{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:14:41Z","timestamp":1765008881018,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","funder":[{"name":"Shandong Provincial Key Laboratory of Industrial Network and Information System Security","award":["2024JDJH05"],"award-info":[{"award-number":["2024JDJH05"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1145\/3743093.3770991","type":"proceedings-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:06:16Z","timestamp":1765008376000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FALU: A Proactive Deepfake Detection Scheme Based on Average Hashing and Mamba-Like Linear Attention U-Net"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5182-2798","authenticated-orcid":false,"given":"Jian","family":"Li","sequence":"first","affiliation":[{"name":"Qilu University of Technology(Shandong Academy of Sciences), JiNan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7068-1255","authenticated-orcid":false,"given":"Wei","family":"Han","sequence":"additional","affiliation":[{"name":"Qilu University of Technology(Shandong Academy of Sciences), JiNan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9030-7393","authenticated-orcid":false,"given":"Bin","family":"Ma","sequence":"additional","affiliation":[{"name":"Qilu University of Technology(Shandong Academy of Sciences), JiNan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6111-9000","authenticated-orcid":false,"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Jiaotong University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1622-0561","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science Fudan University, ShangHai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00046"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19886"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_3_1_6_2","volume-title":"Austria University of Applied Sciences","author":"Christoph Zauner","year":"2010","unstructured":"Zauner Christoph. 2010. Implementation and benchmarking of perceptual image hash functions. In Austria University of Applied Sciences."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548049"},{"key":"e_1_3_3_1_9_2","volume-title":"NeurIPS","author":"Gupta Ankit","year":"2022","unstructured":"Ankit Gupta, Albert Gu, and Jonathan Berant. 2022. Diagonal state spaces are as effective as structured state spaces. In NeurIPS."},{"key":"e_1_3_3_1_10_2","unstructured":"Menghao Han Zhenyan Ji Yanyan Yang Qibo Feng and Shen Yin. 2025. MSAM: a multi-scale attention mechanism for improving industrial defect segmentation. Neural Computing and Applications (2025)."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"e_1_3_3_1_14_2","volume-title":"NeurIPS","author":"Liu Yue","year":"2024","unstructured":"Yue Liu, Yunjie Tian, Yuzhong Zhao, Hongtian Yu, Lingxi Xie, Yaowei Wang, Qixiang Ye, Jianbin Jiao, and Yunfan Liu. 2024. VMamba: Visual state space model. In NeurIPS."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547950"},{"key":"e_1_3_3_1_18_2","volume-title":"International Conference on Learning Representations (ICLR)","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_3_1_20_2","volume-title":"Advances in Neural Information Processing Systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All You Need. In Advances in Neural Information Processing Systems , Vol.\u00a030."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/107"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Tianyi Wang Xin Liao Kam-Pui Chow Xiaodong Lin and Yinglong Wang. 2025. Deepfake detection: A comprehensive survey from the reliability perspective. Comput. Surveys 57 3 (2025) 58:1\u201358:35.","DOI":"10.1145\/3699710"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01418"},{"key":"e_1_3_3_1_26_2","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","author":"Zhang Yufeng","year":"2024","unstructured":"Yufeng Zhang, Zongxi Li, Yufeng Jiang, Haoran Xie, and Jing Cai. 2024. Demystify Mamba in Vision: A Linear Attention Perspective. In Advances in Neural Information Processing Systems (NeurIPS). https:\/\/arxiv.org\/abs\/2405.16605"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"}],"event":{"name":"MMAsia '25: ACM Multimedia Asia","location":"Kuala Lumpur Malaysia","acronym":"MMAsia '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 7th ACM International Conference on Multimedia in Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743093.3770991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:11:23Z","timestamp":1765008683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743093.3770991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":26,"alternative-id":["10.1145\/3743093.3770991","10.1145\/3743093"],"URL":"https:\/\/doi.org\/10.1145\/3743093.3770991","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"2025-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}