{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:20:19Z","timestamp":1774891219816,"version":"3.50.1"},"reference-count":245,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061427","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:43:26Z","timestamp":1747284206000},"page":"153-236","source":"Crossref","is-referenced-by-count":3,"title":["A Contemporary and Comprehensive Bibliometric Exposition on Deepfake Research and Trends"],"prefix":"10.32604","volume":"84","author":[{"given":"Akanbi","family":"Bolakale AbdulQudus","sequence":"first","affiliation":[]},{"given":"Oluwatosin Ahmed","family":"Amodu","sequence":"additional","affiliation":[]},{"given":"Umar Ali","family":"Bukar","sequence":"additional","affiliation":[]},{"given":"Raja Azlina Raja","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Anies","family":"Faziehan Zakaria","sequence":"additional","affiliation":[]},{"given":"Saki-Ogah","family":"Queen","sequence":"additional","affiliation":[]},{"given":"Zurina Mohd","family":"Hanapi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Forum WE. Global risks 2024: disinformation tops global risks 2024 as environmental threats intensify. [Internet]. [cited 2025 Apr 6]. Available from: https:\/\/www.weforum.org\/press\/2024\/01\/global-risks-report-2024-press-release\/."},{"key":"ref2","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, et al. Generative adversarial networks. arXiv:1406.2661. 2014."},{"key":"ref3","first-page":"1753","article-title":"Deep fakes: a looming challenge for privacy, democracy, and national security","volume":"107","author":"Chesney","year":"2019","journal-title":"Calif L Rev"},{"key":"ref4","article-title":"advanced sciences and technologies for security applications","author":"Pantserev","year":"2020","journal-title":"Cyber defence in the age of AI, smart societies and augmented humanity"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"143296","DOI":"10.1109\/ACCESS.2023.3342107","article-title":"Deepfake generation and detection: case study and challenges","volume":"11","author":"Patel","year":"2023","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-22552-9","author":"Pashentsev","year":"2023","journal-title":"The Palgrave handbook of malicious use of AI and psychological security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s12027-024-00780-1","article-title":"Virtual unreality: potential implications of deepfake technology for the course of justice","volume":"24","author":"Brown","year":"2023","journal-title":"ERA Forum"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.22215\/timreview\/1282","article-title":"The emergence of deepfake technology: a review","volume":"9","author":"Westerlund","year":"2019","journal-title":"Technol Innov Manag Rev"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"154718","DOI":"10.1109\/ACCESS.2024.3477257","article-title":"A review of deepfake techniques: architecture, detection and datasets","volume":"12","author":"Edwards","year":"2024","journal-title":"IEEE Access"},{"key":"ref10","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3207","article-title":"Celeb-df: a large-scale challenging dataset for deepfake forensics","author":"Li","year":"2020"},{"key":"ref11","series-title":"Proceedings of the 28th ACM International Conference on Multimedia","first-page":"2382","article-title":"Wilddeepfake: a challenging real-world dataset for deepfake detection","author":"Zi","year":"2020"},{"key":"ref12","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"91","article-title":"On improving cross-dataset generalization of deepfake detectors","author":"Nadimpalli","year":"2022"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"6259","DOI":"10.1007\/s11042-021-11733-y","article-title":"Deepfake generation and detection, a survey","volume":"81","author":"Zhang","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref14","first-page":"e1520","article-title":"Deepfake detection using deep learning methods: a systematic and comprehensive review","volume":"14","author":"Heidari","year":"2024","journal-title":"Wiley Interdiscip Rev: Data Mini Knowl Discov"},{"key":"ref15","first-page":"235","author":"Caporusso","year":"2021","journal-title":"Advances in artificial intelligence, software and systems engineering"},{"key":"ref16","series-title":"2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"10034","article-title":"One-shot free-view neural talking-head synthesis for video conferencing","author":"Wang","year":"2020"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/s10462-023-10679-x","article-title":"Deepfakes: current and future trends","volume":"57","author":"Gamb\u00edn","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake detection: a systematic literature review","volume":"10","author":"Rana","year":"2022","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","article-title":"How to conduct a bibliometric analysis: an overview and guidelines","volume":"133","author":"Donthu","year":"2021","journal-title":"J Bus Res"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"87579","DOI":"10.1007\/s11042-024-18706-x","article-title":"A review on deepfake generation and detection: bibliometric analysis","volume":"83","author":"Kaushal","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref21","first-page":"1","author":"Bisht","year":"2024","journal-title":"Navigating the world of deepfake technology"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1080\/0144929X.2016.1212403","article-title":"What is the role of IT in innovation? A bibliometric analysis of research development in IT innovation","volume":"35","author":"Zhang","year":"2016","journal-title":"Behav Inf Technol"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"120227","DOI":"10.1109\/ACCESS.2021.3092192","article-title":"Bibliometric analysis of the blockchain scientific evolution: 2014\u20132020","volume":"9","author":"Luo","year":"2021","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s11192-019-03170-4","article-title":"The rise of \u201cblockchain\u201d: bibliometric analysis of blockchain study","volume":"120","author":"Firdaus","year":"2019","journal-title":"Scientometrics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"11025","DOI":"10.1007\/s10639-022-11071-y","article-title":"Twenty-five years of education and information technologies: insights from a topic modeling based bibliometric analysis","volume":"27","author":"Ozyurt","year":"2022","journal-title":"Educ Inform Technol"},{"key":"ref26","first-page":"102307","article-title":"Forty years of the international journal of information management: a bibliometric analysis","volume":"57","author":"Donthu","year":"2021","journal-title":"Int J Inf Manag"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-030-02511-3_7","author":"Moral-Mu\u00f1oz","year":"2019","journal-title":"Springer handbook of science and technology indicators"},{"key":"ref28","series-title":"Advances in intelligent systems and computing","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1007\/978-3-030-39512-4_93","article-title":"A counterattack of misinformation: how the information influence to human being","volume":"1131","author":"Lee","year":"2020"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"525","DOI":"10.3390\/info15090525","article-title":"Living in the age of deepfakes: a bibliometric exploration of trends, challenges, and detection approaches","volume":"15","author":"Domenteanu","year":"2024","journal-title":"Information"},{"key":"ref30","series-title":"Advances in computer graphics","article-title":"Seeing is no longer believing: a survey on the state of deepfakes, AI-generated humans, and other nonveridical media","volume":"14496","author":"Pocol","year":"2024"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"11295","DOI":"10.1007\/s00500-023-08605-y","article-title":"Deepfakes: evolution and trends","volume":"27","author":"Gil","year":"2023","journal-title":"Soft Comput"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"471","DOI":"10.17509\/ijost.v7i3.51449","article-title":"Research mapping in the use of technology for fake news detection: bibliometric analysis from 2011 to 2021","volume":"7","author":"Gunawan","year":"2022","journal-title":"Indones J Sci Technol"},{"key":"ref33","unstructured":"Lu Y, Liu J, Zhang R. Current status and trends in image anti-forensics research: a bibliometric analysis. arXiv: 240811365. 2024."},{"key":"ref34","article-title":"A bibliometric analysis of deepfakes: trends, applications and challenges","volume":"11","author":"Garg","year":"2024","journal-title":"EAI Endorsed Trans Scalable Inf Syst"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"e202242","DOI":"10.30935\/ojcmt\/12545","article-title":"A bibliometric analysis of disinformation through social media","volume":"12","author":"Akram","year":"2022","journal-title":"Online J Commun Media Technol"},{"key":"ref36","series-title":"2023 8th International Conference on Smart and Sustainable Technologies (SpliTech)","first-page":"1","article-title":"Digital forensics investigation models: current state and analysis","author":"Ivanova","year":"2023"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3390\/publications9010012","article-title":"Web of Science (WoS) and Scopus: the titans of bibliographic information in today\u2019s academic world","volume":"9","author":"Pranckut\u0117","year":"2021","journal-title":"Publications"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"102339","DOI":"10.1016\/j.mex.2023.102339","article-title":"A method for analyzing text using VOSviewer","volume":"11","author":"Bukar","year":"2023","journal-title":"MethodsX"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","article-title":"Software survey: VOSviewer, a computer program for bibliometric mapping","volume":"84","author":"Eck","year":"2010","journal-title":"Scientometrics"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-319-10377-8_13","author":"Van Eck","year":"2014","journal-title":"Measuring scholarly impact: Methods and practice"},{"key":"ref41","first-page":"1","article-title":"A criteria-based assessment of the coverage of scopus and web of science","volume":"4","author":"Aksnes","year":"2019","journal-title":"J Data Inf Sci"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"5113","DOI":"10.1007\/s11192-021-03948-5","article-title":"The journal coverage of Web of Science, Scopus and Dimensions: a comparative analysis","volume":"126","author":"Singh","year":"2021","journal-title":"Scientometrics"},{"key":"ref43","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"e1000097","DOI":"10.1371\/journal.pmed.1000097","article-title":"Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement","volume":"6","author":"Moher","year":"2007","journal-title":"PLoS Med"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"91","DOI":"10.31449\/inf.v47i7.4783","article-title":"An exploratory bibliometric analysis of the literature on the age of information-aware unmanned aerial vehicles aided communication","volume":"47","author":"Bukar","year":"2023","journal-title":"Informatica"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"121201","DOI":"10.1016\/j.techfore.2021.121201","article-title":"Data intelligence and analytics: a bibliometric analysis of human-Artificial intelligence in public sector decision-making effectiveness","volume":"174","author":"Vaio","year":"2022","journal-title":"Technol Forecast Soc Change"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"120896","DOI":"10.1016\/j.techfore.2021.120896","article-title":"Bibliometric analysis of technology adoption literature published from 1997 to 2020","volume":"170","author":"Xu","year":"2021","journal-title":"Technol Forecast Soc Change"},{"key":"ref48","series-title":"2019 IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"1","article-title":"FaceForensics++: learning to detect manipulated facial images","author":"Rossler","year":"2019"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes generation and detection: state-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2023","journal-title":"Appl Intell"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"18","DOI":"10.3390\/jimaging9010018","article-title":"Deepfakes generation and detection: a short survey","volume":"9","author":"Akhtar","year":"2023","journal-title":"J Imaging"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"Miao","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref52","first-page":"32","article-title":"AVFakeNet: a unified end-to-end Dense Swin Transformer deep learning model for audio-visual deepfakes detection","volume":"136","author":"Hafsa","year":"2023","journal-title":"Appl Soft Comput J"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TIFS.2023.3239223","article-title":"ISTVT: interpretable spatial-temporal video transformer for deepfake detection","volume":"18","author":"Zhao","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1109\/TIFS.2023.3249566","article-title":"Masked relation learning for deepfake detection","volume":"18","author":"Yang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref55","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4490","article-title":"Implicit identity driven deepfake face swapping detection","author":"Huang","year":"2023"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"7512","DOI":"10.1007\/s10489-022-03867-9","article-title":"Deepfake detection algorithm based on improved vision transformer","volume":"53","author":"Heo","year":"2023","journal-title":"Appl Intell"},{"key":"ref57","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3994","article-title":"Implicit identity leakage: the stumbling block to improving deepfake detection generalization","author":"Dong","year":"2023"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/TASLP.2023.3285283","article-title":"Asvspoof 2021: towards spoofed and deepfake speech detection in the wild","volume":"31","author":"Liu","year":"2023","journal-title":"IEEE\/ACM Trans Audio, Speech, Lang Process"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1109\/TIFS.2023.3262148","article-title":"AVoiD-DF: audio-visual joint learning for detecting deepfake","volume":"18","author":"Yang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref60","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7278","article-title":"Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection","author":"Wang","year":"2023"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1109\/TCSVT.2022.3209336","article-title":"Learning features of intra-consistency and inter-diversity: keys toward generalizable deepfake detection","volume":"33","author":"Chen","year":"2022","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"7236","DOI":"10.1109\/TCSVT.2023.3278310","article-title":"FAMM: facial muscle motions for detecting compressed deepfake videos over social networks","volume":"33","author":"Liao","year":"2023","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/TCSVT.2022.3217950","article-title":"Artifacts-disentangled adversarial learning for deepfake detection","volume":"33","author":"Li","year":"2022","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"4272","DOI":"10.1109\/TIFS.2023.3293951","article-title":"FedForgery: generalized face forgery detection with residual federated learning","volume":"18","author":"Liu","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"103895","DOI":"10.1016\/j.dsp.2022.103895","article-title":"DeepFake detection with multi-scale convolution and vision transformer","volume":"134","author":"Lin","year":"2023","journal-title":"Digit Signal Process"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"67443","DOI":"10.1007\/s11042-024-18217-9","article-title":"A lightweight feature extraction technique for deepfake audio detection","volume":"83","author":"Chakravarty","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3390\/e22020249","article-title":"A novel counterfeit feature extraction technique for exposing face-swap images based on deep learning and error level analysis","volume":"22","author":"Zhang","year":"2020","journal-title":"Entropy"},{"key":"ref68","series-title":"2020 IEEE International Conference on Image Processing (ICIP)","first-page":"1326","article-title":"Feature extraction for visual speaker authentication against computer-generated video attacks","author":"Ma","year":"2020"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"66565","DOI":"10.1007\/s11042-023-18104-9","article-title":"An improved feature extraction for Hindi language audio impersonation attack detection","volume":"83","author":"Chakravarty","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"2783","DOI":"10.1007\/s00371-024-03567-0","article-title":"Deep fake detection using an optimal deep learning model with multi head attention-based feature extraction scheme","volume":"41","author":"Sekar","year":"2025","journal-title":"Vis Comput"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"9037","DOI":"10.3390\/s23229037","article-title":"Detection of AI-created images using pixel-wise feature extraction and convolutional neural networks","volume":"23","author":"Martin-Rodriguez","year":"2023","journal-title":"Sensors"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1049\/ipr2.12657","article-title":"MSFRNet: two-stream deep forgery detector via multi-scale feature extraction","volume":"17","author":"Yu","year":"2023","journal-title":"IET Image Process"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"11518","DOI":"10.1109\/TII.2023.3246992","article-title":"Verifiable privacy-enhanced rotation invariant LBP feature extraction in fog computing","volume":"19","author":"Bian","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"643424","DOI":"10.3389\/frai.2021.643424","article-title":"MagNet: detecting digital presentation attacks on face recognition","volume":"4","author":"Agarwal","year":"2021","journal-title":"Front Artif Intell"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2023.3234978","article-title":"Evaluating trustworthiness and racial bias in face recognition apis using deepfakes","volume":"56","author":"Tariq","year":"2023","journal-title":"Computer"},{"key":"ref76","series-title":"2021 International Carnahan Conference on Security Technology (ICCST)","first-page":"1","article-title":"An experimental evaluation on deepfake detection using deep face recognition","author":"Ramachandran","year":"2021"},{"key":"ref77","first-page":"101115","article-title":"Deep fake video face recognition using supervised contrastive learning for scalability and interpretability","volume":"19","author":"Alshehri","year":"2024","journal-title":"Arab J Sci Eng"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.3390\/brainsci13091233","article-title":"Real and deepfake face recognition: an EEG study on cognitive and emotive implications","volume":"13","author":"Tarchi","year":"2023","journal-title":"Brain Sci"},{"key":"ref79","series-title":"2020 25th International Conference on Pattern Recognition (ICPR)","first-page":"9827","article-title":"An experimental evaluation of recent face recognition losses for deepfake detection","author":"Liu","year":"2021"},{"key":"ref80","series-title":"Proceedings of the ACM Web Conference 2022","first-page":"512","article-title":"Am I a real or fake celebrity? Evaluating face recognition and verification APIs under deepfake impersonation attack","author":"Tariq","year":"2022"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"e881","DOI":"10.7717\/peerj-cs.881","article-title":"Deep learning model for deep fake face recognition and detection","volume":"8","author":"Suganthi","year":"2022","journal-title":"PeerJ Comput Sci"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/jimaging7040069","article-title":"A comprehensive review of deep-learning-based methods for image forensics","volume":"7","author":"Castillo Camacho","year":"2021","journal-title":"J Imaging"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1561\/0600000096","article-title":"Deep learning for multimedia forensics","volume":"12","author":"Amerini","year":"2021","journal-title":"Foundations Trends\u00ae Comput Graph Vis"},{"key":"ref84","doi-asserted-by":"crossref","unstructured":"Yadav A, Vishwakarma DK. Datasets, clues and state-of-the-arts for multimedia forensics: an extensive review. arXiv:2401.06999. 2024.","DOI":"10.1016\/j.eswa.2024.123756"},{"key":"ref85","series-title":"Proceedings of the 2nd ACM International Workshop on Multimedia AI against Disinformation","first-page":"2","article-title":"Multimedia Forensics versus disinformation in images and videos: lesson learnt and new challenges","author":"Caldelli","year":"2023"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.ins.2022.06.003","article-title":"Towards DeepFake video forensics based on facial textural disparities in multi-color channels","volume":"607","author":"Xia","year":"2022","journal-title":"Inf Sci"},{"key":"ref87","series-title":"Proceedings of the 27th ACM International Conference on Multimedia","first-page":"2701","article-title":"Multimedia forensics","author":"Verdoliva","year":"2019"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"109024","DOI":"10.1016\/j.compeleceng.2023.109024","article-title":"Deep learning model to detect deceptive generative adversarial network generated images using multimedia forensic","volume":"113","author":"Byeon","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/8388480","article-title":"Channel-wise spatiotemporal aggregation technology for face video forensics","volume":"2021","author":"Lu","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref90","doi-asserted-by":"crossref","unstructured":"Kwon P, You J, Nam G, Park S, Chae G. KoDF: a large-scale korean deepfake detection dataset. arXiv:2103.10094. 2021.","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","article-title":"Deep fake video detection using transfer learning approach","volume":"48","author":"Suratkar","year":"2023","journal-title":"Arab J Sci Eng"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1080\/23742917.2023.2192888","article-title":"A systematic literature review on the effectiveness of deepfake detection techniques","volume":"7","author":"Stroebel","year":"2023","journal-title":"J Cyber Secur Tech"},{"key":"ref93","unstructured":"Institute RAI. A look at global deepfake regulation approach [Internet]. [cited 2025 Apr 6]. Available from: https:\/\/www.responsible.ai\/a-look-at-global-deepfake-regulation-approaches\/."},{"key":"ref94","unstructured":"AI B. South Korea unveils unified AI act [Internet]. [cited 2025 Apr 6]. Available from: https:\/\/babl.ai\/south-korea-unveils-unified-ai-act\/."},{"key":"ref95","series-title":"2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)","first-page":"1","article-title":"Exploring deepfake detection: a comparative study of CNN models","author":"Chhikara","year":"2024"},{"key":"ref96","series-title":"2024 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Unveiling universal forensics of diffusion models with adversarial perturbations","author":"Xie","year":"2024"},{"key":"ref97","series-title":"2020 IEEE Symposium Series on Computational Intelligence (SSCI)","first-page":"1866","article-title":"DeepFake detection on publicly available datasets using modified AlexNet","author":"Xie","year":"2020"},{"key":"ref98","series-title":"Proceedings of ICC 2022\u2014IEEE International Conference on Communications","first-page":"2084","article-title":"A Heterogeneous feature ensemble learning-based deepfake detection method","author":"Zhang","year":"2022"},{"key":"ref99","series-title":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Ensemble learning model for face swap detection","author":"Samrouth","year":"2024"},{"key":"ref100","series-title":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"An innovative method for identifying deepfake videos through ensemble learning","author":"Keerthika","year":"2024"},{"key":"ref101","series-title":"2024 6th Novel Intelligent and Leading Emerging Sciences Conference (NILES)","first-page":"525","article-title":"Advancements in deepfake detection: leveraging Bi-LSTM-CNN architecture for robust identification","author":"Tantawy","year":"2024"},{"key":"ref102","series-title":"2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)","first-page":"1","article-title":"DeepFake videos detection and classification using resnext and LSTM neural network","author":"Patel","year":"2023"},{"key":"ref103","series-title":"2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI)","first-page":"1","article-title":"CNN-LSTM model for deepfake image detection","author":"Satpute","year":"2024"},{"key":"ref104","series-title":"2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC)","first-page":"1","article-title":"A Hybrid Xception-LSTM model with channel and spatial attention mechanism for deepfake video detection","author":"Dagar","year":"2023"},{"key":"ref105","series-title":"2021 IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE)","first-page":"236","article-title":"Deepfake video detection by combining convolutional neural network (CNN) and recurrent neural Network (RNN)","author":"Al-Dhabi","year":"2021"},{"key":"ref106","series-title":"2021 International Conference on Visual Communications and Image Processing (VCIP)","first-page":"1","article-title":"HCiT: deepfake video detection using a hybrid model of CNN features and vision transformer","author":"Kaddar","year":"2021"},{"key":"ref107","series-title":"2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)","first-page":"1","article-title":"A hybrid CNN-LSTM approach for deepfake audio detection","author":"Chitale","year":"2024"},{"key":"ref108","series-title":"2022 6th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)","first-page":"1","article-title":"Deepfake video detection using InceptionResnetV2","author":"Guefrechi","year":"2022"},{"key":"ref109","series-title":"2023 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE)","first-page":"1","article-title":"Deepfake detection using XceptionNet","author":"V","year":"2023"},{"key":"ref110","series-title":"2024 17th International Conference on Advanced Computer Theory and Engineering (ICACTE)","first-page":"180","article-title":"A deepfake face detection method using vision transformer with a convolutional module","author":"Liu","year":"2024"},{"key":"ref111","series-title":"2022 IEEE Bombay Section Signature Conference (IBSSC)","first-page":"1","article-title":"Realtime deepfake detection using video vision transformer","author":"Doshi","year":"2022"},{"key":"ref112","series-title":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","first-page":"178","article-title":"Research on text classification for identifying fake news","author":"Zhang","year":"2018"},{"key":"ref113","series-title":"2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","first-page":"282","article-title":"Classification of text on social media data using the TF-IDF approach, Word2Vec and transfer learning","author":"Lubis","year":"2023"},{"key":"ref114","series-title":"2023 17th International Conference on Electronics Computer and Computation (ICECCO)","first-page":"1","article-title":"Fake news classification using BLSTM with glove embedding","author":"Betul Polat","year":"2023"},{"key":"ref115","series-title":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","first-page":"400","article-title":"A hybrid LSTM-BERT and glove-based deep learning approach for the detection of fake news","author":"Saini","year":"2023"},{"key":"ref116","series-title":"2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","first-page":"1","article-title":"Predicting fake news using GloVe and BERT embeddings","author":"Kishwar","year":"2021"},{"key":"ref117","series-title":"2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)","first-page":"704","article-title":"Face detection under non-uniform low light based on improved MTCNN","author":"Bao","year":"2021"},{"key":"ref118","series-title":"2024 Innovations in Intelligent Systems and Applications Conference (ASYU)","first-page":"1","article-title":"BYOL yaklasimini kullanarak MTCNN ile Yakalanan Y\u00fczlerde Deepfake Tespiti Deepfake detection on faces captured with MTCNN, by using the BYOL approach","author":"K\u00fct\u00fck\u00e7\u00fc","year":"2024"},{"key":"ref119","series-title":"2024 19th Iranian Conference on Intelligent Systems (ICIS)","first-page":"68","article-title":"Comparing MTCNN and viola-jones algorithm in face recognition","author":"Bahmeie","year":"2024"},{"key":"ref120","series-title":"2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)","first-page":"95","article-title":"Face recognition based on MTCNN and integrated application of FaceNet and LBP method","author":"Yang","year":"2020"},{"key":"ref121","series-title":"2022 8th International Conference on Education and Technology (ICET)","first-page":"207","article-title":"Evaluation of concentration levels in learning using zoom meeting by applying the histogram of oriented gradients (HOG) method and support vector machine (SVM) classification","author":"Syarif","year":"2022"},{"key":"ref122","series-title":"2022 30th European Signal Processing Conference (EUSIPCO)","first-page":"643","article-title":"Improving deepfake detection by mixing top solutions of the DFDC","author":"Trabelsi","year":"2022"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"104673","DOI":"10.1016\/j.engappai.2022.104673","article-title":"DeepFakes detection across generations: analysis of facial regions, fusion, and performance evaluation","volume":"110","author":"Tolosana","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"72134","DOI":"10.1109\/ACCESS.2023.3286864","article-title":"Detecting fake audio of arabic speakers using self-supervised deep learning","volume":"11","author":"Almutairi","year":"2023","journal-title":"IEEE Access"},{"key":"ref125","series-title":"2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","first-page":"1","article-title":"A review of face anti-spoofing methods for face recognition systems","author":"Anthony","year":"2021"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"155","DOI":"10.3390\/a15050155","article-title":"A review of modern audio deepfake detection methods: challenges and future directions","volume":"15","author":"Almutairi","year":"2022","journal-title":"Algorithms"},{"key":"ref127","series-title":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","first-page":"1","article-title":"A review on anti-spoofing: face manipulation and liveness detection","author":"Kittur","year":"2023"},{"key":"ref128","series-title":"Proceedings of the 1st Workshop on Synthetic Multimedia\u2014Audiovisual Deepfake Generation and Detection","first-page":"17","article-title":"DmyT: dummy triplet loss for deepfake detection","author":"Beuve","year":"2021"},{"key":"ref129","first-page":"89","article-title":"Hierarchical learning and dummy triplet loss for efficient deepfake detection","volume":"20","author":"Beuve","year":"2023","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.neunet.2022.11.031","article-title":"Depth map guided triplet network for deepfake face detection","volume":"159","author":"Liang","year":"2023","journal-title":"Neural Netw"},{"key":"ref131","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"18710","article-title":"Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection","author":"Chen","year":"2022"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TBIOM.2022.3143404","article-title":"Improving generalization of deepfake detection with data farming and few-shot learning","volume":"4","author":"Korshunov","year":"2022","journal-title":"IEEE Trans Biometr, Behav, Identity Sci"},{"key":"ref133","series-title":"2024 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Learning meta model for strong generalization deepfake detection","author":"Huang","year":"2024"},{"key":"ref134","series-title":"Computer Vision\u2013ECCV 2020 Workshops","first-page":"236","article-title":"Disrupting deepfakes: adversarial attacks against conditional image translation networks and facial manipulation systems, Workshops","author":"Ruiz","year":"2020 Aug 23\u201328"},{"key":"ref135","series-title":"2024 Sixth International Conference on Intelligent Computing in Data Sciences (ICDS)","first-page":"1","article-title":"A comprehensive study of generative adversarial networks (GAN) and generative pre-trained transformers (GPT) in cybersecurity","author":"Ayyaz","year":"2024"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"2657","DOI":"10.1109\/TIFS.2022.3141262","article-title":"FakeLocator: robust localization of GAN-based face manipulations","volume":"17","author":"Huang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref137","series-title":"2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI)","first-page":"1540","article-title":"A DenseNet-Enhanced GAN model for classification of medical images into original and fake","author":"MeenaPrakash","year":"2025"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"86391","DOI":"10.1109\/ACCESS.2024.3416910","article-title":"Hybrid deep learning model based on GAN and RESNET for detecting fake faces","volume":"12","author":"Safwat","year":"2024","journal-title":"IEEE Access"},{"key":"ref139","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TTS.2024.3365421","article-title":"Analyzing fairness in deepfake detection with massively annotated databases","volume":"5","author":"Xu","year":"2024","journal-title":"IEEE Trans Technol Soc"},{"key":"ref140","doi-asserted-by":"crossref","first-page":"123471","DOI":"10.1016\/j.techfore.2024.123471","article-title":"Fake news or real? Detecting deepfake videos using geometric facial structure and graph neural network","volume":"205","author":"Saif","year":"2024","journal-title":"Technol Forecas Soc Change"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"5255","DOI":"10.1007\/s11263-024-02128-1","article-title":"Fine-grained multimodal deepfake classification via heterogeneous graphs","volume":"132","author":"Yin","year":"2024","journal-title":"Int J Comput Vis"},{"key":"ref142","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"20882","article-title":"Contrastive pseudo learning for open-world deepfake attribution","author":"Sun","year":"2023"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1109\/TLA.2023.10246346","article-title":"A study of algorithm-based detection of fake news in brazilian election: is BERT the best","volume":"21","author":"Souto Moreira","year":"2023","journal-title":"IEEE Lat Am Trans"},{"key":"ref144","series-title":"2024 10th International Conference on Web Research (ICWR)","first-page":"46","article-title":"Detecting fake news using advanced language models: BERT and RoBERTa","author":"Angizeh","year":"2024"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"14918","DOI":"10.1109\/ACCESS.2024.3354165","article-title":"Detection of Turkish fake news from tweets with BERT models","volume":"12","author":"Koru","year":"2024","journal-title":"IEEE Access"},{"key":"ref146","series-title":"2024 International Conference on Data Science and Its Applications (ICoDSA)","first-page":"225","article-title":"Classification of fake news on social media using BERT","author":"Martino","year":"2024"},{"key":"ref147","series-title":"2024 International Conference on IT and Industrial Technologies (ICIT)","first-page":"1","article-title":"Enhancing fake news detection using BERT: a comparative analysis of logistic regression, RFC, LSTM and BERT","author":"Ramzan","year":"2024"},{"key":"ref148","series-title":"2023 6th International Conference on Pattern Recognition and Image Analysis (IPRIA)","first-page":"1","article-title":"Bilingual COVID-19 fake news detection based on LDA topic modeling and BERT transformer","author":"Omrani","year":"2023"},{"key":"ref149","series-title":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","first-page":"312","article-title":"COVID-19 fake news detection by using BERT and RoBERTa models","author":"Pavlov","year":"2022"},{"key":"ref150","series-title":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","first-page":"64","article-title":"COVID-19 fake news detection using pre-tuned BERT-based transfer learning models","author":"Shrivastava","year":"2022"},{"key":"ref151","doi-asserted-by":"crossref","first-page":"11405","DOI":"10.1109\/ACCESS.2023.3241483","article-title":"Toward news authenticity: synthesizing natural language processing and human expert opinion to evaluate news","volume":"11","author":"Mahmud","year":"2023","journal-title":"IEEE Access"},{"key":"ref152","series-title":"2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY)","first-page":"215","article-title":"Impact of deepfake technology on children: risks and consequences","author":"Laczi","year":"2024"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"101944","DOI":"10.1016\/j.inffus.2023.101944","article-title":"MFIR: multimodal fusion and inconsistency reasoning for explainable fake news detection","volume":"100","author":"Wu","year":"2023","journal-title":"Inf Fusion"},{"key":"ref154","doi-asserted-by":"crossref","DOI":"10.31449\/inf.v48i8.5792","article-title":"DeepExplain: enhancing deepfake detection through transparent and explainable AI model","volume":"48","author":"Venkateswarulu","year":"2024","journal-title":"Informatica"},{"key":"ref155","doi-asserted-by":"crossref","first-page":"6705","DOI":"10.1109\/TCSS.2024.3404236","article-title":"Integrating social explanations into explainable artificial intelligence (XAI) for combating misinformation: vision and challenges","volume":"11","author":"Gong","year":"2024","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"725","DOI":"10.3390\/app15020725","article-title":"Explainable AI for deepfake detection","volume":"15","author":"Mansoor","year":"2025","journal-title":"Appl Sci"},{"key":"ref157","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"1613","article-title":"Deepfake text detection: limitations and opportunities","author":"Pu","year":"2023"},{"key":"ref158","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1007\/s42979-024-02809-1","article-title":"Towards data-and compute-efficient fake-news detection: an approach combining active learning and pre-trained language models","volume":"5","author":"Folino","year":"2024","journal-title":"SN Comput Sci"},{"key":"ref159","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3697349","article-title":"Multi-modal misinformation detection: approaches, challenges and opportunities","volume":"57","author":"Abdali","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref160","doi-asserted-by":"crossref","first-page":"103120","DOI":"10.1016\/j.ipm.2022.103120","article-title":"Multimodal fake news detection via progressive fusion networks","volume":"60","author":"Jing","year":"2023","journal-title":"Inf Process Manag"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s13278-023-01104-w","article-title":"Multimodal fake news detection on social media: a survey of deep learning techniques","volume":"13","author":"Comito","year":"2023","journal-title":"Soc Netw Anal Min"},{"key":"ref162","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s13735-023-00296-3","article-title":"A comprehensive survey of multimodal fake news detection techniques: advances, challenges, and opportunities","volume":"12","author":"Tufchi","year":"2023","journal-title":"Int J Multimed Inf Retr"},{"key":"ref163","first-page":"106","article-title":"Dynamic Graph convolutional network with time series-aware structural feature extraction for fake news detection","volume":"13","author":"Abe","year":"2025","journal-title":"ITE Trans Media Technol Appl"},{"key":"ref164","doi-asserted-by":"crossref","DOI":"10.1007\/s41060-025-00727-w","article-title":"A review of web infodemic analysis and detection trends across multi-modalities using deep neural network","author":"Meel","year":"2025","journal-title":"Int J Data Sci Anal"},{"key":"ref165","series-title":"Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics)","first-page":"177","article-title":"DeepFeatureX Net: deep features extractors based network for discriminating synthetic from real images","volume":"15321","author":"Pontorno","year":"2025"},{"key":"ref166","first-page":"151","article-title":"Advanced text vectorization and deep learning models for enhanced fake news detection on social medi","volume":"2329","author":"Kareem","year":"2025","journal-title":"Commun Comput Inf Sci"},{"key":"ref167","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-981-97-7839-3_7","article-title":"Ensemble-inspired multi-modal fusion of features for fake news detection on social media","volume":"1144","author":"Nikumbh","year":"2025","journal-title":"Lecture Notes Netw Syst"},{"key":"ref168","doi-asserted-by":"crossref","first-page":"449","DOI":"10.3390\/math13030449","article-title":"An optimized weighted-voting-based ensemble learning approach for fake news classification","volume":"13","author":"Toor","year":"2025","journal-title":"Mathematics"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"102993","DOI":"10.1016\/j.inffus.2025.102993","article-title":"Advances in DeepFake detection algorithms: exploring fusion techniques in single and multi-modal approach","volume":"118","author":"Kumar","year":"2025","journal-title":"Inf Fusion"},{"key":"ref170","first-page":"172","article-title":"Utilizing graph neural networks for the detection of fake news through analysis of relationships among various social media entities","volume":"2329","author":"Mahdi","year":"2025","journal-title":"Commun Comput Inf Sci"},{"key":"ref171","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/fi17010028","article-title":"Fake news detection and classification: a comparative study of convolutional neural networks, large language models, and natural language processing models","volume":"17","author":"Roumeliotis","year":"2025","journal-title":"Fut Internet"},{"key":"ref172","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1186\/s40537-025-01093-x","article-title":"A reasoning based explainable multimodal fake news detection for low resource language using large language models and transformers","volume":"12","author":"LekshmiAmmal","year":"2025","journal-title":"J Big Data"},{"key":"ref173","doi-asserted-by":"crossref","first-page":"129256","DOI":"10.1016\/j.neucom.2024.129256","article-title":"Spatio-temporal knowledge distilled video vision transformer (STKD-VViT) for multimodal deepfake detection","volume":"620","author":"Usmani","year":"2025","journal-title":"Neurocomputing"},{"key":"ref174","series-title":"CIKM \u201924: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","first-page":"2369","article-title":"Bots shield fake news: adversarial attack on user engagement based fake news detection","author":"Wang","year":"2024"},{"key":"ref175","series-title":"lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)","first-page":"296","article-title":"Making strides security in multimodal fake news detection models: a comprehensive analysis of adversarial attacks","volume":"15521","author":"Si","year":"2025"},{"key":"ref176","doi-asserted-by":"crossref","first-page":"110276","DOI":"10.1016\/j.engappai.2025.110276","article-title":"DeepEvader: an evasion tool for exposing the vulnerability of deepfake detectors using transferable facial distraction blackbox attack","volume":"145","author":"Ain","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"ref177","series-title":"2023 IEEE International Conference on Big Data (BigData)","first-page":"3614","article-title":"Clean-label poisoning attack against fake news detection models","author":"Liang","year":"2023"},{"key":"ref178","doi-asserted-by":"crossref","first-page":"106636","DOI":"10.1016\/j.neunet.2024.106636","article-title":"GazeForensics: deepFake detection via gaze-guided spatial inconsistency learning","volume":"180","author":"He","year":"2024","journal-title":"Neural Netw"},{"key":"ref179","series-title":"Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS 2024)","first-page":"391","article-title":"Detecting Deepfake modifications of biometric images using neural networks","author":"Dudykevych","year":"2024"},{"key":"ref180","doi-asserted-by":"crossref","first-page":"42","DOI":"10.3390\/jimaging11020042","article-title":"Dual-model synergy for fingerprint spoof detection using VGG16 and ResNet50","volume":"11","author":"Cheniti","year":"2025","journal-title":"J Imaging"},{"key":"ref181","series-title":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","first-page":"347","article-title":"Multi-armed-bandit-based shilling attack on collaborative filtering recommender systems","author":"Sundar","year":"2020"},{"key":"ref182","series-title":"Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems","first-page":"377","article-title":"A state of art survey on shilling attack in collaborative filtering based recommendation system","author":"Patel","year":"2016"},{"key":"ref183","first-page":"063030","article-title":"EnsembleDet: ensembling against adversarial attack on deepfake detection","volume":"30","author":"Dutta","year":"2021","journal-title":"J Electron Imaging"},{"key":"ref184","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3390\/computers13010031","article-title":"Multiclass ai-generated deepfake face detection using patch-wise deep learning model","volume":"13","author":"Arshed","year":"2024","journal-title":"Computers"},{"key":"ref185","series-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems. NIPS \u201923","first-page":"4534","article-title":"DeepfakeBench: a comprehensive benchmark of deepfake detection","author":"Yan","year":"2023"},{"key":"ref186","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1016\/j.procs.2024.04.090","article-title":"GAN-CNN ensemble: a robust deepfake detection model of social media images using minimized catastrophic forgetting and generative replay technique","volume":"235","author":"Sharma","year":"2024","journal-title":"Procedia Comput Sci"},{"key":"ref187","doi-asserted-by":"crossref","first-page":"184311","DOI":"10.1109\/ACCESS.2024.3506973","article-title":"Anomaly detection of deepfake audio based on real audio using generative adversarial network model","volume":"12","author":"Song","year":"2024","journal-title":"IEEE Access"},{"key":"ref188","series-title":"Adversarial Multimedia Forensics","first-page":"55","article-title":"Good or Evil: generative adversarial networks in digital forensics","author":"Veksler","year":"2023"},{"key":"ref189","doi-asserted-by":"crossref","first-page":"73","DOI":"10.3390\/jimaging11030073","article-title":"Deepfake Media Forensics: status and future challenges","volume":"11","author":"Amerini","year":"2025","journal-title":"J Imaging"},{"key":"ref190","series-title":"2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"1245","article-title":"Deepfake detection using svm","author":"Agarwal","year":"2021"},{"key":"ref191","series-title":"2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)","first-page":"598","article-title":"Efficientnets for deepfake detection: comparison of pretrained models","author":"Pokroy","year":"2021"},{"key":"ref192","first-page":"1","article-title":"Regularized forensic efficient net: a game theory based generalized approach for video deepfakes detection","volume":"53","author":"Ain","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref193","series-title":"2020 IEEE 17th India Council International Conference (INDICON)","first-page":"1","article-title":"Exposing deepfakes using convolutional neural networks and transfer learning approaches","author":"Suratkar","year":"2020"},{"key":"ref194","doi-asserted-by":"crossref","first-page":"271","DOI":"10.3233\/MGS-230033","article-title":"Adam Adadelta Optimization based bidirectional encoder representations from transformers model for fake news detection on social media","volume":"19","author":"TS","year":"2023","journal-title":"Multiagent Grid Syst"},{"key":"ref195","series-title":"2020 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Multi-modal cyberbullying detection on social networks","author":"Wang","year":"2020"},{"key":"ref196","doi-asserted-by":"crossref","first-page":"103239","DOI":"10.1016\/j.jvcir.2021.103239","article-title":"Dynamic texture analysis for detecting fake faces in video sequences","volume":"79","author":"Bonomi","year":"2021","journal-title":"J Vis Commun Image Represent"},{"key":"ref197","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops","first-page":"1205","article-title":"Deepfake video detection through optical flow based cnn","author":"Amerini","year":"2019"},{"key":"ref198","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.patrec.2021.03.005","article-title":"Optical Flow based CNN for detection of unlearnt deepfake manipulations","volume":"146","author":"Caldelli","year":"2021","journal-title":"Pattern Recognit Lett"},{"key":"ref199","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J Sel Top Signal Process"},{"key":"ref200","doi-asserted-by":"crossref","first-page":"67117","DOI":"10.1109\/ACCESS.2024.3398582","article-title":"Novel sentiment majority voting classifier and transfer learning-based feature engineering for sentiment analysis of deepfake tweets","volume":"12","author":"Khalid","year":"2024","journal-title":"IEEE Access"},{"key":"ref201","doi-asserted-by":"crossref","first-page":"4514","DOI":"10.3390\/su16114514","article-title":"Deep learning-based truthful and deceptive hotel reviews","volume":"16","author":"Gupta","year":"2024","journal-title":"Sustainability"},{"key":"ref202","series-title":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","first-page":"205","article-title":"Bot or human? detection of deepfake text with semantic, emoji, sentiment and linguistic features","author":"Chong","year":"2023"},{"key":"ref203","doi-asserted-by":"crossref","first-page":"115742","DOI":"10.1016\/j.eswa.2021.115742","article-title":"A review on social spam detection: challenges, open issues, and future directions","volume":"186","author":"Rao","year":"2021","journal-title":"Expert Syst Appl"},{"key":"ref204","doi-asserted-by":"crossref","first-page":"12509","DOI":"10.1109\/TEM.2022.3215709","article-title":"Intelligent clickbait news detection system based on artificial intelligence and feature engineering","volume":"71","author":"Ma","year":"2024","journal-title":"IEEE Trans Eng Manag"},{"key":"ref205","article-title":"Optimized hybrid deep learning for enhanced spam review detection in E-commerce platforms","volume":"16","author":"Alghaligah","year":"2025","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref206","doi-asserted-by":"crossref","first-page":"040016","DOI":"10.1063\/5.0225580","article-title":"Research on spam classification based on traditional machine learning and deep learning","volume":"3194","author":"Chen","year":"2024","journal-title":"AIP Conf Proc"},{"key":"ref207","series-title":"2024 International Conference on Cognitive Robotics and Intelligent Systems (ICC\u2014ROBINS)","first-page":"92","article-title":"SMS spam detection using NLP and deep learning recurrent neural network variants","author":"Kalyani","year":"2024"},{"key":"ref208","doi-asserted-by":"crossref","first-page":"71","DOI":"10.31449\/inf.v48i6.5246","article-title":"Ensemble-based text classification for spam detection","volume":"48","author":"Zhang","year":"2024","journal-title":"Informatica"},{"key":"ref209","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.asej.2018.06.001","article-title":"Efficient email classification approach based on semantic methods","volume":"9","author":"Bahgat","year":"2018","journal-title":"Ain Shams Eng J"},{"key":"ref210","doi-asserted-by":"crossref","first-page":"115007","DOI":"10.1063\/5.0234430","article-title":"Feature-level fusion of face and speech based multimodal biometric attendance system with liveness detection","volume":"14","author":"Jha","year":"2024","journal-title":"AIP Adv"},{"key":"ref211","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-981-97-2508-3_27","article-title":"Seeing through the lies: a vision transformer-based solution","volume":"1191","author":"Rasool","year":"2024","journal-title":"Lecture Notes Electr Eng"},{"key":"ref212","series-title":"2024 IEEE Region 10 Symposium (TENSYMP)","first-page":"1","article-title":"FakeTweet busters: a combination of BERT and Deepfake detection to resolve the spreading of fake AI generated news","author":"Das","year":"2024"},{"key":"ref213","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s44163-024-00138-z","article-title":"Exploring deep convolutional generative adversarial networks (DCGAN) in biometric systems: a survey study","volume":"4","author":"Jenkins","year":"2024","journal-title":"Discov Artif Intell"},{"key":"ref214","series-title":"2024 15th International Conference on Information and Communication Technology Convergence (ICTC)","first-page":"1851","article-title":"Spectrogram-based analysis and detection of deepfake audio using enhanced DCGANs for secure content distribution","author":"Lapates","year":"2024"},{"key":"ref215","series-title":"2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES)","first-page":"1","article-title":"Multimodal deepfake detection using deep-convolutional neural networks and mel-frequency cepstral coefficients","author":"Martin","year":"2024"},{"key":"ref216","series-title":"2024 Seventh International Conference on Vocational Education and Electrical Engineering (ICVEE)","first-page":"317","article-title":"Utilizing hybrid CNN-SVM and FastText word embedding for twitter cyberbullying classification","author":"Qoiriah","year":"2024"},{"key":"ref217","series-title":"2024 International Conference on Data Science and Its Applications (ICoD SA)","first-page":"481","article-title":"Improving feature extraction for sentiment analysis on Indonesian election 2024 using term weighting with fastText","author":"Reiki","year":"2024"},{"key":"ref218","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","article-title":"Biometric antispoofing methods: a survey in face recognition","volume":"2","author":"Galbally","year":"2014","journal-title":"IEEE Access"},{"key":"ref219","series-title":"International Conference on Information and Network Technology","first-page":"46","article-title":"Spoof attacks on multimodal biometric systems","author":"Akhtar","year":"2011"},{"key":"ref220","series-title":"2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","first-page":"271","article-title":"An exploration of pre-processing approaches for iris spoof detectors","author":"Verma","year":"2022"},{"key":"ref221","series-title":"2023 4th IEEE Global Conference for Advancement in Technology (GCAT)","first-page":"1","article-title":"Deep learning for iris recognition: an integration of feature extraction and clustering","author":"Devi","year":"2023"},{"key":"ref222","series-title":"2020 IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)","first-page":"954","article-title":"A hierarchical attention-based neural network model for socialbot detection in OSN","author":"Fazil","year":"2020"},{"key":"ref223","doi-asserted-by":"crossref","first-page":"5005","DOI":"10.1109\/TCSS.2023.3304649","article-title":"Find: privcy-enhanced federated learning for intelligent fake news detection","volume":"11","author":"Lian","year":"2023","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref224","doi-asserted-by":"crossref","first-page":"5366","DOI":"10.1109\/ACCESS.2024.3523257","article-title":"FFDL: feature fusion-based deep learning method utilizing federated learning for forged face detection","volume":"13","author":"Gautam","year":"2025","journal-title":"IEEE Access"},{"key":"ref225","first-page":"53","article-title":"The intersection of artificial intelligence, deepfake, and the politics of international diplomacy","volume":"6","author":"Ikenga","year":"2024","journal-title":"Ianna J Interdiscip Stud"},{"key":"ref226","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1177\/13548565211033418","article-title":"Rebalancing our regulatory response to Deepfakes with performers\u2019 rights","volume":"27","author":"Pavis","year":"2021","journal-title":"Convergence"},{"key":"ref227","first-page":"100217","article-title":"Deepfake forensics analysis: an explainable hierarchical ensemble of weakly supervised models","volume":"4","author":"Silva","year":"2022","journal-title":"Forensic Sci Int: Synergy"},{"key":"ref228","doi-asserted-by":"crossref","first-page":"144497","DOI":"10.1109\/ACCESS.2023.3344653","article-title":"A survey on the detection and impacts of deepfakes in visual, audio, and textual formats","volume":"11","author":"Mubarak","year":"2023","journal-title":"IEEE Access"},{"key":"ref229","first-page":"119","article-title":"Empowering youth to combat malicious deepfakes and disinformation: an experiential and reflective learning experience informed by personal construct theory","volume":"38","author":"Naffi","year":"2025","journal-title":"J Contr Psychol"},{"key":"ref230","first-page":"100286","article-title":"Extending the theory of information poverty to deepfake technology","volume":"4","author":"Matli","year":"2024","journal-title":"Int J Inf Manag Data Insights"},{"key":"ref231","doi-asserted-by":"crossref","DOI":"10.1177\/14614448241253138","article-title":"What we know and don\u2019t know about deepfakes: an investigation into the state of the research and regulatory landscape","author":"Birrer","year":"2024","journal-title":"New Media Soc"},{"key":"ref232","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1080\/15252019.2023.2260399","article-title":"To tell or not to tell: the effects of disclosing deepfake video on US and Indian consumers\u2019 purchase intention","volume":"23","author":"Powers","year":"2023","journal-title":"J Interact Advert"},{"key":"ref233","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1080\/13600869.2024.2324540","article-title":"Generative AI and deepfakes: a human rights approach to tackling harmful content","volume":"38","author":"Romero Moreno","year":"2024","journal-title":"Int Rev Law, Comput Technol"},{"key":"ref234","first-page":"805","article-title":"Overcoming racial harms to democracy from artificial intelligence","volume":"110","author":"Overton","year":"2025","journal-title":"Iowa Law Rev"},{"key":"ref235","doi-asserted-by":"crossref","first-page":"1","DOI":"10.7717\/peerj-cs.2037","article-title":"Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media","volume":"10","author":"Qureshi","year":"2024","journal-title":"PeerJ Comput Sci"},{"key":"ref236","first-page":"1","article-title":"The impact of artificial intelligence on human sexuality: a Five-year literature review 2020\u20132024","volume":"17","author":"D\u00f6ring","year":"2025","journal-title":"Curr Sex Health Rep"},{"key":"ref237","series-title":"2023 6th International Conference on Applied Computational Intelligence in Information Systems (ACIIS)","first-page":"1","article-title":"The weaponisation of the internet\u2014effect models","author":"McLoughlin","year":"2023"},{"key":"ref238","series-title":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"The societal impact of Deepfakes: advances in detection and mitigation","author":"Kaushal","year":"2023"},{"key":"ref239","doi-asserted-by":"crossref","first-page":"48126","DOI":"10.1109\/ACCESS.2024.3381611","article-title":"Privacy and security concerns in generative AI: a comprehensive survey","volume":"12","author":"Golda","year":"2024","journal-title":"IEEE Access"},{"key":"ref240","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.aej.2024.10.076","article-title":"SLM-DFS: a systematic literature map of deepfake spread on social media","volume":"111","author":"Atlam","year":"2025","journal-title":"Alex Eng J"},{"key":"ref241","series-title":"2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","first-page":"1","article-title":"The demographic profile most at risk of being disinformed","author":"Caramancion","year":"2021"},{"key":"ref242","series-title":"2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"1207","article-title":"Illusion or reality: analyzing sentiments on deepfakes","author":"Chaturvedi","year":"2024"},{"key":"ref243","series-title":"2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)","first-page":"1","article-title":"GenerativeAI and deep fakes inmedia industry \u2014an innovation resistance theory perspective","author":"Pramod","year":"2024"},{"key":"ref244","first-page":"162","article-title":"Artificial intelligence and the evolving cybercrime paradigm: current threats to businesses","volume":"16","author":"Zandi","year":"2024","journal-title":"J Inf Technol Manag"},{"key":"ref245","doi-asserted-by":"crossref","first-page":"1753","DOI":"10.1098\/rsos.231214","article-title":"Deepfake detection with and without content warnings","volume":"10","author":"Lewis","year":"2023","journal-title":"R Soc Open Sci"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_61427\/TSP_CMC_61427.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:44Z","timestamp":1763343284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":245,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061427","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}