{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:16:15Z","timestamp":1765307775141,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","funder":[{"name":"National Key Research and Development Project","award":["2022YFB2703100"],"award-info":[{"award-number":["2022YFB2703100"]}]},{"name":"Zhejiang Province High-Level Talents Special Support Program Leading Talent of Technological Innovation of Ten-Thousands Talents Program","award":["2022R52046"],"award-info":[{"award-number":["2022R52046"]}]},{"name":"Information Technology Center, ZheJiang University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3758194","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T05:44:48Z","timestamp":1761371088000},"page":"12592-12599","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Large-scale Universal Evaluation Benchmark For Face Forgery Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5765-4094","authenticated-orcid":false,"given":"Hengrui","family":"Lou","sequence":"first","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8640-8434","authenticated-orcid":false,"given":"Zunlei","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3716-7631","authenticated-orcid":false,"given":"Jinsong","family":"Geng","sequence":"additional","affiliation":[{"name":"School of Software Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6502-4454","authenticated-orcid":false,"given":"Erteng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7546-9052","authenticated-orcid":false,"given":"Lechao","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Engineering, Hefei University of Technology, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2523-5810","authenticated-orcid":false,"given":"Jie","family":"Lei","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3671-6521","authenticated-orcid":false,"given":"Jie","family":"Song","sequence":"additional","affiliation":[{"name":"School of Software Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2621-6048","authenticated-orcid":false,"given":"Mingli","family":"Song","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5720-6374","authenticated-orcid":false,"given":"Yijun","family":"Bei","sequence":"additional","affiliation":[{"name":"School of Software Technology, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Academy for Discovery. 2023. Zeroscope. https:\/\/huggingface.co\/cerspense\/zeroscope_v2_576w."},{"key":"e_1_3_2_1_2_1","unstructured":"Chaitali Bhattacharyya Hanxiao Wang Feng Zhang Sungho Kim and Xiatian Zhu. 2024. Diffusion Deepfake. arXiv:2404.01579 [cs.CV] https:\/\/arxiv.org\/abs\/2404.01579"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3356122"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680795"},{"key":"e_1_3_2_1_5_1","volume-title":"Forty-first International Conference on Machine Learning, ICML 2024","author":"Chen Baoying","year":"2024","unstructured":"Baoying Chen, Jishen Zeng, Jianquan Yang, and Rui Yang. 2024. DRCT: Diffusion Reconstruction Contrastive Training towards Universal Detection of Diffusion Generated Images. In Forty-first International Conference on Machine Learning, ICML 2024, Vienna, Austria, July 21-27, 2024. OpenReview.net. https:\/\/openreview.net\/forum?id=oRLwyayrh1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095796"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00802"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_2_1_9_1","unstructured":"Xiaokang Chen Zhiyu Wu Xingchao Liu Zizheng Pan Wen Liu Zhenda Xie Xingkai Yu and Chong Ruan. 2025. Janus-Pro: Unified Multimodal Understanding and Generation with Data and Model Scaling."},{"key":"e_1_3_2_1_10_1","first-page":"37748","volume-title":"Levine (Eds.)","volume":"36","author":"Chen Yiqun","year":"2023","unstructured":"Yiqun Chen and James Y Zou. 2023. TWIGMA: A dataset of AI-Generated Images with Metadata From Twitter. In Advances in Neural Information Processing Systems, A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine (Eds.), Vol. 36. Curran Associates, Inc., 37748-37760. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2023\/file\/769b70d1a9a6b21af53c00d0b322c763-Paper-Datasets_and_Benchmarks.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680797"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2023.3294720"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00520"},{"key":"e_1_3_2_1_15_1","unstructured":"Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian Canton Ferrer. 2020. The DeepFake Detection Challenge (DFDC) Dataset. arXiv:2006.07397 [cs.CV]"},{"volume-title":"Faceswap: Deepfakes software for all. https:\/\/github.com\/deepfakes\/faceswap.","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"Faceswap. 2020. Faceswap: Deepfakes software for all. https:\/\/github.com\/deepfakes\/faceswap."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323028"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3313503"},{"key":"e_1_3_2_1_22_1","first-page":"8107","volume-title":"Analyzing and Improving the Image Quality of StyleGAN. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019","author":"Karras Tero","year":"2019","unstructured":"Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2019. Analyzing and Improving the Image Quality of StyleGAN. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), 8107-8116. https:\/\/api.semanticscholar.org\/CorpusID:209202273"},{"key":"e_1_3_2_1_23_1","volume-title":"Woo","author":"Khalid Hasam","year":"2022","unstructured":"Hasam Khalid, Shahroz Tariq, Minha Kim, and Simon S. Woo. 2022. FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. arXiv:2108.05080 [cs.CV]"},{"key":"e_1_3_2_1_24_1","volume-title":"DeepFakes: a New Threat to Face Recognition? Assessment and Detection. ArXiv","author":"Korshunov Pavel","year":"2018","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. ArXiv, Vol. abs\/1812.08685 (2018). https:\/\/api.semanticscholar.org\/CorpusID:56517175"},{"key":"e_1_3_2_1_25_1","first-page":"10724","volume-title":"KoDF: A Large-scale Korean DeepFake Detection Dataset. 2021 IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Kwon Patrick","year":"2021","unstructured":"Patrick Kwon, Jaeseong You, Gyuhyeon Nam, Sungwoo Park, and Gyeongsu Chae. 2021. KoDF: A Large-scale Korean DeepFake Detection Dataset. 2021 IEEE\/CVF International Conference on Computer Vision (ICCV) (2021), 10724-10733. https:\/\/api.semanticscholar.org\/CorpusID:232269691"},{"key":"e_1_3_2_1_26_1","first-page":"5548","volume-title":"MaskGAN: Towards Diverse and Interactive Facial Image Manipulation. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019","author":"Lee Cheng-Han","year":"2019","unstructured":"Cheng-Han Lee, Ziwei Liu, Lingyun Wu, and Ping Luo. 2019. MaskGAN: Towards Diverse and Interactive Facial Image Manipulation. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), 5548-5557. https:\/\/api.semanticscholar.org\/CorpusID:198967908"},{"key":"e_1_3_2_1_27_1","volume-title":"FaceShifter: Towards High Fidelity And Occlusion Aware Face Swapping. ArXiv","author":"Li Lingzhi","year":"2019","unstructured":"Lingzhi Li, Jianmin Bao, Hao Yang, Dong Chen, and Fang Wen. 2019. FaceShifter: Towards High Fidelity And Occlusion Aware Face Swapping. ArXiv, Vol. abs\/1912.13457 (2019). https:\/\/api.semanticscholar.org\/CorpusID:209515957"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_1_29_1","unstructured":"Shanchuan Lin and Xiao Yang. 2024. AnimateDiff-Lightning: Cross-Model Diffusion Distillation. arXiv:2403.12706 [cs.CV]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01609"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_1_32_1","unstructured":"Midjourney. 2022. Midjourney. https:\/\/www.midjourney.com\/home."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00939"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"e_1_3_2_1_35_1","unstructured":"Open AI. 2023. DALL\u00b7E. https:\/\/openai.com\/index\/dall-e-3."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/ssqu.13242"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00872"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616588"},{"key":"e_1_3_2_1_40_1","volume-title":"First Order Motion Model for Image Animation. In Conference on Neural Information Processing Systems (NeurIPS).","author":"Siarohin Aliaksandr","year":"2019","unstructured":"Aliaksandr Siarohin, St\u00e9phane Lathuili\u00e8re, Sergey Tulyakov, Elisa Ricci, and Nicu Sebe. 2019. First Order Motion Model for Image Animation. In Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_41_1","volume-title":"Motion Supervised co-part Segmentation. arXiv preprint","author":"Siarohin Aliaksandr","year":"2020","unstructured":"Aliaksandr Siarohin, Subhankar Roy, St\u00e9phane Lathuili\u00e8re, Sergey Tulyakov, Elisa Ricci, and Nicu Sebe. 2020. Motion Supervised co-part Segmentation. arXiv preprint (2020)."},{"key":"e_1_3_2_1_42_1","unstructured":"Haixu Song Shiyu Huang Yinpeng Dong and Wei-Wei Tu. 2023. Robustness and Generalizability of Deepfake Detection: A Study with Diffusion Models. arXiv:2309.02218 [cs.CV] https:\/\/arxiv.org\/abs\/2309.02218"},{"key":"e_1_3_2_1_43_1","unstructured":"Stability.ai. 2024. Stable Diffusion. https:\/\/stability.ai\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01602"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2024.3487482"},{"key":"e_1_3_2_1_46_1","unstructured":"ultralytics. 2020. YoloV5. https:\/\/github.com\/ultralytics\/yolov5."},{"key":"e_1_3_2_1_47_1","volume-title":"Benchmarking Deepart Detection. ArXiv","author":"Wang Yabin","year":"2023","unstructured":"Yabin Wang, Zhiwu Huang, and Xiaopeng Hong. 2023b. Benchmarking Deepart Detection. ArXiv, Vol. abs\/2302.14475 (2023). https:\/\/api.semanticscholar.org\/CorpusID:257232722"},{"key":"e_1_3_2_1_48_1","first-page":"22388","volume-title":"DIRE for Diffusion-Generated Image Detection. 2023 IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Wang Zhendong","year":"2023","unstructured":"Zhendong Wang, Jianmin Bao, Wen gang Zhou, Weilun Wang, Hezhen Hu, Hong Chen, and Houqiang Li. 2023a. DIRE for Diffusion-Generated Image Detection. 2023 IEEE\/CVF International Conference on Computer Vision (ICCV) (2023), 22388-22398. https:\/\/api.semanticscholar.org\/CorpusID:257557819"},{"key":"e_1_3_2_1_49_1","first-page":"29387","volume-title":"Zhang (Eds.)","volume":"37","author":"Yan Zhiyuan","year":"2024","unstructured":"Zhiyuan Yan, Taiping Yao, Shen Chen, Yandan Zhao, Xinghe Fu, Junwei Zhu, Donghao Luo, Chengjie Wang, Shouhong Ding, Yunsheng Wu, and Li Yuan. 2024. DF40: Toward Next-Generation Deepfake Detection. In Advances in Neural Information Processing Systems, A. Globerson, L. Mackey, D. Belgrave, A. Fan, U. Paquet, J. Tomczak, and C. Zhang (Eds.), Vol. 37. Curran Associates, Inc., 29387-29434. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2024\/file\/34239f60eca7ce9bee5280aaf81362d8-Paper-Datasets_and_Benchmarks_Track.pdf"},{"key":"e_1_3_2_1_50_1","volume-title":"MagicTime: Time-lapse Video Generation Models as Metamorphic Simulators. arXiv preprint arXiv:2404.05014","author":"Yuan Shenghai","year":"2024","unstructured":"Shenghai Yuan, Jinfa Huang, Yujun Shi, Yongqi Xu, Ruijie Zhu, Bin Lin, Xinhua Cheng, Li Yuan, and Jiebo Luo. 2024. MagicTime: Time-lapse Video Generation Models as Metamorphic Simulators. arXiv preprint arXiv:2404.05014 (2024)."},{"key":"e_1_3_2_1_51_1","volume-title":"A Cascade Sequence-to-Sequence Model for Chinese Mandarin Lip Reading. ACM","author":"Zhao Ya","year":"2019","unstructured":"Ya Zhao, Rui Xu, and Mingli Song. 2019. A Cascade Sequence-to-Sequence Model for Chinese Mandarin Lip Reading. ACM (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"e_1_3_2_1_53_1","unstructured":"Mingjian Zhu Hanting Chen Qiangyu Yan Xudong Huang Guanyu Lin Wei Li Zhijun Tu Hailin Hu Jie Hu and Yunhe Wang. 2023. GenImage: A Million-Scale Benchmark for Detecting AI-Generated Image. arXiv:2306.08571 [cs.CV]"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3758194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:14:06Z","timestamp":1765307646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3758194"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":54,"alternative-id":["10.1145\/3746027.3758194","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3758194","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}