"Sophie\u00a0J. Nightingale and Hany Farid. 2022. AI-synthesized Faces Are Indistinguishable from Real Faces and More Trustworthy. Proceedings of the National Academy of Sciences (2022)."},{"key":"e_1_3_2_1_73_1","unstructured":"Ben Nimmo C.\u00a0Shawn Eib and L\u00e9a Ronzaud. 2020. Operation Naval Gazing. https:\/\/graphika.com\/reports\/operation-naval-gazing."},{"key":"e_1_3_2_1_74_1","volume-title":"Esteban Ponce de Le\u00f3n Rosas, and Max Rizzuto","author":"Nimmo Ben","year":"2019","unstructured":"Ben Nimmo, C.\u00a0Shawn Eib, L. Tamora, Kate Johnson, Ian Smith, Eto Buziashvili, Alyssa Kann, Kanishk Karan, Esteban Ponce de Le\u00f3n Rosas, and Max Rizzuto. 2019. #OperationFFS: Fake Face Swarm. https:\/\/graphika.com\/reports\/operationffs-fake-face-swarm."},{"key":"e_1_3_2_1_75_1","unstructured":"Ben Nimmo Camille Fran\u00e7ois C.\u00a0Shawn Eib and L\u00e9a Ronzaud. 2020. IRA Again: Unlucky Thirteen. https:\/\/graphika.com\/reports\/ira-again-unlucky-thirteen."},{"key":"e_1_3_2_1_76_1","unstructured":"Ben Nimmo Camille Fran\u00e7ois C\u00a0Shawn Eib and L\u00e9a Ronzaud. 2020. Spamouflage Goes to America. https:\/\/www.graphika.com\/reports\/spamouflage-dragon-goes-to-america."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003370"},{"key":"e_1_3_2_1_78_1","unstructured":"Conspirador Norte\u00f1o. 2024. Conspirador Norte\u00f1o | Substack. https:\/\/conspirator0.substack.com\/."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"e_1_3_2_1_80_1","volume-title":"On Aliased Resizing and Surprising Subtleties in GAN Evaluation. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Parmar Gaurav","year":"2022","unstructured":"Gaurav Parmar, Richard Zhang, and Jun-Yan Zhu. 2022. On Aliased Resizing and Surprising Subtleties in GAN Evaluation. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_81_1","volume-title":"Identifying Synthetic Faces through GAN Inversion and Biometric Traits Analysis. Applied Sciences","author":"Pasquini Cecilia","year":"2023","unstructured":"Cecilia Pasquini, Francesco Laiti, Davide Lobba, Giovanni Ambrosi, Giulia Boato, and Francesco De\u00a0Natale. 2023. Identifying Synthetic Faces through GAN Inversion and Biometric Traits Analysis. Applied Sciences (2023)."},{"key":"e_1_3_2_1_82_1","volume-title":"Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research (JMLR)","author":"Pedregosa F.","year":"2011","unstructured":"F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research (JMLR) (2011)."},{"key":"e_1_3_2_1_83_1","volume-title":"Just Another Day on Twitter: A Complete 24 Hours of Twitter Data. In International AAAI Conference on Web and Social Media (ICWSM).","author":"Pfeffer J\u00fcrgen","year":"2023","unstructured":"J\u00fcrgen Pfeffer, Daniel Matter, Kokil Jaidka, Onur Varol, Afra Mashhadi, Jana Lasser, Dennis Assenmacher, Siqi Wu, Diyi Yang, Cornelia Brantner, Daniel\u00a0M. Romero, Jahna Otterbacher, Carsten Schwemmer, Kenneth Joseph, David Garcia, and Fred Morstatter. 2023. Just Another Day on Twitter: A Complete 24 Hours of Twitter Data. In International AAAI Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_84_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong\u00a0Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. 2021. Learning Transferable Visual Models from Natural Language Supervision. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_85_1","volume-title":"Detecting and Tracking Political Abuse in Social Media. In International AAAI Conference on Web and Social Media (ICWSM).","author":"Ratkiewicz Jacob","year":"2011","unstructured":"Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Goncalves, Alessandro Flammini, and Filippo Menczer. 2011. Detecting and Tracking Political Abuse in Social Media. In International AAAI Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_87_1","volume-title":"AEROBLADE: Training-Free Detection of Latent Diffusion Images Using Autoencoder Reconstruction Error. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Ricker Jonas","year":"2024","unstructured":"Jonas Ricker, Denis Lukovnikov, and Asja Fischer. 2024. AEROBLADE: Training-Free Detection of Latent Diffusion Images Using Autoencoder Reconstruction Error. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2023.017"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_90_1","volume-title":"Detecting Generated Media: A Case Study on Twitter Data. NATO STO Meeting Proceedings","author":"Sabel Johan","year":"2021","unstructured":"Johan Sabel and Harald Stiff. 2021. Detecting Generated Media: A Case Study on Twitter Data. NATO STO Meeting Proceedings (2021)."},{"key":"e_1_3_2_1_91_1","unstructured":"Axel Sauer Kashyap Chitta Jens M\u00fcller and Andreas Geiger. 2021. Projected GANs Converge Faster. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_92_1","unstructured":"Katja Schwarz Yiyi Liao and Andreas Geiger. 2021. On the Frequency Bias of Generative Models. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_93_1","unstructured":"Selenium Developers. 2024. Selenium. https:\/\/github.com\/SeleniumHQ\/selenium."},{"key":"e_1_3_2_1_94_1","volume-title":"The Spread of Low-Credibility Content by Social Bots. Nature Communications","author":"Shao Chengcheng","year":"2018","unstructured":"Chengcheng Shao, Giovanni\u00a0Luca Ciampaglia, Onur Varol, Kai-Cheng Yang, Alessandro Flammini, and Filippo Menczer. 2018. The Spread of Low-Credibility Content by Social Bots. Nature Communications (2018)."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9667066"},{"key":"e_1_3_2_1_96_1","volume-title":"Detection of Fake Profile in Online Social Networks Using Machine Learning. In International Conference on Advances in Computing and Communication Engineering (ICACCE).","author":"Singh Naman","year":"2018","unstructured":"Naman Singh, Tushar Sharma, Abha Thakral, and Tanupriya Choudhury. 2018. Detection of Fake Profile in Online Social Networks Using Machine Learning. In International Conference on Advances in Computing and Communication Engineering (ICACCE)."},{"key":"e_1_3_2_1_97_1","volume-title":"Deep Unsupervised Learning Using Nonequilibrium Thermodynamics. In International Conference on Machine Learning (ICML).","author":"Sohl-Dickstein Jascha","year":"2015","unstructured":"Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep Unsupervised Learning Using Nonequilibrium Thermodynamics. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_98_1","unstructured":"Stanford Internet Observatory. 2020. Analysis of Twitter Takedowns Linked to Cuba the Internet Research Agency Saudi Arabia and Thailand. https:\/\/cyber.fsi.stanford.edu\/io\/news\/twitter-takedown-october-2020."},{"key":"e_1_3_2_1_99_1","unstructured":"Stanford Internet Observatory. 2020. Reply-Guys Go Hunting: An Investigation into a U.S. Astroturfing Operation on Facebook Twitter and Instagram. https:\/\/purl.stanford.edu\/vh222ch4142."},{"key":"e_1_3_2_1_100_1","unstructured":"Benjamin Strick. 2020. West Papua: New Online Influence Operation Attempts to Sway Independence Debate. https:\/\/www.bellingcat.com\/news\/2020\/11\/11\/west-papua-new-online-influence-operation-attempts-to-sway-independence-debate\/."},{"key":"e_1_3_2_1_101_1","unstructured":"Benjamin Strick. 2021. Analysis of the Pro-China Propaganda Network Targeting International Narratives. https:\/\/www.info-res.org\/post\/revealed-coordinated-attempt-to-push-pro-china-anti-western-narratives-on-social-media."},{"key":"e_1_3_2_1_102_1","volume-title":"Detecting Inorganic Financial Campaigns on Twitter. Information Systems","author":"Tardelli Serena","year":"2022","unstructured":"Serena Tardelli, Marco Avvenuti, Maurizio Tesconi, and Stefano Cresci. 2022. Detecting Inorganic Financial Campaigns on Twitter. Information Systems (2022)."},{"key":"e_1_3_2_1_103_1","volume-title":"On the Realness of People Who Do Not Exist: The Social Processing of Artificial Faces. iScience","author":"Tucciarelli Raffaele","year":"2022","unstructured":"Raffaele Tucciarelli, Neza Vehar, Shamil Chandaria, and Manos Tsakiris. 2022. On the Realness of People Who Do Not Exist: The Social Processing of Artificial Faces. iScience (2022)."},{"key":"e_1_3_2_1_104_1","unstructured":"A\u00e4ron van den Oord Nal Kalchbrenner Lasse Espeholt Koray Kavukcuoglu Oriol Vinyals and Alex Graves. 2016. Conditional Image Generation with PixelCNN Decoders. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_105_1","volume-title":"Pixel Recurrent Neural Networks. In International Conference on Machine Learning (ICML).","author":"van den Oord A\u00e4ron","year":"2016","unstructured":"A\u00e4ron van den Oord, Nal Kalchbrenner, and Koray Kavukcuoglu. 2016. Pixel Recurrent Neural Networks. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_106_1","unstructured":"James Vincent. 2019. A Spy Reportedly Used an AI-generated Profile Picture to Connect with Sources on LinkedIn. https:\/\/www.theverge.com\/2019\/6\/13\/18677341\/ai-generated-fake-faces-spy-linked-in-contacts-associated-press."},{"key":"e_1_3_2_1_107_1","volume-title":"Identifying and Characterizing Behavioral Classes of Radicalization within the QAnon Conspiracy on Twitter. In International AAAI Conference on Web and Social Media (ICWSM).","author":"Wang L.","year":"2023","unstructured":"Emily\u00a0L. Wang, Luca Luceri, Francesco Pierri, and Emilio Ferrara. 2023. Identifying and Characterizing Behavioral Classes of Radicalization within the QAnon Conspiracy on Twitter. In International AAAI Conference on Web and Social Media (ICWSM)."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579542"},{"key":"e_1_3_2_1_110_1","volume-title":"Portrait Mode: GAN Collages and Fake Personas. https:\/\/graphika.com\/posts\/portrait-mode-gan-collages-and-fake-personas.","author":"Williams Tyler","year":"2022","unstructured":"Tyler Williams and Razmik Kozakjian. 2022. Portrait Mode: GAN Collages and Fake Personas. https:\/\/graphika.com\/posts\/portrait-mode-gan-collages-and-fake-personas."},{"key":"e_1_3_2_1_111_1","volume-title":"GAN Inversion: A Survey","author":"Xia Weihao","year":"2023","unstructured":"Weihao Xia, Yulun Zhang, Yujiu Yang, Jing-Hao Xue, Bolei Zhou, and Ming-Hsuan Yang. 2023. GAN Inversion: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence (2023)."},{"key":"e_1_3_2_1_112_1","volume-title":"Anatomy of an AI-powered malicious social botnet. Journal of Quantitative Description: Digital Media","author":"Yang Kai-Cheng","year":"2024","unstructured":"Kai-Cheng Yang and Filippo Menczer. 2024. Anatomy of an AI-powered malicious social botnet. Journal of Quantitative Description: Digital Media (2024)."},{"key":"e_1_3_2_1_113_1","volume-title":"Characteristics and Prevalence of Fake Social Media Profiles with AI-generated Faces. Journal of Online Trust and Safety","author":"Yang Kai-Cheng","year":"2024","unstructured":"Kai-Cheng Yang, Danishjeet Singh, and Filippo Menczer. 2024. Characteristics and Prevalence of Fake Social Media Profiles with AI-generated Faces. Journal of Online Trust and Safety (2024)."},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5460"},{"key":"e_1_3_2_1_115_1","volume-title":"Automated Crowdturfing Attacks and Defenses in Online Review Systems. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Yao Yuanshun","year":"2017","unstructured":"Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, and Ben\u00a0Y. Zhao. 2017. Automated Crowdturfing Attacks and Defenses in Online Review Systems. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_116_1","volume-title":"Detecting Spam in a Twitter Network. First Monday","author":"Yardi Sarita","year":"2010","unstructured":"Sarita Yardi, Daniel Romero, Grant Schoenebeck, and Danah Boyd. 2010. Detecting Spam in a Twitter Network. First Monday (2010)."},{"key":"e_1_3_2_1_117_1","volume-title":"LSUN: Construction of a Large-Scale Image Dataset Using Deep Learning with Humans in the Loop. arXiv preprint","author":"Yu Fisher","year":"2016","unstructured":"Fisher Yu, Ari Seff, Yinda Zhang, Shuran Song, Thomas Funkhouser, and Jianxiong Xiao. 2016. LSUN: Construction of a Large-Scale Image Dataset Using Deep Learning with Humans in the Loop. arXiv preprint (2016)."},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278550"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"e_1_3_2_1_121_1","volume-title":"Detecting and Simulating Artifacts in GAN Fake Images. In IEEE International Workshop on Information Forensics and Security (WIFS).","author":"Zhang Xu","year":"2019","unstructured":"Xu Zhang, Svebor Karaman, and Shih-Fu Chang. 2019. Detecting and Simulating Artifacts in GAN Fake Images. In IEEE International Workshop on Information Forensics and Security (WIFS)."},{"key":"e_1_3_2_1_122_1","volume-title":"Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE\/CVF International Conference on Computer Vision (ICCV).","author":"Zhu Jun-Yan","year":"2017","unstructured":"Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei\u00a0A Efros. 2017. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE\/CVF International Conference on Computer Vision (ICCV)."}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":122,"alternative-id":["10.1145\/3678890.3678922","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678922","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}