{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T01:01:32Z","timestamp":1774400492829,"version":"3.50.1"},"reference-count":42,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057029","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:32:04Z","timestamp":1733970724000},"page":"4285-4305","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":7,"title":["Advancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media"],"prefix":"10.32604","volume":"81","author":[{"given":"Dunya Ahmed","family":"Alkurdi","sequence":"first","affiliation":[]},{"given":"Mesut","family":"Cevik","sequence":"additional","affiliation":[]},{"given":"Abdurrahim","family":"Akgundogdu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"89","article-title":"DeepFake detection using transfer learning-based Xception model","volume":"8","author":"Rajakumareswaran","year":"Jun. 2024","journal-title":"Adv. Inf. Syst."},{"key":"ref2","series-title":"2020 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","article-title":"Celeb-DF: A large-scale challenging dataset for deepfake forensics","author":"Li","year":"Jun. 2020"},{"key":"ref3","series-title":"2016 IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","article-title":"Face2Face: Real-time face capture and reenactment of RGB videos","author":"Thies","year":"Jun. 2016"},{"key":"ref4","article-title":"Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection","volume":"13","author":"Ahmed","year":"2023","journal-title":"Soft Comput."},{"key":"ref5","series-title":"2020 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","article-title":"DeeperForensics-1.0: A large-scale dataset for real-world face forgery detection","author":"Jiang","year":"Jun. 2020"},{"key":"ref6","series-title":"2018 15th IEEE Int. Conf. Adv. Video Signal Based Surveill. (AVSS)","article-title":"Deepfake video detection using recurrent neural networks","author":"Guera","year":"2018"},{"key":"ref7","series-title":"2020 IEEE Int. Workshop Inf. Forensics Secur. (WIFS)","article-title":"Detecting deep-fake videos from appearance and behavior","author":"Agarwal","year":"Dec. 2020"},{"key":"ref8","article-title":"Analysis on capsule networks to detect forged images and videos","volume":"7","author":"Mukesh","year":"Jan. 2023","journal-title":"Int. J. Sci. Res. Eng. Manag."},{"key":"ref9","series-title":"2019 IEEE 10th Int. Conf. Biometr. Theory, Appl. Syst. (BTAS)","article-title":"Multi-task learning for detecting and segmenting manipulated facial images and videos","author":"Nguyen","year":"Sep. 2019"},{"key":"ref10","series-title":"ICASSP 2019\u20142019 IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)","article-title":"Capsule-forensics: Using capsule networks to detect forged images and videos","author":"Nguyen","year":"May 2019"},{"key":"ref11","series-title":"2021 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","article-title":"Spatial-phase shallow learning: rethinking face forgery detection in frequency domain","author":"Liu","year":"Jun. 2021"},{"key":"ref12","series-title":"2021 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","article-title":"Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection","author":"Li","year":"Jun. 2021"},{"key":"ref13","series-title":"2021 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW)","article-title":"FReTAL: Generalizing deepfake detection using knowledge distillation and representation learning","author":"Kim","year":"Jun. 2021"},{"key":"ref14","series-title":"2020 IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW)","article-title":"OC-FakeDect: Classifying deepfakes using one-class variational autoencoder","author":"Khalid","year":"2020"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103239","article-title":"Dynamic texture analysis for detecting fake faces in video sequences","volume":"79","author":"Bonomi","year":"Aug. 2021, Art. no. 103239","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref16","series-title":"IEEE\/CVF Int. Conf. Comput. Vis. Workshop (ICCVW)","article-title":"Deepfake video detection through optical flow based CNN","author":"Amerini","year":"Oct. 2019"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2021.103170","article-title":"Fake face detection via adaptive manipulation traces extraction network","volume":"204","author":"Guo","year":"Mar. 2021, Art. no. 103170","journal-title":"Comput. Vis. Image Underst."},{"key":"ref18","series-title":"2018 IEEE Int. Workshop Inf. Forensics Secur. (WIFS)","article-title":"MesoNet: A compact facial video forgery detection network","author":"Afchar","year":"Dec. 2018"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.3390\/jimaging7100193","article-title":"Detection of manipulated face videos over social networks: A large-scale study","volume":"7","author":"Marcon","year":"Sep. 2021, Art. no. 193","journal-title":"J. Imaging"},{"key":"ref20","series-title":"2020 25th Int. Conf. Pattern Recognit. (ICPR)","article-title":"Video face manipulation detection through ensemble of CNNs","author":"Bonettini","year":"2020"},{"key":"ref21","series-title":"2021 IEEE Int. Conf. Multimed. Expo (ICME)","article-title":"Videoforensicshq: Detecting high-quality manipulated face videos","author":"Fox","year":"Jul. 2021"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103119","article-title":"Detecting facial manipulated videos based on set convolutional neural networks","volume":"77","author":"Xu","year":"May 2021, Art. no. 103119","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref23","series-title":"2020 IEEE Int. Conf. Syst., Man, Cybern. (SMC)","article-title":"Violence detection in videos using deep recurrent and convolutional neural networks","author":"Traore","year":"Oct. 2020"},{"key":"ref24","series-title":"15th IEEE Int. Conf. Autom. Face Gesture Recognit. (FG 2020)","article-title":"A video is worth more than 1000 lies. Comparing 3DCNN approaches for detecting deepfakes","author":"Wang","year":"Nov. 2020"},{"key":"ref25","series-title":"IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","article-title":"FaceForensics++: Learning to detect manipulated facial images","author":"Rossler","year":"Oct. 2019"},{"key":"ref26","series-title":"2020 IEEE Symp. Ser. Computat. Intell. (SSCI)","article-title":"DeepFake detection on publicly available datasets using modified AlexNet","author":"Xie","year":"Dec. 2020"},{"key":"ref27","first-page":"1","article-title":"Enhancing the fight against social media misinformation: An ensemble deep learning framework for detecting deepfakes","volume":"12","author":"Aloke","year":"Nov. 2023","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13570","article-title":"A review of deep learning-based approaches for deepfake content detection","volume":"41","author":"Passos","year":"Feb. 2024","journal-title":"Expert. Syst."},{"key":"ref29","first-page":"1","article-title":"Deep learning based fake news detection on social media","volume":"12","author":"G\u00fcler","year":"Jun. 2023","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"ref30","series-title":"Int. Conf. Comput. Data Sci. (ICCDS)","article-title":"Deep fake image classification engine using inception-ResNet-V1 network","author":"Kothandaraman","year":"Apr. 2024"},{"key":"ref31","series-title":"Proc. 31st ACM Int. Conf. Multimed.","article-title":"Spatio-temporal catcher: A self-supervised transformer for deepfake video detection","author":"Li","year":"Oct. 2023"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"16977","DOI":"10.1007\/s11042-023-16196-x","article-title":"Convolutional long short-term memory-based approach for deepfakes detection from videos","volume":"83","author":"Nawaz","year":"Jul. 2023","journal-title":"Multimed. Tools Appl."},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123732","article-title":"DeepFake detection based on high-frequency enhancement network for highly compressed content","volume":"249","author":"Gao","year":"Sep. 2024, Art. no. 123732","journal-title":"Expert. Syst. Appl."},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103684","article-title":"An adversarial attack approach for eXplainable AI evaluation on deepfake detection models","volume":"139","author":"Gowrisankar","year":"Apr. 2024, Art. no. 103684","journal-title":"Comput. Secur."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1007\/s13204-021-02072-3","article-title":"Deepfake detection using rationale-augmented convolutional neural network","volume":"13","author":"Ahmed","year":"Sep. 2021","journal-title":"Appl. Nanosci."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/3065386","article-title":"ImageNet classification with deep convolutional neural networks","volume":"60","author":"Krizhevsky","year":"May 2017","journal-title":"Commun. ACM"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.aasri.2014.05.013","article-title":"Comparison of regularization methods for ImageNet classification with deep convolutional neural networks","volume":"6","author":"Smirnov","year":"2014","journal-title":"AASRI Procedia"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.neunet.2018.03.016","article-title":"Biased dropout and crossmap dropout: Learning towards effective Dropout regularization in convolutional neural network","volume":"104","author":"Poernomo","year":"Aug. 2018","journal-title":"Neural Netw."},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.3389\/fnins.2021.773954","article-title":"Revisiting batch normalization for training low-latency deep spiking neural networks from scratch","volume":"15","author":"Kim","year":"Dec. 2021","journal-title":"Front. Neurosci."},{"key":"ref40","series-title":"2017 IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"1251","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"Chollet","year":"Jul. 2017"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1007\/s11760-020-01664-w","article-title":"Composition-preserving deep approach to full-reference image quality assessment","volume":"14","author":"Varga","year":"Mar. 2020","journal-title":"Signal Image Video Process."},{"key":"ref42","series-title":"2022 Int. Congress Hum.\u2014Comput. Interaction, Optimization Robot. Appl. (HORA)","article-title":"Analysis survey on deepfake detection and recognition with convolutional neural networks","author":"Ahmed","year":"2022"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59036\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:05:43Z","timestamp":1741327543000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057029","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-07","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}