{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:19:25Z","timestamp":1773001165660,"version":"3.50.1"},"reference-count":48,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"vor","delay-in-days":12,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372334"],"award-info":[{"award-number":["62372334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3106900"],"award-info":[{"award-number":["2023YFB3106900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>The pervasive prevalence of DeepFakes poses a profound threat to individual privacy and the stability of society. Believing the synthetic videos of a celebrity and trumping up impersonated forgery videos as authentic are just a few consequences generated by DeepFakes. We investigate current detectors that blindly deploy deep learning techniques that are not effective in capturing subtle clues of forgery when generative models produce remarkably realistic faces. Inspired by the fact that synthetic operations inevitably modify the regions of eyes and mouth to match the target face with the identity or expression of the source face, we conjecture that the continuity of facial movement patterns representing expressions that existed in the veritable faces will be disrupted or completely broken in synthetic faces, making it a potentially formidable indicator for DeepFake detection. To prove this conjecture, we utilize a dual\u2010branch network to capture the inconsistent patterns of facial movements within eyes and mouth regions separately. Extensive experiments on popular FaceForensics++, Celeb\u2010DF\u2010v1, Celeb\u2010DF\u2010v2, and DFDC\u2010Preview datasets have demonstrated not only effectiveness but also the robust capability of our method to outperform the state\u2010of\u2010the\u2010art baselines. Moreover, this work represents greater robustness against adversarial attacks, achieving ASR of 54.8% in the I\u2010FGSM attack and 43.1% in the PGD attack on the DeepFakes dataset of FaceForensics++, respectively.<\/jats:p>","DOI":"10.1155\/int\/7945646","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T07:03:50Z","timestamp":1736751830000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Exposing the Forgery Clues of DeepFakes via Exploring the Inconsistent Expression Cues"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9730-7110","authenticated-orcid":false,"given":"Jiatong","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2842-5137","authenticated-orcid":false,"given":"Run","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4893-3665","authenticated-orcid":false,"given":"Jianpeng","family":"Ke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8546-9737","authenticated-orcid":false,"given":"Xi","family":"Ye","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6779-4226","authenticated-orcid":false,"given":"Yadi","family":"Wu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,1,13]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"crossref","unstructured":"OlszewskiK. LiZ. YangC.et al. Realistic Dynamic Facial Textures From a Single Image Using Gans Proceedings of the IEEE International Conference on Computer Vision 2017 5429\u20135438.","DOI":"10.1109\/ICCV.2017.580"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22726"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3253390"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109179"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2023.05.029"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2020.3009287"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"RosslerA. CozzolinoD. VerdolivaL. RiessC. ThiesJ. andNiessnerM. Faceforensics++: Learning to Detect Manipulated Facial Images Proceedings of the IEEE\/CVF International Conference on Computer Vision 2019 1\u201311 https:\/\/doi.org\/10.1109\/iccv.2019.00009.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22285"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22391"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22932"},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"HuangQ. KatsmanI. HeH. GuZ. BelongieS. andLimS. N. Enhancing Adversarial Example Transferability With an Intermediate Level Attack Proceedings of the IEEE\/CVF International Conference on Computer Vision 2019 4733\u20134742.","DOI":"10.1109\/ICCV.2019.00483"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"ChiangP. Y. GeipingJ. GoldblumM.et al. Witchcraft: Efficient PGD Attacks With Random Step Size ICASSP 2020-2020 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) 2020 3747\u20133751.","DOI":"10.1109\/ICASSP40776.2020.9052930"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"ShioharaK.andYamasakiT. Detecting DeepFakes With Self-Blended Images Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2022 18720\u201318729.","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109847"},{"key":"e_1_2_11_15_2","doi-asserted-by":"crossref","unstructured":"HaliassosA. VougioukasK. PetridisS. andPanticM. Lips Don\u2019t Lie: A Generalisable and Robust Approach to Face Forgery Etection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 5039\u20135049.","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"e_1_2_11_16_2","unstructured":"KarrasT. AilaT. LaineS. andLehtinenJ. Progressive Growing of Gans for Improved Quality Stability and Variation."},{"key":"e_1_2_11_17_2","doi-asserted-by":"crossref","unstructured":"KarrasT. LaineS. andAilaT. A Style-Based Generator Architecture for Generative Adversarial Networks Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2019 4401\u20134410.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_2_11_18_2","doi-asserted-by":"crossref","unstructured":"ChoiY. ChoiM. KimM.et al. Stargan: Unified Generative Adversarial Networks for Multi-Domain Image-To-Image Translation Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2018 8789\u20138797.","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2019.2916751"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"ZhangY. ZhengL. andThingV. L. L. Automated Face Swapping and its Detection 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP) 2017 15\u201319 https:\/\/doi.org\/10.1109\/siprocess.2017.8124497 2-s2.0-85043457720.","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"e_1_2_11_21_2","unstructured":"FaceSwap 2016 https:\/\/github.com\/DeepFakes\/faceswap."},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"ThiesJ. ZollhoferM. StammingerM. TheobaltC. andNiessnerM. Face2face: Real-Time Face Capture and Reenactment of Rgb Videos 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016 2387\u20132395 https:\/\/doi.org\/10.1109\/cvpr.2016.262 2-s2.0-84986308411.","DOI":"10.1109\/CVPR.2016.262"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"AfcharD. NozickV. YamagishiJ. andEchizenI. Mesonet: A Compact Facial Video Forgery Detection Network 2018 IEEE International Workshop on Information Forensics and Security (WIFS) 2018 1\u20137 https:\/\/doi.org\/10.1109\/wifs.2018.8630761 2-s2.0-85058542365.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"LiL. BaoJ. ZhangT.et al. Face X-Ray for More General Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2020 5001\u20135010.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_2_11_25_2","doi-asserted-by":"crossref","unstructured":"ZhaoH. WeiT. ZhouW. ZhangW. ChenD. andYuN. Multi-attentional DeepFake Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 2185\u20132194 https:\/\/doi.org\/10.1109\/cvpr46437.2021.00222.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3186803"},{"key":"e_1_2_11_27_2","doi-asserted-by":"crossref","unstructured":"CaoJ. MaC. YaoT. ChenS. DingS. andYangX. End-to-End Reconstruction-Classification Learning for Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2022 4113\u20134122.","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i2.27829"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"G\u00fceraD.andDelpE. J. DeepFake Video Detection Using Recurrent Neural Networks 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2018 1\u20136 https:\/\/doi.org\/10.1109\/avss.2018.8639163 2-s2.0-85063065209.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"GuZ. YaoT. ChenY.et al. Hierarchical Contrastive Inconsistency Learning for DeepFake Video Detection European Conference on Computer Vision 2022 Springer Nature Switzerland Cham Switzerland 596\u2013613.","DOI":"10.1007\/978-3-031-19775-8_35"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"MittalT. BhattacharyaU. ChandraR. BeraA. andManochaD. Emotions Don\u2019t Lie: An Audio-Visual DeepFake Detection Method Using Affective Cues Proceedings of the 28th ACM International Conference on Multimedia 2020 2823\u20132832 https:\/\/doi.org\/10.1145\/3394171.3413570.","DOI":"10.1145\/3394171.3413570"},{"key":"e_1_2_11_32_2","doi-asserted-by":"crossref","unstructured":"HoslerB. SalviD. MurrayA.et al. Do DeepFakes Feel Emotions? A Semantic Approach to Detecting DeepFakes via Emotional Inconsistencies Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 1013\u20131022 https:\/\/doi.org\/10.1109\/cvprw53098.2021.00112.","DOI":"10.1109\/CVPRW53098.2021.00112"},{"key":"e_1_2_11_33_2","doi-asserted-by":"crossref","unstructured":"LiM. LiuB. HuY. andWangY. Exposing DeepFake Videos by Tracking Eye Movements 2020 25th International Conference on Pattern Recognition (ICPR) 2021 5184\u20135189.","DOI":"10.1109\/ICPR48806.2021.9413139"},{"key":"e_1_2_11_34_2","doi-asserted-by":"crossref","unstructured":"RuanB. K. LoL. ShuaiH. H. andChengW. H. Mimicking the Annotation Process for Recognizing the Micro Expressions Proceedings of the 30th ACM International Conference on Multimedia 2022 228\u2013236 https:\/\/doi.org\/10.1145\/3503161.3548185.","DOI":"10.1145\/3503161.3548185"},{"key":"e_1_2_11_35_2","doi-asserted-by":"crossref","unstructured":"QinW. ZouB. LiX. WangW. andMaH. Micro-Expression Spotting With Face Alignment and Optical Flow Proceedings of the 31st ACM International Conference on Multimedia 2023 9501\u20139505 https:\/\/doi.org\/10.1145\/3581783.3612853.","DOI":"10.1145\/3581783.3612853"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep Residual Learning for Image Recognition Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2016 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22774"},{"key":"e_1_2_11_38_2","doi-asserted-by":"crossref","unstructured":"LiY. YangX. SunP. QiH. andLyauS. Celeb-df: A Large-Scale Challenging Dataset for DeepFake Forensics Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2020 3207\u20133216.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_2_11_39_2","unstructured":"DolhanskyB. HowesR. PflaumB. BaramN. andFerrerC. C. The DeepFake Detection Challenge (dfdc) Preview Dataset 2019."},{"key":"e_1_2_11_40_2","doi-asserted-by":"crossref","unstructured":"MasiI. KillekarA. MascarenhasR. M.et al. Two-Branch Recurrent Network for Isolating DeepFakes in Videos Computer Vision\u2013ECCV 2020: 16th European Conference Glasgow UK August 23\u201328 2020 Proceedings Part VII 16 2020 Springer International Publishing 667\u2013684.","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"e_1_2_11_41_2","doi-asserted-by":"crossref","unstructured":"QianY. YinG. ShengL.et al. Thinking in Frequency: Face Forgery Detection by Mining Frequency-Aware Clues European Conference on Computer Vision 2020 Springer International Publishing Cham Switzerland 86\u2013103.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"e_1_2_11_42_2","doi-asserted-by":"crossref","unstructured":"ZhangD. LiC. LinF. ZengD. andGeS. Detecting DeepFake Videos With Temporal Dropout 3DCNN Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI-21) 2021 1288\u20131294 https:\/\/doi.org\/10.24963\/ijcai.2021\/178.","DOI":"10.24963\/ijcai.2021\/178"},{"key":"e_1_2_11_43_2","doi-asserted-by":"crossref","unstructured":"FungS. LuX. ZhangC. andLiC. T. DeepFakeucl: DeepFake Detection via Unsupervised Contrastive Learning 2021 International Joint Conference on Neural Networks (IJCNN) 2021 1\u20138 https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534089.","DOI":"10.1109\/IJCNN52387.2021.9534089"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22499"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"e_1_2_11_46_2","doi-asserted-by":"crossref","unstructured":"GuZ. YaoT. ChenY. YiR. DingS. andMaL. Region-Aware Temporal Inconsistency Learning for DeepFake Video Detection Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence (IJCAI-22) 2022 920\u2013926 https:\/\/doi.org\/10.24963\/ijcai.2022\/129.","DOI":"10.24963\/ijcai.2022\/129"},{"key":"e_1_2_11_47_2","doi-asserted-by":"crossref","unstructured":"JiangL. LiR. WuW. QianC. andLoyC. C. Deeperforensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2020 2889\u20132898.","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2024.3441821"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/7945646","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/7945646","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/7945646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T17:54:41Z","timestamp":1772992481000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/7945646"}},"subtitle":[],"editor":[{"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/7945646"],"URL":"https:\/\/doi.org\/10.1155\/int\/7945646","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-08-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7945646"}}