{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T12:10:06Z","timestamp":1751544606219,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100010712","name":"Viet Nam National University Ho Chi Minh City","doi-asserted-by":"publisher","award":["DS.C2025-18-13"],"award-info":[{"award-number":["DS.C2025-18-13"]}],"id":[{"id":"10.13039\/501100010712","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3709020.3734833","type":"proceedings-article","created":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T11:28:01Z","timestamp":1751542081000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Model for Generalizable Deepfake Detection via Blending, Semantic, and General Artifacts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9707-4026","authenticated-orcid":false,"given":"Minh-Khoa","family":"Le-Phan","sequence":"first","affiliation":[{"name":"University of Science, VNU-HCM, Ho Chi Minh City, Vietnam and Vietnam National University, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1501-8080","authenticated-orcid":false,"given":"Minh-Hoang","family":"Le","sequence":"additional","affiliation":[{"name":"University of Science, VNU-HCM, Ho Chi Minh City, Vietnam and Vietnam National University, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3046-3041","authenticated-orcid":false,"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Science, VNU-HCM, Ho Chi Minh, Vietnam and Vietnam National University, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2906-0360","authenticated-orcid":false,"given":"Trong-Le","family":"Do","sequence":"additional","affiliation":[{"name":"University of Science, VNU-HCM, Ho Chi Minh City, Vietnam and Vietnam National University, Ho Chi Minh City, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"key":"e_1_3_3_2_7_2","unstructured":"Jikang Cheng Zhiyuan Yan Ying Zhang Yuhao Luo Zhongyuan Wang and Chen Li. 2024. Can We Leave Deepfake Data Behind in Training Deepfake Detector? arxiv:https:\/\/arXiv.org\/abs\/2408.17052\u00a0[cs.CV] https:\/\/arxiv.org\/abs\/2408.17052"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"e_1_3_3_2_9_2","unstructured":"DFD. 2020. Contributing Data to DeepFake Detection. Google AI Blog. https:\/\/ai.googleblog.com\/2019\/09\/contributing-data-to-deepfakedetection.html Accessed: 2021-04-24."},{"key":"e_1_3_3_2_10_2","unstructured":"Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian\u00a0Canton Ferrer. 2020. The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2006.07397 (2020)."},{"key":"e_1_3_3_2_11_2","unstructured":"Brian Dolhansky Russ Howes Ben Pflaum Nicole Baram and Cristian\u00a0Canton Ferrer. 2019. The deepfake detection challenge (dfdc) preview dataset. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.08854 (2019)."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"e_1_3_3_2_13_2","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et\u00a0al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.11929 (2020)."},{"key":"e_1_3_3_2_14_2","unstructured":"Pierre Foret Ariel Kleiner Hossein Mobahi and Behnam Neyshabur. 2020. Sharpness-aware minimization for efficiently improving generalization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.01412 (2020)."},{"key":"e_1_3_3_2_15_2","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"e_1_3_3_2_18_2","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.6980 (2014)."},{"key":"e_1_3_3_2_19_2","unstructured":"Diederik\u00a0P Kingma Max Welling et\u00a0al. 2013. Auto-encoding variational bayes."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_3_2_24_2","first-page":"104","volume-title":"European Conference on Computer Vision","author":"Lin Yuzhen","year":"2024","unstructured":"Yuzhen Lin, Wentang Song, Bin Li, Yuezun Li, Jiangqun Ni, Han Chen, and Qiushi Li. 2024. Fake it till you make it: Curricular dynamic forgery augmentations towards general deepfake detection. In European Conference on Computer Vision. Springer, 104\u2013122."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"e_1_3_3_2_27_2","first-page":"12","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Ni Yunsheng","year":"2022","unstructured":"Yunsheng Ni, Depu Meng, Changqian Yu, Chengbin Quan, Dongchun Ren, and Youjian Zhao. 2022. Core: Consistent representation learning for face forgery detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 12\u201321."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"e_1_3_3_2_29_2","first-page":"8748","volume-title":"International conference on machine learning","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong\u00a0Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et\u00a0al. 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PmLR, 8748\u20138763."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00021","volume-title":"2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)\/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom)","author":"Rana Md\u00a0Shohel","year":"2020","unstructured":"Md\u00a0Shohel Rana and Andrew\u00a0H Sung. 2020. Deepfakestack: A deep ensemble-based learning technique for deepfake detection. In 2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)\/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, 70\u201375."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Christos Sagonas Epameinondas Antonakos Georgios Tzimiropoulos Stefanos Zafeiriou and Maja Pantic. 2016. 300 faces in-the-wild challenge: Database and results. Image and vision computing 47 (2016) 3\u201318.","DOI":"10.1016\/j.imavis.2016.01.002"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Kai Shu Amy Sliva Suhang Wang Jiliang Tang and Huan Liu. 2017. Fake News Detection on Social Media: A Data Mining Perspective. SIGKDD Explor. Newsl. 19 1 (Sept. 2017) 22\u201336. https:\/\/doi.org\/10.1145\/3137597.3137600","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_3_2_35_2","first-page":"6105","volume-title":"International conference on machine learning","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105\u20136114."},{"key":"e_1_3_3_2_36_2","unstructured":"Deressa Wodajo and Solomon Atnafu. 2021. Deepfake video detection using convolutional vision transformer. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2102.11126 (2021)."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00009"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484407"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02071"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00858"},{"key":"e_1_3_3_2_41_2","unstructured":"Zhiyuan Yan Jiangming Wang Zhendong Wang Peng Jin Ke-Yue Zhang Shen Chen Taiping Yao Shouhong Ding Baoyuan Wu and Li Yuan. 2024. Effort: Efficient Orthogonal Modeling for Generalizable AI-Generated Image Detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.15633 (2024)."},{"key":"e_1_3_3_2_42_2","first-page":"22412","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Yan Zhiyuan","year":"2023","unstructured":"Zhiyuan Yan, Yong Zhang, Yanbo Fan, and Baoyuan Wu. 2023. Ucf: Uncovering common features for generalizable deepfake detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 22412\u201322423."},{"key":"e_1_3_3_2_43_2","unstructured":"Zhiyuan Yan Yong Zhang Xinhang Yuan Siwei Lyu and Baoyuan Wu. 2023. Deepfakebench: A comprehensive benchmark of deepfake detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2307.01426 (2023)."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093632"}],"event":{"name":"SCID '25: The 2nd Workshop on Security-Centric Strategies for Combating Information Disorder","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hanoi Vietnam","acronym":"SCID '25"},"container-title":["Proceedings of the 2nd Workshop on Security-Centric Strategies for Combating Information Disorder"],"original-title":[],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T11:28:33Z","timestamp":1751542113000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709020.3734833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":44,"alternative-id":["10.1145\/3709020.3734833","10.1145\/3709020"],"URL":"https:\/\/doi.org\/10.1145\/3709020.3734833","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}