{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T01:29:00Z","timestamp":1774574940351,"version":"3.50.1"},"reference-count":66,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2024,7]]},"abstract":"<jats:p> In high-stakes settings, Machine Learning models that can provide predictions that are interpretable for humans are crucial. This is even more true with the advent of complex deep learning based models with a huge number of tunable parameters. Recently, prototype-based methods have emerged as a promising approach to make deep learning interpretable. We particularly focus on the analysis of deepfake videos in a forensics context. Although prototype-based methods have been introduced for the detection of deepfake videos, their use in real-world scenarios still presents major challenges, in that prototypes tend to be overly similar and interpretability varies between prototypes. This paper proposes a Visual Analytics process model for prototype learning, and, based on this, presents ProtoExplorer, a Visual Analytics system for the exploration and refinement of prototype-based deepfake detection models. ProtoExplorer offers tools for visualizing and temporally filtering prototype-based predictions when working with video data. It disentangles the complexity of working with spatio-temporal prototypes, facilitating their visualization. It further enables the refinement of models by interactively deleting and replacing prototypes with the aim to achieve more interpretable and less biased predictions while preserving detection accuracy. The system was designed with forensic experts and evaluated in a number of rounds based on both open-ended think aloud evaluation and interviews. These sessions have confirmed the strength of our prototype-based exploration of deepfake videos while they provided the feedback needed to continuously improve the system. <\/jats:p>","DOI":"10.1177\/14738716241238476","type":"journal-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T07:10:11Z","timestamp":1713337811000},"page":"239-257","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["ProtoExplorer: Interpretable forensic analysis of deepfake videos using prototype exploration and refinement"],"prefix":"10.1177","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3743-9618","authenticated-orcid":false,"given":"Merel de Leeuw den","family":"Bouter","sequence":"first","affiliation":[{"name":"Informatics Institute, University of Amsterdam, Amsterdam, The Netherlands"},{"name":"Netherlands Forensic Institute, Den Haag, The Netherlands"}]},{"given":"Javier Lloret","family":"Pardo","sequence":"additional","affiliation":[{"name":"Informatics Institute, University of Amsterdam, Amsterdam, The Netherlands"}]},{"given":"Zeno","family":"Geradts","sequence":"additional","affiliation":[{"name":"Informatics Institute, University of Amsterdam, Amsterdam, The Netherlands"},{"name":"Netherlands Forensic Institute, Den Haag, The Netherlands"}]},{"given":"Marcel","family":"Worring","sequence":"additional","affiliation":[{"name":"Informatics Institute, University of Amsterdam, Amsterdam, The Netherlands"}]}],"member":"179","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"bibr1-14738716241238476","author":"Perov I","year":"2020","journal-title":"arXiv preprint arXiv:200505535"},{"key":"bibr2-14738716241238476","unstructured":"Reface. \u2014 Face swap videos, https:\/\/reface.ai\/ (accessed 12 March 2024)."},{"key":"bibr3-14738716241238476","unstructured":"Avatarify. \u2014 Bring your photos to life, https:\/\/avatarify.ai\/ (accessed 12 March 2024)."},{"key":"bibr4-14738716241238476","author":"Dolhansky B","year":"2020","journal-title":"arXiv preprint arXiv:200607397"},{"key":"bibr5-14738716241238476","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"bibr6-14738716241238476","first-page":"1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Rossler A"},{"key":"bibr7-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"bibr8-14738716241238476","first-page":"618","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Selvaraju R"},{"key":"bibr9-14738716241238476","first-page":"63","volume-title":"Proceedings of Artificial Neural Networks and Machine Learning (ICANN)","author":"Binder A"},{"key":"bibr10-14738716241238476","first-page":"3145","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Shrikumar A"},{"key":"bibr11-14738716241238476","first-page":"3319","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Sundararajan M"},{"key":"bibr12-14738716241238476","first-page":"1135","volume-title":"Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","author":"Ribeiro M"},{"key":"bibr13-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13200"},{"key":"bibr14-14738716241238476","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-1994-7104"},{"key":"bibr15-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1214\/21-SS133"},{"key":"bibr16-14738716241238476","volume-title":"Human problem solving","author":"Newell A","year":"1972"},{"key":"bibr17-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1995.7.2.408"},{"key":"bibr18-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(92)90102-O"},{"key":"bibr19-14738716241238476","volume-title":"Information visualization. Perception for design","author":"Ware C","year":"2004"},{"key":"bibr20-14738716241238476","first-page":"1973","volume-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision","author":"Trinh L"},{"key":"bibr21-14738716241238476","first-page":"3530","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"Li O"},{"key":"bibr22-14738716241238476","volume":"32","author":"Chen C","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"key":"bibr23-14738716241238476","first-page":"141","volume-title":"2011 IEEE Conference on Visual Analytics Science and Technology (VAST)","author":"Migut M"},{"key":"bibr24-14738716241238476","first-page":"286","volume-title":"2020 IEEE Visualization Conference (VIS)","author":"Zhao J"},{"key":"bibr25-14738716241238476","first-page":"448","volume-title":"2020 International Conference on Data Mining Workshops (ICDMW)","author":"Das S"},{"key":"bibr26-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744878"},{"key":"bibr27-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744718"},{"key":"bibr28-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030418"},{"key":"bibr29-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865044"},{"key":"bibr30-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2021.09.002"},{"issue":"1","key":"bibr31-14738716241238476","volume":"7","author":"Yuan J","year":"2021","journal-title":"Comput Vis Media"},{"key":"bibr32-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934267"},{"key":"bibr33-14738716241238476","first-page":"45","volume-title":"2022 IEEE Visualization and Visual Analytics (VIS)","author":"Munechika D"},{"key":"bibr34-14738716241238476","first-page":"50","volume-title":"2022 IEEE Visualization and Visual Analytics (VIS)","author":"Kwon B"},{"key":"bibr35-14738716241238476","volume":"210500558","author":"Trinh L","year":"2021","journal-title":"arXiv preprint arXiv"},{"key":"bibr36-14738716241238476","volume-title":"Interpretable machine learning","author":"Molnar C","year":"2022","edition":"2"},{"key":"bibr37-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2018.07.007"},{"key":"bibr38-14738716241238476","volume":"31","author":"Adebayo J","year":"2018","journal-title":"Adv Neural Inf Process Syst"},{"key":"bibr39-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3114837"},{"key":"bibr40-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01469"},{"key":"bibr41-14738716241238476","first-page":"32","volume-title":"Proceedings of the AAAI Conference on Human Computation and Crowdsourcing","volume":"7","author":"Hase P"},{"key":"bibr42-14738716241238476","first-page":"10265","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Donnelly J"},{"key":"bibr43-14738716241238476","first-page":"15719","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Kim E"},{"key":"bibr44-14738716241238476","first-page":"903","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Ming Y"},{"key":"bibr45-14738716241238476","first-page":"1064","volume":"26","author":"Spinner T","year":"2020","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"bibr46-14738716241238476","first-page":"30","volume-title":"2020 IEEE Symposium on Visualization for Cyber Security (VizSec)","author":"Alperin K"},{"key":"bibr47-14738716241238476","first-page":"51","volume-title":"2020 IEEE Pacific Visualization Symposium (PacificVis)","author":"Wang J"},{"key":"bibr48-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934659"},{"key":"bibr49-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030350"},{"key":"bibr50-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3114836"},{"key":"bibr51-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3209462"},{"key":"bibr52-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2983686"},{"key":"bibr53-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346481"},{"key":"bibr54-14738716241238476","volume-title":"Visual analytics: definition, process, and challenges","author":"Keim D","year":"2008"},{"key":"bibr55-14738716241238476","volume-title":"Visual thinking for design","author":"Ware C","year":"2008"},{"key":"bibr56-14738716241238476","volume":"180203426","author":"McInnes L","year":"2018","journal-title":"arXiv preprint arXiv"},{"key":"bibr57-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109172"},{"key":"bibr58-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"bibr59-14738716241238476","first-page":"1385","volume-title":"Proceedings of the IEEE international conference on computer vision","author":"Weinzaepfel P"},{"key":"bibr60-14738716241238476","first-page":"248","volume-title":"2009 IEEE Conference on Computer Vision and Pattern Recognition","author":"Deng J"},{"key":"bibr61-14738716241238476","unstructured":"Deepfakes GitHub, https:\/\/github.com\/deepfakes\/faceswap (accessed 12 March 2024)."},{"key":"bibr62-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"bibr63-14738716241238476","unstructured":"Faceswap GitHub, https:\/\/github.com\/MarekKowalski\/FaceSwap\/ (accessed 12 March 2024)."},{"key":"bibr64-14738716241238476","first-page":"2387","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"Thies J"},{"key":"bibr65-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"bibr66-14738716241238476","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-052029-2.50007-3"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716241238476","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14738716241238476","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716241238476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T14:02:35Z","timestamp":1740751355000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14738716241238476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10.1177\/14738716241238476"],"URL":"https:\/\/doi.org\/10.1177\/14738716241238476","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"value":"1473-8716","type":"print"},{"value":"1473-8724","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]}}}