{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:14:49Z","timestamp":1770754489645,"version":"3.50.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"name":"National Key Research and Development Program of China","award":["2021YFF0602102"],"award-info":[{"award-number":["2021YFF0602102"]}]},{"name":"Key Science and Technology Research Project of Xinjiang Production and Construction Corps","award":["2025AB029"],"award-info":[{"award-number":["2025AB029"]}]},{"name":"Hubei Provincial Science and Technology Plan Project","award":["2025CSA057"],"award-info":[{"award-number":["2025CSA057"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62371350, 62171324, 62372339"],"award-info":[{"award-number":["62371350, 62171324, 62372339"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>The deepfake-based face swapping technique poses significant risks to personal identity security. Although many detection methods have been proposed to counter malicious face swapping, they typically provide only binary labels (Fake\/Real), lacking reliable and interpretable evidence. To address this limitation, we introduce a novel task called face retracing, which aims to visually trace back the original target face from a given fake one through inverse mapping. This task is based on the observation that current face swapping methods are neither flawless nor entirely random, leaving recoverable traces of the original identity. To this end, we propose IDRetracor, a model designed to recover arbitrary original target identities from fake faces generated by various face swapping techniques. Specifically, we first employ a mapping resolver to estimate the possible solution space of the original face for inverse mapping. Then, we introduce Mapping-Aware Convolutions (MACs), which consist of multiple dynamically combined kernels guided by the mapping resolver to adaptively handle diverse face swapping patterns. Extensive experiments demonstrate that IDRetracor achieves strong performance in retracing original faces, validated by both quantitative metrics and qualitative assessments.<\/jats:p>","DOI":"10.1145\/3774429","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T10:57:05Z","timestamp":1762167425000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["IDRetracor: Towards Visual Forensics against Malicious Face Swapping"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6549-6148","authenticated-orcid":false,"given":"Jikang","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4303-7749","authenticated-orcid":false,"given":"Jiaxin","family":"Ai","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1862-4781","authenticated-orcid":false,"given":"Zhen","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8287-8655","authenticated-orcid":false,"given":"Chao","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7955-0782","authenticated-orcid":false,"given":"Qin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9867-0798","authenticated-orcid":false,"given":"Zhongyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2,10]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715138"},{"key":"e_1_3_2_3_2","unstructured":"Jiaxin Ai Zhongyuan Wang Baojin Huang and Zhen Han. 2022. Deepfake face traceability with disentangling reversing network. arXiv:2207.03666. Retrieved from https:\/\/arxiv.org\/abs\/2207.03666"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_3_2_5_2","first-page":"67","volume-title":"IEEE International Conference on Automatic Face and Gesture Recognition (FG)","author":"Cao Qiong","year":"2018","unstructured":"Qiong Cao, Li Shen, Weidi Xie, Omkar M. Parkhi, and Andrew Zisserman. 2018. Vggface2: A dataset for recognising faces across pose and age. In IEEE International Conference on Automatic Face and Gesture Recognition (FG). IEEE, 67\u201374."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_7_2","first-page":"2003","volume-title":"ACM International Conference on Multimedia (MM)","author":"Chen Renwang","year":"2020","unstructured":"Renwang Chen, Xuanhong Chen, Bingbing Ni, and Yanhao Ge. 2020. Simswap: An efficient framework for high fidelity face swapping. In ACM International Conference on Multimedia (MM), 2003\u20132011."},{"key":"e_1_3_2_8_2","first-page":"11030","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Chen Yinpeng","year":"2020","unstructured":"Yinpeng Chen, Xiyang Dai, Mengchen Liu, Dongdong Chen, Lu Yuan, and Zicheng Liu. 2020. Dynamic convolution: Attention over convolution kernels. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 11030\u201311039."},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"21979","DOI":"10.52202\/079017-0691","article-title":"Can we leave deepfake data behind in training deepfake detector","volume":"37","author":"Cheng Jikang","year":"2024","unstructured":"Jikang Cheng, Zhiyuan Yan, Ying Zhang, Yuhao Luo, Zhongyuan Wang, and Chen Li. 2024. Can we leave deepfake data behind in training deepfake detector? Advances in Neural Information Processing Systems 37 (2024), 21979\u201321998.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2025.3588323"},{"key":"e_1_3_2_11_2","first-page":"15108","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Cozzolino Davide","year":"2021","unstructured":"Davide Cozzolino, Andreas R\u00f6ssler, Justus Thies, Matthias Nie\u00dfner, and Luisa Verdoliva. 2021. Id-reveal: Identity-aware deepfake video detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision, 15108\u201315117."},{"key":"e_1_3_2_12_2","unstructured":"DeepFakes. 2019. Deepfakes. Retrieved March 1 2021 from https:\/\/github.com\/deepfakes\/faceswap"},{"key":"e_1_3_2_13_2","first-page":"4690","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Deng Jiankang","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 4690\u20134699."},{"key":"e_1_3_2_14_2","first-page":"3994","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Dong Shichao","year":"2023","unstructured":"Shichao Dong, Jin Wang, Renhe Ji, Jiajun Liang, Haoqiang Fan, and Zheng Ge. 2023. Implicit identity leakage: The stumbling block to improving deepfake detection generalization. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 3994\u20134004."},{"key":"e_1_3_2_15_2","first-page":"3247","volume-title":"International Conference on Machine Learning (ICML)","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Thorsten Eisenhofer, Lea Sch\u00f6nherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz. 2020. Leveraging frequency analysis for deep fake image recognition. In International Conference on Machine Learning (ICML), 3247\u20133258."},{"key":"e_1_3_2_16_2","first-page":"3404","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Gao Gege","year":"2021","unstructured":"Gege Gao, Huaibo Huang, Chaoyou Fu, Zhaoyang Li, and Ran He. 2021. Information bottleneck disentanglement for identity swapping. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 3404\u20133413."},{"key":"e_1_3_2_17_2","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv:1412.6572. Retrieved from https:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_18_2","first-page":"770","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 770\u2013778."},{"key":"e_1_3_2_19_2","first-page":"4490","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Huang Baojin","year":"2023","unstructured":"Baojin Huang, Zhongyuan Wang, Jifan Yang, Jiaxin Ai, Qin Zou, Qian Wang, and Dengpan Ye. 2023. Implicit identity driven deepfake face swapping detection. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 4490\u20134499."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3592615"},{"key":"e_1_3_2_21_2","first-page":"2356","volume-title":"IEEE International Conference on Image Processing (ICIP)","author":"Jia Shan","year":"2022","unstructured":"Shan Jia, Xin Li, and Siwei Lyu. 2022. Model attribution of face-swap deepfake videos. In IEEE International Conference on Image Processing (ICIP). IEEE, 2356\u20132360."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643030"},{"key":"e_1_3_2_23_2","unstructured":"Tero Karras Timo Aila Samuli Laine and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality stability and variation. arXiv:1710.10196. Retrieved from https:\/\/arxiv.org\/abs\/1710.10196"},{"key":"e_1_3_2_24_2","first-page":"4401","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Karras Tero","year":"2019","unstructured":"Tero Karras, Samuli Laine, and Timo Aila. 2019. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 4401\u20134410."},{"key":"e_1_3_2_25_2","unstructured":"Diederik P. and Kingma Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_26_2","first-page":"5001","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Li Lingzhi","year":"2020","unstructured":"Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, and Baining Guo. 2020. Face x-ray for more general face forgery detection. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 5001\u20135010."},{"key":"e_1_3_2_27_2","first-page":"3207","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Li Yuezun","year":"2020","unstructured":"Yuezun Li, Xin Yang, Pu Sun, Honggang Qi, and Siwei Lyu. 2020. Celeb-df: A large-scale challenging dataset for deepfake forensics. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 3207\u20133216."},{"issue":"11","key":"e_1_3_2_28_2","first-page":"1","article-title":"Detecting deepfake videos using spatiotemporal trident network","volume":"0","author":"Lin Kaihan","year":"2024","unstructured":"Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, and Yangyang Mei. 2024. Detecting deepfake videos using spatiotemporal trident network. ACM Transactions on Multimedia Computing, Communications and Applications 0, 11 (2024), 1\u201320.","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"e_1_3_2_29_2","first-page":"8578","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Liu Zhian","year":"2023","unstructured":"Zhian Liu, Maomao Li, Yong Zhang, Cairong Wang, Qi Zhang, Jue Wang, and Yongwei Nie. 2023. Fine-grained face swapping via regional gan inversion. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 8578\u20138587."},{"key":"e_1_3_2_30_2","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083. Retrieved from https:\/\/arxiv.org\/abs\/1706.06083"},{"issue":"5","key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/JSTSP.2020.3007250","article-title":"Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection","volume":"14","author":"Neves Jo\u00e3o C.","year":"2020","unstructured":"Jo\u00e3o C. Neves, Ruben Tolosana, Ruben Vera-Rodriguez, Vasco Lopes, Hugo Proen\u00e7a, and Julian Fierrez. 2020. Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection. IEEE Journal of Selected Topics in Signal Processing 14, 5 (2020), 1038\u201310484.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_33_2","first-page":"1","volume-title":"IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Rossler Andreas","year":"2019","unstructured":"Andreas Rossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Niessner. 2019. Faceforensics++: Learning to detect manipulated facial images. In IEEE\/CVF International Conference on Computer Vision (ICCV), 1\u201311."},{"key":"e_1_3_2_34_2","first-page":"712","volume-title":"European Conference on Computer Vision (ECCV)","author":"Shao Rui","year":"2022","unstructured":"Rui Shao, Tianxing Wu, and Ziwei Liu. 2022. Detecting and recovering sequential deepfake manipulation. In European Conference on Computer Vision (ECCV). Springer, 712\u2013728."},{"key":"e_1_3_2_35_2","first-page":"7634","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Shiohara Kaede","year":"2023","unstructured":"Kaede Shiohara, Xingchao Yang, and Takafumi Taketomi. 2023. Blendface: Re-designing identity encoders for face-swapping. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), 7634\u20137644."},{"key":"e_1_3_2_36_2","unstructured":"Pu Sun Honggang Qi Yuezun Li and Siwei Lyu. 2023. Faketracer: Catching face-swap deepfakes via implanting traces in training. arXiv:2307.14593. Retrieved from https:\/\/arxiv.org\/abs\/2307.14593"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_38_2","first-page":"5265","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Wang Hao","year":"2018","unstructured":"Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou, Zhifeng Li, and Wei Liu. 2018. Cosface: Large margin cosine loss for deep face recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 5265\u20135274."},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"3546","DOI":"10.1145\/3474085.3475518","volume-title":"Proceedings of the 29th ACM International Conference on Multimedia (MM)","author":"Wang Run","year":"2021","unstructured":"Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, and Lina Wang. 2021. Faketagger: Robust safeguards against deepfake dissemination via provenance tracking. In Proceedings of the 29th ACM International Conference on Multimedia (MM), 3546\u20133555."},{"issue":"6","key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3588574","article-title":"Deep convolutional pooling transformer for deepfake detection","volume":"19","author":"Wang Tianyi","year":"2023","unstructured":"Tianyi Wang, Harry Cheng, Kam Pui Chow, and Liqiang Nie. 2023. Deep convolutional pooling transformer for deepfake detection. ACM Transactions on Multimedia Computing, Communications and Applications 19, 6 (2023), 1\u201320.","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"e_1_3_2_41_2","unstructured":"Tianyi Wang Harry Cheng Xiao Zhang and Yinglong Wang. 2025. Nullswap: Proactive identity cloaking against deepfake face swapping. arXiv:2503.18678. Retrieved from https:\/\/arxiv.org\/abs\/2503.18678"},{"key":"e_1_3_2_42_2","first-page":"14548","volume-title":"Proceedings of the 37th AAAI Conference on Artificial Intelligence","author":"Wang Tianyi","year":"2023","unstructured":"Tianyi Wang and Kam Pui Chow. 2023. Noise based deepfake detection via multi-head relative-interaction. In Proceedings of the 37th AAAI Conference on Artificial Intelligence, 14548\u201314556."},{"key":"e_1_3_2_43_2","unstructured":"Tianyi Wang Mengxiao Huang Harry Cheng Bin Ma and Yinglong Wang. 2023. Robust identity perceptual watermark against deepfake face swapping. arXiv:2311.01357. Retrieved from https:\/\/arxiv.org\/abs\/2311.01357"},{"issue":"3","key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3699710","article-title":"Deepfake detection: A comprehensive survey from the reliability perspective","volume":"57","author":"Wang Tianyi","year":"2024","unstructured":"Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, and Yinglong Wang. 2024. Deepfake detection: A comprehensive survey from the reliability perspective. ACM Computing Surveys 57, 3 (2024), 1\u201335.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Yuhan Wang Chen Xu Junwei Zhu Wenqing Chu Ying Tai Chengjie Wang Jilin Li Yongjian Wu Feiyue Huang and Rongrong Ji. 2021. Hififace: 3d shape and semantic prior guided high fidelity face swapping. arXiv:2106.09965. Retrieved from https:\/\/arxiv.org\/abs\/2106.09965","DOI":"10.24963\/ijcai.2021\/157"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3361151"},{"key":"e_1_3_2_47_2","first-page":"661","volume-title":"European Conference on Computer Vision (ECCV)","author":"Xu Zhiliang","year":"2022","unstructured":"Zhiliang Xu, Hang Zhou, Zhibin Hong, Ziwei Liu, Jiaming Liu, Zhizhi Guo, Junyu Han, Jingtuo Liu, Errui Ding, and Jingdong Wang. 2022. Styleswap: Style-based generator empowers robust face swapping. In European Conference on Computer Vision (ECCV). Springer, 661\u2013677."},{"key":"e_1_3_2_48_2","unstructured":"Zhiyuan Yan Taiping Yao Shen Chen Yandan Zhao Xinghe Fu Junwei Zhu Donghao Luo Chengjie Wang Shouhong Ding Yunsheng Wu et al. 2024. Df40: Toward next-generation deepfake detection. arXiv:2406.13495. Retrieved from https:\/\/arxiv.org\/abs\/2406.13495"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20391"},{"key":"e_1_3_2_50_2","first-page":"7556","volume-title":"IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Yu Ning","year":"2019","unstructured":"Ning Yu, Larry S. Davis, and Mario Fritz. 2019. Attributing fake images to gans: Learning and analyzing gan fingerprints. In IEEE\/CVF International Conference on Computer Vision (ICCV), 7556\u20137566."},{"key":"e_1_3_2_51_2","first-page":"14448","volume-title":"IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Yu Ning","year":"2021","unstructured":"Ning Yu, Vladislav Skripniuk, Sahar Abdelnabi, and Mario Fritz. 2021. Artificial fingerprinting for generative models: Rooting deepfake attribution in training data. In IEEE\/CVF International Conference on Computer Vision (ICCV), 14448\u201314457."},{"key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/TIFS.2022.3146781","article-title":"Improving generalization by commonality learning in face forgery detection","volume":"17","author":"Yu Peipeng","year":"2022","unstructured":"Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, and Jian Weng. 2022. Improving generalization by commonality learning in face forgery detection. IEEE Transactions on Information Forensics and Security 17 (2022), 547\u2013558.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_3_2_54_2","first-page":"4602","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","author":"Zhao Yuan","year":"2023","unstructured":"Yuan Zhao, Bo Liu, Ming Ding, Baoping Liu, Tianqing Zhu, and Xin Yu. 2023. Proactive deepfake defence via identity watermarking. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), 4602\u20134611."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_56_2","first-page":"4834","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Zhu Yuhao","year":"2021","unstructured":"Yuhao Zhu, Qi Li, Jian Wang, Cheng-Zhong Xu, and Zhenan Sun. 2021. One shot face swapping on megapixels. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 4834\u20134844."},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-82223-y"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3774429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T14:22:42Z","timestamp":1770733362000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,10]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3774429"],"URL":"https:\/\/doi.org\/10.1145\/3774429","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,10]]},"assertion":[{"value":"2025-06-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}