{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T07:59:39Z","timestamp":1777103979308,"version":"3.51.4"},"reference-count":86,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062954","type":"journal-article","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T07:12:27Z","timestamp":1753427547000},"page":"1457-1493","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":7,"title":["Real-Time Deepfake Detection via Gaze and Blink Patterns: A Transformer Framework"],"prefix":"10.32604","volume":"85","author":[{"given":"Muhammad","family":"Javed","sequence":"first","affiliation":[]},{"given":"Zhaohui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fida Hussain","family":"Dahri","sequence":"additional","affiliation":[]},{"given":"Asif Ali","family":"Laghari","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Kraj\u010d\u00edk","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almadhor","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"e1520","DOI":"10.1002\/widm.1520","article-title":"Deepfake detection using deep learning methods: a systematic and comprehensive review","volume":"14","author":"Heidari","year":"2024","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2947","DOI":"10.3390\/electronics13152947","article-title":"Real-time deepfake video detection using eye movement analysis with a hybrid deep learning approach","volume":"13","author":"Javed","year":"2024","journal-title":"Electronics"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3557","DOI":"10.1109\/TPAMI.2024.3350004","article-title":"Face generation and editing with StyleGAN: a survey","volume":"46","author":"Melnik","year":"2024","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-030-93802-4_4","author":"Kalpokas","year":"2022","journal-title":"Deepfakes"},{"key":"ref5","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","first-page":"7206","article-title":"NeRF in the wild: neural radiance fields for unconstrained photo collections","author":"Martin-Brualla"},{"key":"ref6","series-title":"Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2022 Jun 18\u201324","first-page":"10674","article-title":"High-resolution image synthesis with latent diffusion models","author":"Rombach"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","article-title":"DeepFake detection for human face images and videos: a survey","volume":"10","author":"Malik","year":"2022","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652027","article-title":"Mastering Deepfake detection: a cutting-edge approach to distinguish GAN and diffusion-model images","volume":"20","author":"Guarnera","year":"2024","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"ref9","series-title":"Proceedings of the 1st Workshop on Synthetic Multimedia\u2014Audiovisual Deepfake Generation and Detection; 2021 Oct 20\u201321","first-page":"7","article-title":"Evaluation of an audio-video multimodal deepfake dataset using unimodal and multimodal detectors","author":"Khalid"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1080\/23080477.2023.2268380","article-title":"Face manipulated deepfake generation and recognition approaches: a survey","volume":"12","author":"Rehaan","year":"2024","journal-title":"Smart Sci"},{"key":"ref11","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision; 2019 Oct 27\u2013Nov 2","first-page":"1","article-title":"FaceForensics++: learning to detect manipulated facial images","author":"Rossler"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s00530-023-01214-7","article-title":"Detecting facial manipulated images via one-class domain generalization","volume":"30","author":"Xu","year":"2024","journal-title":"Multimed Syst"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"130159","DOI":"10.1109\/ACCESS.2020.3009512","article-title":"Dual encoder-decoder based generative adversarial networks for disentangled facial representation learning","volume":"8","author":"Hu","year":"2020","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"105344","DOI":"10.1109\/ACCESS.2023.3317897","article-title":"3G-AN: triple-generative adversarial network under corse-medium-fine generator architecture","volume":"11","author":"Avil\u00e9s-Cruz","year":"2023","journal-title":"IEEE Access"},{"key":"ref15","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 Jun 13\u201319","first-page":"3204","article-title":"Celeb-DF: a large-scale challenging dataset for DeepFake forensics","author":"Li"},{"key":"ref16","series-title":"Proceedings of the 2020 IEEE\/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT); 2020 Dec 7\u201310","first-page":"134","article-title":"Deepfake detection through deep learning","author":"Pan"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes generation and detection: state-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2023","journal-title":"Appl Intell"},{"key":"ref18","first-page":"1","volume":"37","author":"Thies","year":"2018","journal-title":"ACM Trans Graph"},{"key":"ref19","first-page":"433","article-title":"Automatic face mask detection and recognition using deep learning","volume":"13","author":"Dahri","year":"2022","journal-title":"Int J Sci Eng Res"},{"key":"ref20","first-page":"1","author":"Bitouk","year":"2008","journal-title":"ACM SIGGRAPH 2008 papers"},{"key":"ref21","first-page":"2989","article-title":"Deepfake videos: synthesis and detection techniques\u2014a survey","volume":"42","author":"Saif","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"19344","DOI":"10.1109\/ACCESS.2024.3356550","article-title":"Face de-identification using face caricature","volume":"12","author":"Laishram","year":"2024","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/jsan12040061","article-title":"An investigation of the effectiveness of Deepfake models and tools","volume":"12","author":"Mukta","year":"2023","journal-title":"J Sens Actuator Netw"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"110002","DOI":"10.1016\/j.patcog.2023.110002","article-title":"Fairness in face presentation attack detection","volume":"147","author":"Fang","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.patrec.2024.04.008","article-title":"Data-agnostic face image synthesis detection using Bayesian CNNs","volume":"183","author":"Leyva","year":"2024","journal-title":"Pattern Recognit Lett"},{"key":"ref26","series-title":"Proceedings of the 2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC); 2022 Nov 7\u201310","first-page":"1524","article-title":"Multimodal forgery detection using ensemble learning","author":"Hashmi"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"117865","DOI":"10.1109\/ACCESS.2023.3324403","article-title":"DeepFake on face and expression swap: a review","volume":"11","author":"Waseem","year":"2023","journal-title":"IEEE Access"},{"key":"ref28","series-title":"Proceedings of the 2018 International Conference of the Biometrics Special Interest Group (BIOSIG); 2018 Sep 6\u201328","first-page":"1","article-title":"Fake face detection methods: can they be generalized?","author":"Khodabakhsh"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"160471","DOI":"10.1109\/ACCESS.2021.3131517","article-title":"Real, forged or deep fake? enabling the ground truth on the Internet","volume":"9","author":"Hoque","year":"2021","journal-title":"IEEE Access"},{"key":"ref30","unstructured":"Dolhansky B. The deepfake detection challenge (DFDC) dataset. arXiv:2006.07397v4. 2020."},{"key":"ref31","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW); 2020 Jun 14\u201319","first-page":"2851","article-title":"Deepfakes detection with automatic face weighting","author":"Montserrat"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"3473","DOI":"10.1007\/s00371-024-03613-x","article-title":"Advanced deepfake detection with enhanced Resnet-18 and multilayer CNN max pooling","volume":"41","author":"Fahad","year":"2025","journal-title":"Vis Comput"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"134701","DOI":"10.1109\/ACCESS.2023.3332561","article-title":"EDL-Det: a robust TTS synth detect using VGG19-based YAMNet ensemble learn block","volume":"11","author":"Mahum","year":"2023","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"67456","DOI":"10.1109\/ACCESS.2019.2919169","article-title":"Facial image inpainting with deep generative model and patch search using region weight","volume":"7","author":"Wei","year":"2019","journal-title":"IEEE Access"},{"key":"ref35","series-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS); 2018 Dec 11\u201313","first-page":"1","article-title":"MesoNet: a compact facial video forgery detection network","author":"Afchar"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"e2246","DOI":"10.1002\/cav.2246","article-title":"Facial action units detection using temporal context and feature reassignment","volume":"35","author":"Yang","year":"2024","journal-title":"Comput Animat Virtual"},{"key":"ref37","series-title":"Proceedings of the 2024 1st International Conference on Innovative Engineering Sciences and Technological Research (ICIESTR); 2024 May 14\u201315","first-page":"1","article-title":"A novel deep learning model for classifying power quality problems in PV-integrated microgrids using CNN-LSTM","author":"Ali Channa"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"83144","DOI":"10.1109\/ACCESS.2020.2988660","article-title":"Deep: deep detect using hum eye blinking pattern","volume":"8","author":"Jung","year":"2020","journal-title":"IEEE Access"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"110124","DOI":"10.1016\/j.asoc.2023.110124","article-title":"AVFakeNet: a unified end-to-end Dense Swin Transformer deep learning model for audio\u2014visual deepfakes detection","volume":"136","author":"Ilyas","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref40","series-title":"Proceedings of the 31st ACM International Conference on Multimedia; 2023 Oct 27\u201331","first-page":"8749","article-title":"UMMAFormer: a universal multimodal-adaptive transformer framework for temporal forgery localization","author":"Zhang"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"6662","DOI":"10.1109\/TCYB.2021.3079311","article-title":"Improving video temporal consistency via broad learning system","volume":"52","author":"Sheng","year":"2022","journal-title":"IEEE Trans Cybern"},{"key":"ref42","first-page":"813","article-title":"Is space-time attention all you need for video understanding?","volume":"139","author":"Bertasius","year":"2021","journal-title":"Proc Mach Learn Res"},{"key":"ref43","series-title":"Proceedings of the 2024 6th Novel Intelligent and Leading Emerging Sciences Conference (NILES); 2024 Oct 19\u201321","first-page":"139","article-title":"TimeSformer-MIL: a hybrid approach for anomalous activity recognition in real-world surveillance videos","author":"Khaled"},{"key":"ref44","unstructured":"Khalid H, Tariq S, Kim M, Woo SS. FakeAVCeleb: a novel audio-video multimodal deepfake dataset. arXiv:2108.05080v4. 2022."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/s11760-025-03970-7","article-title":"Enhancing multimodal deepfake detection with local-global feature integration and diffusion models","volume":"19","author":"Javed","year":"2025","journal-title":"Signal Image Video Process"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"4327","DOI":"10.1109\/TDSC.2024.3352049","article-title":"Benchmarking joint face spoofing and forgery detection with visual and physiological cues","volume":"21","author":"Yu","year":"2024","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref47","series-title":"Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2015 Jun 7\u201312","first-page":"2625","article-title":"Long-term recurrent convolutional networks for visual recognition and description","author":"Donahue"},{"key":"ref48","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2016 Jun 27\u201330","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He"},{"key":"ref49","series-title":"Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2017 Jul 21\u201326","first-page":"2261","article-title":"Densely connected convolutional networks","author":"Huang"},{"key":"ref50","first-page":"1","article-title":"FakeCatcher: detection of synthetic portrait videos using biological signals","volume":"2024","author":"Ciftci","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref51","series-title":"Proceedings of the 2020 IEEE International Conference on Image Processing (ICIP); 2020 Oct 25\u201328","first-page":"1821","article-title":"Extracting deep local features to detect manipulated images of human faces","author":"Tarasiou"},{"key":"ref52","series-title":"International Conference on Image Analysis and Processing","first-page":"219","article-title":"Combining EfficientNet and vision transformers for video deepfake detection","author":"Coccomini","year":"2022"},{"key":"ref53","unstructured":"Wodajo D, Atnafu S. Deepfake video detection using convolutional vision transformer. arXiv:2102.11126v3. 2021."},{"key":"ref54","doi-asserted-by":"crossref","first-page":"104978","DOI":"10.1016\/j.engappai.2022.104978","article-title":"A 3D-CAE-CNN model for deep representation learning of 3D images","volume":"113","author":"Pintelas","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TIFS.2023.3239223","article-title":"ISTVT: interpretable spatial-temporal video transformer for deepfake detection","volume":"18","author":"Zhao","year":"2023","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"4046","DOI":"10.1109\/TIFS.2023.3290752","article-title":"Dynamic difference learning with spatio-temporal correlation for deepfake video detection","volume":"18","author":"Yin","year":"2023","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"21777","DOI":"10.1007\/s00521-022-07633-3","article-title":"An integrated spatiotemporal-based methodology for deepfake detection","volume":"34","author":"Ismail","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref58","unstructured":"de Lima O, Franklin S, Basu S, Karwoski B, George A. Deepfake detection using spatiotemporal convolutional networks. arXiv:2006.14749v1. 2020."},{"key":"ref59","doi-asserted-by":"crossref","first-page":"575","DOI":"10.3390\/electronics11040575","article-title":"A light-weight CNN for object detection with sparse model and knowledge distillation","volume":"11","author":"Guo","year":"2022","journal-title":"Electronics"},{"key":"ref60","series-title":"Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus); 2021 Jan 26\u201329","first-page":"598","article-title":"EfficientNets for DeepFake detection: comparison of pretrained models","author":"Pokroy"},{"key":"ref61","series-title":"Proceedings of the 29th ACM International Conference on Multimedia; 2021 Oct 20\u201324","article-title":"Video transformer for deepfake detection with incremental learning","author":"Khan"},{"key":"ref62","series-title":"Proceedings of the Computer Vision-ECCV 2020","first-page":"152","article-title":"Towards fast, accurate and stable 3D dense face alignment","author":"Guo"},{"key":"ref63","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, et al. An image is worth 16x16 words: transformers for image recognition at scale. arXiv:2010.11929. 2020."},{"key":"ref64","first-page":"3","article-title":"Contributing data to deepfake detection research","volume":"1","author":"Dufour","year":"2019","journal-title":"Google AI Blog"},{"key":"ref65","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","first-page":"5037","article-title":"Lips don\u2019t lie: a generalisable and robust approach to face forgery detection","author":"Haliassos"},{"key":"ref66","series-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS); 2018 Dec 11\u201313","first-page":"1","article-title":"In ictu oculi: exposing AI created fake videos by detecting eye blinking","author":"Li"},{"key":"ref67","series-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW); 2019 Oct 27\u201328","first-page":"1205","article-title":"Deepfake video detection through optical flow based CNN","author":"Amerini"},{"key":"ref68","series-title":"Proceedings of the 28th ACM International Conference on Multimedia; 2020 Oct 12\u201316","first-page":"2823","article-title":"Emotions don\u2019t lie: an audio-visual deepfake detection method using affective cues","author":"Mittal"},{"key":"ref69","series-title":"Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 Jun 18\u201324","first-page":"14930","article-title":"Leveraging real talking faces via self-supervision for robust forgery detection","author":"Haliassos"},{"key":"ref70","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV); 2021 Oct 10\u201317","first-page":"15024","article-title":"Exploring temporal coherence for more general video face forgery detection","author":"Zheng"},{"key":"ref71","series-title":"Proceedings of the 2022 International Conference on Multimedia Retrieval","first-page":"615","article-title":"M2TR: multi-modal multi-scale transformers for deepfake detection","author":"Wang","year":"2020 Jun 27\u201330"},{"key":"ref72","doi-asserted-by":"crossref","unstructured":"Li Y, Chang MC, Lyu S. In ictu oculi: exposing AI generated fake face videos by detecting eye blinking. arXiv:1806.02877. 2018.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1007\/s11263-019-01251-8","article-title":"Realistic speech-driven facial animation with GANs","volume":"128","author":"Vougioukas","year":"2020","journal-title":"Int J Comput Vis"},{"key":"ref74","unstructured":"Pham HX, Wang Y, Pavlovic V. Generative adversarial talking head: bringing portraits to life with a weakly supervised neural network. arXiv:1803.07716. 2018."},{"key":"ref75","series-title":"Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2017 Jul 21\u201326","first-page":"1800","article-title":"Xception: deep learning with depthwise separable convolutions","author":"Chollet"},{"key":"ref76","series-title":"Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security; 2015 Jun 20\u201322","first-page":"5","article-title":"A deep learning approach to universal image manipulation detection using a new convolutional layer","author":"Bayar"},{"key":"ref77","series-title":"Proceedings of the International Conference on Machine Learning; 2019 Jun 10\u201315","first-page":"6105","article-title":"EfficientNet: rethinking model scaling for convolutional neural networks","author":"Tan"},{"key":"ref78","series-title":"Proceedings of the Proceedings of the AAAI Conference on Artificial Intelligence; 2017 Feb 4\u20139","article-title":"Inception-v4, inception-ResNet and the impact of residual connections on learning","author":"Szegedy"},{"key":"ref79","series-title":"Proceedings of the 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS); 2018 Nov 27\u201330","first-page":"1","article-title":"Deepfake video detection using recurrent neural networks","author":"G\u00fcera"},{"key":"ref80","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 Jun 13\u201319","first-page":"5000","article-title":"Face X-ray for more general face forgery detection","author":"Li"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-3-030-87664-7_10","author":"Roy","year":"2022","journal-title":"Handbook of digital face manipulation and detection"},{"key":"ref82","series-title":"Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2022 Jun 18\u201324","first-page":"4103","article-title":"End-to-end reconstruction-classification learning for face forgery detection","author":"Cao"},{"key":"ref83","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","first-page":"14918","article-title":"Representative forgery mining for fake face detection","author":"Wang"},{"key":"ref84","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence; 2022 Feb 22\u2013Mar 1","first-page":"2316","article-title":"Dual contrastive learning for general face forgery detection","author":"Sun"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"4272","DOI":"10.1109\/TIFS.2023.3293951","article-title":"FedForgery: generalized face forgery detection with residual federated learning","volume":"18","author":"Liu","year":"2023","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3643030","article-title":"Deepfake detection using spatiotemporal transformer","volume":"20","author":"Kaddar","year":"2024","journal-title":"ACM Trans Multimed Comput Commun Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_62954\/TSP_CMC_62954.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:02:39Z","timestamp":1763344959000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":86,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062954","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}