{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:13:23Z","timestamp":1776280403078,"version":"3.50.1"},"reference-count":203,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T00:00:00Z","timestamp":1740700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"European Union\u2014NextGenerationEU","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>The rise of AI-generated synthetic media, or deepfakes, has introduced unprecedented opportunities and challenges across various fields, including entertainment, cybersecurity, and digital communication. Using advanced frameworks such as Generative Adversarial Networks (GANs) and Diffusion Models (DMs), deepfakes are capable of producing highly realistic yet fabricated content, while these advancements enable creative and innovative applications, they also pose severe ethical, social, and security risks due to their potential misuse. The proliferation of deepfakes has triggered phenomena like \u201cImpostor Bias\u201d, a growing skepticism toward the authenticity of multimedia content, further complicating trust in digital interactions. This paper is mainly based on the description of a research project called FF4ALL (FF4ALL-Detection of Deep Fake Media and Life-Long Media Authentication) for the detection and authentication of deepfakes, focusing on areas such as forensic attribution, passive and active authentication, and detection in real-world scenarios. By exploring both the strengths and limitations of current methodologies, we highlight critical research gaps and propose directions for future advancements to ensure media integrity and trustworthiness in an era increasingly dominated by synthetic media.<\/jats:p>","DOI":"10.3390\/jimaging11030073","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T08:05:54Z","timestamp":1740729954000},"page":"73","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Deepfake Media Forensics: Status and Future Challenges"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6461-1391","authenticated-orcid":false,"given":"Irene","family":"Amerini","sequence":"first","affiliation":[{"name":"Department of Computer, Control and Management Engineering, Sapienza University of Rome, 00185 Roma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7368-0866","authenticated-orcid":false,"given":"Mauro","family":"Barni","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Mathematics, University of Siena, 53100 Siena, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6127-2470","authenticated-orcid":false,"given":"Sebastiano","family":"Battiato","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Catania, 95125 Catania, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0406-0222","authenticated-orcid":false,"given":"Paolo","family":"Bestagini","sequence":"additional","affiliation":[{"name":"Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 20133 Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0260-9528","authenticated-orcid":false,"given":"Giulia","family":"Boato","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, University of Trento, 38123 Trento, Italy"},{"name":"Truebees S.r.l., 20900 Monza, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3909-7463","authenticated-orcid":false,"given":"Vittoria","family":"Bruni","sequence":"additional","affiliation":[{"name":"Department of Basic and Applied Sciences for Engineering, Sapienza University of Rome, 00185 Roma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3471-1196","authenticated-orcid":false,"given":"Roberto","family":"Caldelli","sequence":"additional","affiliation":[{"name":"CNIT, National Inter-University Consortium for Telecommunications, 50134 Florence, Italy"},{"name":"Department of Engineering and Sciences, Universitas Mercatorum, 00186 Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2566-6995","authenticated-orcid":false,"given":"Francesco","family":"De Natale","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, University of Trento, 38123 Trento, Italy"},{"name":"CNIT, University of Trento, 38122 Trento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4691-7570","authenticated-orcid":false,"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[{"name":"IMT School for Advanced Studies, 55100 Lucca, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8315-351X","authenticated-orcid":false,"given":"Luca","family":"Guarnera","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Catania, 95125 Catania, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3811-003X","authenticated-orcid":false,"given":"Sara","family":"Mandelli","sequence":"additional","affiliation":[{"name":"Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 20133 Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2335-0420","authenticated-orcid":false,"given":"Taiba","family":"Majid","sequence":"additional","affiliation":[{"name":"Department of Computer, Control and Management Engineering, Sapienza University of Rome, 00185 Roma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8719-9643","authenticated-orcid":false,"given":"Gian Luca","family":"Marcialis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1196-7869","authenticated-orcid":false,"given":"Marco","family":"Micheletto","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0794-312X","authenticated-orcid":false,"given":"Andrea","family":"Montibeller","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, University of Trento, 38123 Trento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7802-2483","authenticated-orcid":false,"given":"Giulia","family":"Orr\u00f9","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, 09123 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3461-4679","authenticated-orcid":false,"given":"Alessandro","family":"Ortis","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Catania, 95125 Catania, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3443-319X","authenticated-orcid":false,"given":"Pericle","family":"Perazzo","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Pisa, 56122 Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6222-9933","authenticated-orcid":false,"given":"Giovanni","family":"Puglisi","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1734-7476","authenticated-orcid":false,"given":"Nischay","family":"Purnekar","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Mathematics, University of Siena, 53100 Siena, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5163-3364","authenticated-orcid":false,"given":"Davide","family":"Salvi","sequence":"additional","affiliation":[{"name":"Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 20133 Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1990-9869","authenticated-orcid":false,"given":"Stefano","family":"Tubaro","sequence":"additional","affiliation":[{"name":"Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 20133 Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9457-0677","authenticated-orcid":false,"given":"Massimo","family":"Villari","sequence":"additional","affiliation":[{"name":"MIFT Department, University of Messina, Viale F. Stagno d\u2019Alcontres, 31, 98166 Messina, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6088-9743","authenticated-orcid":false,"given":"Domenico","family":"Vitulano","sequence":"additional","affiliation":[{"name":"Department of Basic and Applied Sciences for Engineering, Sapienza University of Rome, 00185 Roma, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"key":"ref_1","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014). Generative Adversarial Nets. Adv. Neural Inf. Process. Syst., 27."},{"key":"ref_2","first-page":"6840","article-title":"Denoising Diffusion Probabilistic Models","volume":"33","author":"Ho","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_3","first-page":"301795","article-title":"GenAI Mirage: The Impostor Bias and the Deepfake Detection Challenge in the Era of Artificial Illusions","volume":"50","author":"Casu","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., Guarnera, F., Ortis, A., Puglisi, G., Paratore, A., Bui, L.M., Fontani, M., Coccomini, D.A., and Caldelli, R. (2022). The Face Deepfake Detection Challenge. J. Imaging, 8.","DOI":"10.3390\/jimaging8100263"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., and Efros, A.A. (2020, January 13\u201319). CNN-Generated Images are Surprisingly Easy to Spot \u2026for Now. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., and Battiato, S. (2024, January 26\u201327). Level Up the Deepfake Detection: A Method to Effectively Discriminate Images Generated by GAN Architectures and Diffusion Models. Proceedings of the Intelligent Systems Conference, Guilin, China.","DOI":"10.1007\/978-3-031-66431-1_43"},{"key":"ref_7","unstructured":"Amerini, I., Barni, M., Battiato, S., Bestagini, P., Boato, G., Bonaventura, T.S., Bruni, V., Caldelli, R., De Natale, F., and De Nicola, R. (2024). Deepfake Media Forensics: State of the Art and Challenges Ahead. arXiv."},{"key":"ref_8","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., and Ganguli, S. (2015, January 7\u20139). Deep Unsupervised Learning Using Nonequilibrium Thermodynamics. Proceedings of the International Conference on Machine Learning, PMLR, Lille, France."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gong, L.Y., and Li, X.J. (2024). A Contemporary Survey on Deepfake Detection: Datasets, Algorithms, and Challenges. Electronics, 13.","DOI":"10.3390\/electronics13030585"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1007\/s11042-020-09974-4","article-title":"A Comprehensive Survey on Passive Techniques for Digital Video Forgery Detection","volume":"80","author":"Shelke","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mallet, J., Dave, R., Seliya, N., and Vanamala, M. (2022, January 26\u201327). Using Deep Learning to Detecting Deepfakes. Proceedings of the 2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI), Toronto, ON, Canada.","DOI":"10.1109\/ISCMI56532.2022.10068449"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Thing, V.L. (August, January 31). Deepfake Detection with Deep Learning: Convolutional Neural Networks Versus Transformers. Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy.","DOI":"10.1109\/CSR57506.2023.10225004"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yan, Z., Luo, Y., Lyu, S., Liu, Q., and Wu, B. (2024, January 16\u201322). Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR52733.2024.00858"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lanzino, R., Fontana, F., Diko, A., Marini, M.R., and Cinque, L. (2024, January 16\u201322). Faster Than Lies: Real-time Deepfake Detection using Binary Neural Networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPRW63382.2024.00381"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Khan, S.A., and Valles, D. (2024, January 17\u201319). Deepfake Detection Using Transfer Learning. Proceedings of the 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), Yorktown Heights, NY, USA.","DOI":"10.1109\/UEMCON62879.2024.10754706"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chai, L., Bau, D., Lim, S.N., and Isola, P. (2020). What Makes Fake Images Detectable? Understanding Properties that Generalize. Proceedings of the Computer Vision\u2014ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 August 2020, Proceedings, Part XXVI, Springer.","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Durall, R., Keuper, M., and Keuper, J. (2020, January 13\u201319). Watch Your Up-Convolution: CNN-Based Generative Deep Neural Networks are Failing to Reproduce Spectral Distributions. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tan, C., Zhao, Y., Wei, S., Gu, G., Liu, P., and Wei, Y. (2024, January 20\u201327). Frequency-Aware Deepfake Detection: Improving Generalizability through Frequency Space Domain Learning. Proceedings of the AAAI Conference on Artificial Intelligence, Vancouver, BC, Canada.","DOI":"10.1609\/aaai.v38i5.28310"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4295","DOI":"10.1007\/s10994-022-06225-5","article-title":"Wavelet-Packets for Deepfake Image Analysis and Detection","volume":"111","author":"Wolter","year":"2022","journal-title":"Mach. Learn."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Concas, S., Perelli, G., Marcialis, G.L., and Puglisi, G. (2022, January 16\u201319). Tensor-Based Deepfake Detection in Scaled and Compressed Images. Proceedings of the 2022 IEEE International Conference on Image Processing (ICIP), Bordeaux, France.","DOI":"10.1109\/ICIP46576.2022.9897606"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TCSVT.2021.3074259","article-title":"Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network","volume":"32","author":"Hu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"123732","DOI":"10.1016\/j.eswa.2024.123732","article-title":"DeepFake Detection Based on High-Frequency Enhancement Network for Highly Compressed Content","volume":"249","author":"Gao","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_23","unstructured":"Sun, X., Wu, B., and Chen, W. (2020). Identifying Invariant Texture Violation for Robust Deepfake Detection. arXiv."},{"key":"ref_24","unstructured":"Patil, K., Kale, S., Dhokey, J., and Gulhane, A. (2023). Deepfake Detection Using Biological Features: A Survey. arXiv."},{"key":"ref_25","unstructured":"Hernandez-Ortega, J., Tolosana, R., Fierrez, J., and Morales, A. (2020). Deepfakeson-Phys: Deepfakes Detection Based on Heart Rate Estimation. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Mittal, T., Bhattacharya, U., Chandra, R., Bera, A., and Manocha, D. (2020, January 12\u201316). Emotions Do not Lie: An Audio-Visual Deepfake Detection Method Using Affective Cues. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413570"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.C., and Lyu, S. (2018). In Ictu Oculi: Exposing AI-Generated Fake Face Videos by Detecting Eye Blinking. arXiv.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Concas, S., La Cava, S.M., Casula, R., Orr\u00f9, G., Puglisi, G., and Marcialis, G.L. (2024, January 16\u201322). Quality-based Artifact Modeling for Facial Deepfake Detection in Videos. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPRW63382.2024.00389"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"108450","DOI":"10.1016\/j.engappai.2024.108450","article-title":"Texture and Artifact Decomposition for Improving Generalization in Deep-Learning-Based DeepFake Detection","volume":"133","author":"Gao","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Yu, Y., Ni, R., Yang, S., Ni, Y., Zhao, Y., and Kot, A.C. (2024). Mining Generalized Multi-timescale Inconsistency for Detecting Deepfake Videos. Int. J. Comput. Vis., 1\u201317.","DOI":"10.1007\/s11263-024-02249-7"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.3934\/era.2024119","article-title":"Analyzing Temporal Coherence for Deepfake Video Detection","volume":"32","author":"Amin","year":"2024","journal-title":"Electron. Res. Arch."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zhou, Y., and Lim, S.N. (2021, January 10\u201317). Joint Audio-Visual Deepfake Detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Montreal, QC, Canada.","DOI":"10.1109\/ICCV48922.2021.01453"},{"key":"ref_33","unstructured":"Hong, Y., and Zhang, J. (2024). Wildfake: A large-scale challenging dataset for ai-generated images detection. arXiv."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Paul, B., Sarker, N.H., Hakim, Z.I.A., and Fattah, S.A. (2023, January 8\u201311). Artifact: A large-scale dataset with artificial and factual images for generalizable and robust synthetic image detection. Proceedings of the IEEE International Conference on Image Processing (ICIP), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICIP49359.2023.10222083"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Cheng, H., Guo, Y., Wang, T., Nie, L., and Kankanhalli, M. (2024, January 15\u201318). Diffusion facial forgery detection. Proceedings of the ACM International Conference on Multimedia, Bari, Italy.","DOI":"10.1145\/3664647.3680797"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sauer, A., Schwarz, K., and Geiger, A. (2022, January 7\u201311). Stylegan-xl: Scaling stylegan to large diverse datasets. Proceedings of the ACM SIGGRAPH, Vancouver, BC, Canada.","DOI":"10.1145\/3528233.3530738"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., and Aila, T. (2019, January 15\u201320). A Style-Based Generator Architecture for Generative Adversarial Networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., and Aila, T. (2020, January 13\u201319). Analyzing and improving the image quality of stylegan. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Todisco, M., Wang, X., Vestman, V., Sahidullah, M., Delgado, H., Nautsch, A., Yamagishi, J., Evans, N., Kinnunen, T., and Lee, K.A. (2019, January 15\u201319). ASVspoof 2019: Future horizons in spoofed and fake audio detection. Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Graz, Austria.","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"101114","DOI":"10.1016\/j.csl.2020.101114","article-title":"ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech","volume":"64","author":"Wang","year":"2020","journal-title":"Comput. Speech Lang."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Yamagishi, J., Wang, X., Todisco, M., Sahidullah, M., Patino, J., Nautsch, A., Liu, X., Lee, K.A., Kinnunen, T., and Evans, N. (2021, January 16). ASVspoof 2021: Accelerating progress in spoofed and deepfake speech detection. Proceedings of the Automatic Speaker Verification and Spoofing Countermeasures Challenge, Online.","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"50851","DOI":"10.1109\/ACCESS.2023.3276480","article-title":"TIMIT-TTS: A Text-to-Speech Dataset for Multimodal Synthetic Media Detection","volume":"11","author":"Salvi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"M\u00fcller, N.M., Czempin, P., Dieckmann, F., Froghyar, A., and B\u00f6ttinger, K. Does audio deepfake detection generalize? In Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Incheon, Republic of Korea, 18\u201322 September 2022.","DOI":"10.21437\/Interspeech.2022-108"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Reimao, R., and Tzerpos, V. (2019, January 10\u201312). FOR: A dataset for synthetic speech detection. Proceedings of the IEEE International Conference on Speech Technology and Human\u2013Computer Dialogue (SpeD), Timisoara, Romania.","DOI":"10.1109\/SPED.2019.8906599"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bhagtani, K., Yadav, A.K.S., Bestagini, P., and Delp, E.J. Are Recent Deepfake Speech Generators Detectable? In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Baiona, Spain, 24\u201326 June 2024.","DOI":"10.1145\/3658664.3659658"},{"key":"ref_46","unstructured":"Ito, K., and Johns, L. (2025, January 15). The LJSpeech Dataset. Available online: https:\/\/keithito.com\/LJ-Speech-Dataset\/."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Panayotov, V., Chen, G., Povey, D., and Khudanpur, S. (2015, January 19\u201324). Librispeech: An ASR corpus based on public domain audio books. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia.","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref_48","unstructured":"Korshunov, P., and Marcel, S. (2018). Deepfakes: A new threat to face recognition? Assessment and detection. arXiv."},{"key":"ref_49","unstructured":"Sanderson, C. (2025, January 15). The VidTIMIT database. Technical Report, IDIAP. Available online: https:\/\/www.google.com\/url?sa=t&source=web&rct=j&opi=89978449&url=https:\/\/publications.idiap.ch\/downloads\/reports\/2002\/com02-06.pdf&ved=2ahUKEwid9vKeueWLAxVuvokEHTziMbQQFnoECBUQAQ&usg=AOvVaw0kiW0MZbBb8yeSzteosaGP."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Korshunova, I., Shi, W., Dambre, J., and Theis, L. (2017, January 22\u201329). Fast face-swap using convolutional neural networks. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Nie\u00dfner, M. (2019, January 15\u201320). FaceForensics++: Learning to Detect Manipulated Facial Images. Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref_52","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., and Ferrer, C.C. (2020). The deepfake detection challenge (DFDC) dataset. arXiv."},{"key":"ref_53","unstructured":"Khalid, H., Tariq, S., Kim, M., and Woo, S.S. (2021, January 6). FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. Proceedings of the Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2), Virtual."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., and Zisserman, A. (2018, January 2\u20136). VoxCeleb2: Deep Speaker Recognition. Proceedings of the INTERSPEECH, Hyderabad, India.","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"ref_55","unstructured":"Nirkin, Y., Keller, Y., and Hassner, T. (November, January 27). Fsgan: Subject agnostic face swapping and reenactment. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea."},{"key":"ref_56","unstructured":"Jia, Y., Zhang, Y., Weiss, R., Wang, Q., Shen, J., Ren, F., Nguyen, P., Pang, R., Lopez Moreno, I., and Wu, Y. (2018). Transfer learning from speaker verification to multispeaker text-to-speech synthesis. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Prajwal, K., Mukhopadhyay, R., Namboodiri, V.P., and Jawahar, C. (2020, January 12\u201316). A lip sync expert is all you need for speech to lip generation in the wild. Proceedings of the ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413532"},{"key":"ref_58","unstructured":"Barrington, S., Bohacek, M., and Farid, H. (2024). DeepSpeak Dataset v1.0. arXiv."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Almutairi, Z., and Elgibreen, H. (2022). A Review of Modern Audio Deepfake Detection Methods: Challenges and Future Directions. Algorithms, 15.","DOI":"10.3390\/a15050155"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"175","DOI":"10.5753\/jbcs.2024.3966","article-title":"Catastrophic Forgetting in Deep Learning: A Comprehensive Taxonomy","volume":"30","author":"Aleixo","year":"2024","journal-title":"J. Braz. Comput. Soc."},{"key":"ref_61","first-page":"3366","article-title":"A Continual Learning Survey: Defying Forgetting in Classification Tasks","volume":"44","author":"Aljundi","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"5362","DOI":"10.1109\/TPAMI.2024.3367329","article-title":"A Comprehensive Survey of Continual Learning: Theory, Method and Application","volume":"46","author":"Wang","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1561\/3300000048","article-title":"Navigating the Soundscape of Deception: A Comprehensive Survey on Audio Deepfake Generation, Detection, and Future Horizons","volume":"6","author":"Wani","year":"2024","journal-title":"Found. Trends\u00ae Priv. Secur."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/s10462-024-11062-0","article-title":"Advances and Challenges in Learning from Experience Replay","volume":"58","author":"Neves","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_65","unstructured":"Kang, S., Shi, Z., and Zhang, X. (2023, January 23\u201329). Poisoning Generative Replay in Continual Learning to Promote Forgetting. Proceedings of the International Conference on Machine Learning, PMLR, Honolulu, HI, USA."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Ma, H., Yi, J., Tao, J., Bai, Y., Tian, Z., and Wang, C. (2021). Continual Learning for Fake Audio Detection. arXiv.","DOI":"10.21437\/Interspeech.2021-794"},{"key":"ref_67","unstructured":"Nguyen Le, T.D., Teh, K.K., and Dat Tran, H. (2024). Continuous Learning of Transformer-based Audio Deepfake Detection. arXiv."},{"key":"ref_68","first-page":"1","article-title":"Joint Audio-Visual Attention with Contrastive Learning for More General Deepfake Detection","volume":"20","author":"Zhang","year":"2024","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_69","unstructured":"Dong, F., Tang, Q., Bai, Y., and Wang, Z. (2024). Advancing Continual Learning for Robust Deepfake Audio Classification. arXiv."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"8131","DOI":"10.1109\/TII.2021.3064052","article-title":"An Intelligent Transient Stability Assessment Framework with Continual Learning Ability","volume":"17","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Zhang, X., Yi, J., Wang, C., Zhang, C.Y., Zeng, S., and Tao, J. (2024, January February). What to Remember: Self-Adaptive Continual Learning for Audio DeepFake Detection. Proceedings of the AAAI Conference on Artificial Intelligence, Vancouver, BC, Canada.","DOI":"10.1609\/aaai.v38i17.29929"},{"key":"ref_72","unstructured":"Antonacopoulos, A., Chaudhuri, S., Chellappa, R., Liu, C.L., Bhattacharya, S., and Pal, U. (2025). Audio Deepfake Detection: A Continual Approach with Feature Distillation and Dynamic Class Rebalancing. International Conference on Pattern Recognition, Springer."},{"key":"ref_73","unstructured":"Zhang, X., Yi, J., and Tao, J. (2024). EVDA: Evolving Deepfake Audio Detection Continual Learning Benchmark. arXiv."},{"key":"ref_74","unstructured":"Salvi, D., Negroni, V., Bondi, L., Bestagini, P., and Tubaro, S. (2025, January 6\u201311). Freeze and Learn: Continual Learning with Selective Freezing for Speech Deepfake Detection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"151188","DOI":"10.1109\/ACCESS.2024.3480320","article-title":"Empirical Assessment of Deepfake Detection: Advancing Judicial Evidence Verification through Artificial Intelligence","volume":"12","author":"Hydara","year":"2024","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","article-title":"Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead","volume":"1","author":"Rudin","year":"2019","journal-title":"Nat. Mach. Intell."},{"key":"ref_77","first-page":"301403","article-title":"Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models","volume":"42","author":"Solanke","year":"2022","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.inffus.2023.03.008","article-title":"A systematic review of trustworthy and explainable artificial intelligence in healthcare: Assessment of quality, bias risk, and data fusion","volume":"96","author":"Albahri","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_79","unstructured":"National Research Council, Policy and Global Affairs, Division on Engineering and Physical Sciences, Committee on Science, Technology, and Law, Committee on Applied and Theoretical Statistics, and Committee on Identifying the Needs of the Forensic Sciences Community (2009). Strengthening Forensic Science in the United States: A path forward, National Academies Press."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3392878","article-title":"Human factors in model interpretability: Industry practices, challenges, and needs","volume":"4","author":"Hong","year":"2020","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"ref_81","first-page":"1","article-title":"Enhancing Forensic Analysis of Digital Evidence Using Machine Learning: Techniques, Applications, and Challenges","volume":"18","author":"Jain","year":"2024","journal-title":"Int. J. Innov. Res. Multidiscip. Perspect. Stud. (IJIRMPS)"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s44206-023-00081-z","article-title":"Explainable AI and law: An evidential survey","volume":"3","author":"Richmond","year":"2024","journal-title":"Digit. Soc."},{"key":"ref_83","unstructured":"Sletten, A.H.d.S. (2023). Leveraging Explainability Maps for Group-Unsupervised Robustness to Spurious Correlations. [Master\u2019s Thesis, UiT Norges Arktiske Universitet]."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Nailwal, S., Singhal, S., Singh, N.T., and Raza, A. (2023, January 1\u20132). Deepfake Detection: A Multi-Algorithmic and Multi-Modal Approach for Robust Detection and Analysis. Proceedings of the 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), Chennai, India.","DOI":"10.1109\/RMKMATE59243.2023.10369155"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Lim, S.Y., Chae, D.K., and Lee, S.C. (2022). Detecting DeepFake Voice Using Explainable Deep Learning Techniques. Appl. Sci., 12.","DOI":"10.3390\/app12083926"},{"key":"ref_86","first-page":"103720","article-title":"An Explainable DeepFake of Speech Detection Method with Spectrograms and Waveforms","volume":"81","author":"Yu","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_87","unstructured":"Channing, G., Sock, J., Clark, R., Torr, P., and de Witt, C.S. (2024). Toward Robust Real-World Audio Deepfake Detection: Closing the Explainability Gap. arXiv."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Ilyas, H., Javed, A., and Malik, K.M. (2024, January 15\u201318). ConvNext-PNet: An Interpretable and Explainable Deep-Learning Model for DeepFakes Detection. Proceedings of the 2024 IEEE International Joint Conference on Biometrics (IJCB), Buffalo, NY, USA.","DOI":"10.1109\/IJCB62174.2024.10744484"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"104145","DOI":"10.1016\/j.cviu.2024.104145","article-title":"Acoustic Features Analysis for Explainable Machine Learning-Based Audio Spoofing Detection","volume":"249","author":"Bisogni","year":"2024","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., Nie\u00dfner, M., and Battiato, S. (2022, January 19\u201320). On the Exploitation of Deepfake Model Recognition. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshop, New Orleans, LA, USA.","DOI":"10.1109\/CVPRW56347.2022.00016"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Pontorno, O., Guarnera, L., and Battiato, S. (2024, January 27\u201330). On the Exploitation of DCT-Traces in the Generative-AI Domain. Proceedings of the 2024 IEEE International Conference on Image Processing (ICIP), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/ICIP51287.2024.10648013"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"15477","DOI":"10.1109\/TPAMI.2023.3301451","article-title":"Reverse engineering of generative models: Inferring model hyperparameters from generated images","volume":"45","author":"Asnani","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., and Battiato, S. (2020, January 14\u201319). Deepfake Detection by Analyzing Convolutional Traces. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"165085","DOI":"10.1109\/ACCESS.2020.3023037","article-title":"Fighting Deepfake by Exposing the Convolutional Traces on Images","volume":"8","author":"Guarnera","year":"2020","journal-title":"IEEE Access"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Giudice, O., Guarnera, L., and Battiato, S. (2021). Fighting Deepfakes by Detecting GAN DCT Anomalies. J. Imaging, 7.","DOI":"10.3390\/jimaging7080128"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652027","article-title":"Mastering Deepfake Detection: A Cutting-Edge Approach to Distinguish GAN and Diffusion-Model Images","volume":"20","author":"Guarnera","year":"2024","journal-title":"Acm Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Pontorno, O., Guarnera, L., and Battiato, S. (2025). DeepFeatureX Net: Deep Features eXtractors based Network for Discriminating Synthetic from Real Images. International Conference on Pattern Recognition, Springer.","DOI":"10.1007\/978-3-031-78305-0_12"},{"key":"ref_98","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2024, January 2\u20135). Exploring the synthetic speech attribution problem through data-driven detectors. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy."},{"key":"ref_99","unstructured":"Yu, N., Davis, L.S., and Fritz, M. (November, January 27). Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Seoul, Republic of Korea."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Yu, N., Skripniuk, V., Abdelnabi, S., and Fritz, M. (2021, January 11\u201317). Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, BC, Canada.","DOI":"10.1109\/ICCV48922.2021.01418"},{"key":"ref_101","unstructured":"Yang, T., Huang, Z., Cao, J., Li, L., and Li, X. (March, January 22). DeepFake Network Architecture Attribution. Proceedings of the AAAI Conference on Artificial Intelligence, Online."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Sun, Z., Chen, S., Yao, T., Yin, B., Yi, R., Ding, S., and Ma, L. (2023, January 2\u20133). Contrastive Pseudo Learning for Open-World DeepFake Attribution. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Paris, France.","DOI":"10.1109\/ICCV51070.2023.01909"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Liu, E.Y., Guo, Z., Zhang, X., Jojic, V., and Wang, W. (2012, January 10). Metric Learning from Relative Comparisons by Minimizing Squared Residual. Proceedings of the 2012 IEEE 12th International Conference on Data Mining, Brussels, Belgium.","DOI":"10.1109\/ICDM.2012.38"},{"key":"ref_105","first-page":"12104","article-title":"Training Generative Adversarial Networks with Limited Data","volume":"Volume 33","author":"Larochelle","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1007\/s11263-024-02184-7","article-title":"Rethinking Open-World DeepFake Attribution with Multi-perspective Sensory Learning","volume":"133","author":"Sun","year":"2025","journal-title":"Int. J. Comput. Vis."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Leotta, R., Giudice, O., Guarnera, L., and Battiato, S. (2023). Not with My Name! Inferring Artists\u2019 Names of Input Strings Employed by Diffusion Models. International Conference on Image Analysis and Processing, Springer.","DOI":"10.1007\/978-3-031-43148-7_31"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Huang, Z., Li, B., Cai, Y., Wang, R., Guo, S., Fang, L., Chen, J., and Wang, L. (2023, January 2\u20133). What Can Discriminator Do? Towards Box-Free Ownership Verification of Generative Adversarial Networks. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Paris, France.","DOI":"10.1109\/ICCV51070.2023.00462"},{"key":"ref_109","unstructured":"Guarnera, L., Guarnera, F., Ortis, A., Battiato, S., and Puglisi, G. (2024). Evasion Attack on Deepfake Detection via DCT Trace Manipulation. International Conference on Pattern Recognition, Springer."},{"key":"ref_110","unstructured":"Cuccovillo, L., Papastergiopoulos, C., Vafeiadis, A., Yaroshchuk, A., Aichroth, P., Votis, K., and Tzovaras, D. (2024, January 2\u20135). Open Challenges in Synthetic Speech Detection. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wei, G., and He, Q. (2011, January 10\u201313). Channel Pattern Noise-Based Playback Attack Detection Algorithm for Speaker Recognition. Proceedings of the IEEE International Conference on Machine Learning and Cybernetics (ICMLC), Guilin, China.","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"ref_112","unstructured":"Malik, H. (March, January 28\u2013). Securing Voice-Driven Interfaces Against Fake (Cloned) Audio Attacks. Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, CA, USA."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/s13635-021-00116-3","article-title":"Synthetic Speech Detection Through Short-Term and Long-Term Prediction Traces","volume":"2021","author":"Borrelli","year":"2021","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_114","unstructured":"Mari, D., Salvi, D., Bestagini, P., and Milani, S. (2023, January 18\u201322). All-for-One and One-For-All: Deep learning-based feature fusion for Synthetic Speech Detection. Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases Workshops (ECML PKDD), Turin, Italy."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Tak, H., Patino, J., Todisco, M., Nautsch, A., Evans, N., and Larcher, A. (2021, January 6\u201311). End-to-end anti-spoofing with RawNet2. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada.","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Jung, J.w., Heo, H.S., Tak, H., Shim, H.j., Chung, J.S., Lee, B.J., Yu, H.J., and Evans, N. (2022, January 22\u201327). AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Singapore.","DOI":"10.1109\/ICASSP43922.2022.9747766"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"134018","DOI":"10.1109\/ACCESS.2022.3231480","article-title":"Deepfake Audio Detection via MFCC Features using Machine Learning","volume":"10","author":"Hamza","year":"2022","journal-title":"IEEE Access"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2023, January 4\u201310). Reliability Estimation for Synthetic Speech Detection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece.","DOI":"10.1109\/ICASSP49357.2023.10095524"},{"key":"ref_119","unstructured":"Yadav, A.K.S., Bhagtani, K., Salvi, D., Bestagini, P., and Delp, E.J. (2024, January 17\u201318). FairSSD: Understanding Bias in Synthetic Speech Detectors. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA."},{"key":"ref_120","unstructured":"Negroni, V., Salvi, D., Mezza, A.I., Bestagini, P., and Tubaro, S. (2025, January 6\u201311). Leveraging Mixture of Experts for Improved Speech Deepfake Detection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Sahidullah, M., Kinnunen, T., and Hanil\u00e7i, C. (2015, January 6\u201310). A Comparison of Features for Synthetic Speech Detection. Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Dresden, Germany.","DOI":"10.21437\/Interspeech.2015-472"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Conti, E., Salvi, D., Borrelli, C., Hosler, B., Bestagini, P., Antonacci, F., Sarti, A., Stamm, M.C., and Tubaro, S. (2022, January 22\u201327). Deepfake Speech Detection Through Emotion Recognition: A Semantic Approach. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Singapore.","DOI":"10.1109\/ICASSP43922.2022.9747186"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Attorresi, L., Salvi, D., Borrelli, C., Bestagini, P., and Tubaro, S. (2022, January 21\u201325). Combining Automatic Speaker Verification and Prosody Analysis for Synthetic Speech Detection. Proceedings of the International Conference on Pattern Recognition (ICPR), Montreal, QC, Canada.","DOI":"10.1007\/978-3-031-37742-6_21"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Ge, W., Todisco, M., and Evans, N. (2022, January 18\u201322). Explainable DeepFake and Spoofing Detection: An Attack Analysis Using SHapley Additive ExPlanations. Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Incheon, Republic of Korea.","DOI":"10.21437\/Odyssey.2022-10"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2023, January 4\u20138). Towards Frequency Band Explainability in Synthetic Speech Detection. Proceedings of the European Signal Processing Conference (EUSIPCO), Helsinki, Fnland.","DOI":"10.23919\/EUSIPCO58844.2023.10289804"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Salvi, D., Balcha, T.S., Bestagini, P., and Tubaro, S. (2024, January 14\u201319). Listening Between the Lines: Synthetic Speech Detection Disregarding Verbal Content. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing Workshops (ICASSPW), Seoul, Republic of Korea.","DOI":"10.1109\/ICASSPW62465.2024.10669901"},{"key":"ref_127","unstructured":"Gohari, M., Salvi, D., Bestagini, P., and Adami, N. (2025, January 6\u201311). Audio Features Investigation for Singing Voice Deepfake Detection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India."},{"key":"ref_128","unstructured":"Salvi, D., Yadav, A.K.S., Bhagtani, K., Negroni, V., Bestagini, P., and Delp, E.J. (2024, January 27\u201330). Comparative Analysis of ASR Methods for Speech Deepfake Detection. Proceedings of the 58th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA."},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Kawa, P., Plata, M., Czuba, M., Szymanski, P., and Syga, P. (2023, January 20\u201324). Improved DeepFake Detection Using Whisper Features. Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH), Dublin, Ireland.","DOI":"10.21437\/Interspeech.2023-1537"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Guo, Y., Huang, H., Chen, X., Zhao, H., and Wang, Y. (2024, January 14\u201319). Audio Deepfake Detection With Self-Supervised Wavlm Furthermore, Multi-Fusion Attentive Classifier. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea.","DOI":"10.1109\/ICASSP48485.2024.10447923"},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2023, January 12). Synthetic speech detection through audio folding. Proceedings of the ACM International Workshop on Multimedia AI against Disinformation (MAD), Thessaloniki, Greece.","DOI":"10.1145\/3592572.3592844"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., and Lyu, S. (2019, January 12\u201317). Exposing DeepFakes Using Inconsistent Head Poses. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., and Stamminger, M. (2019, January 7\u201311). Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations. Proceedings of the IEEE Winter Applications of Computer Vision Workshops (WACVW), Waikoloa Village, HI, USA.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Amerini, I., Galteri, L., Caldelli, R., and Del Bimbo, A. (2019, January 15\u201320). DeepFake Video Detection Through Optical Flow-Based CNN. Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"ref_135","unstructured":"Koopman, M., Rodriguez, A.M., and Geradts, Z. (2018, January 29\u201331). Detection of DeepFake Video Manipulation. Proceedings of the Irish Machine Vision and Image Processing Conference (IMVIP), Belfast, Northern Ireland."},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., and Echizen, I. (2018, January 11\u201313). MesoNet: A Compact Facial Video Forgery Detection Network. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., and Delp, E.J. (2018, January 27\u201330). DeepFake Video Detection Using Recurrent Neural Networks. Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Bonettini, N., Cannas, E.D., Mandelli, S., Bondi, L., Bestagini, P., and Tubaro, S. (2021, January 10\u201315). Video Face Manipulation Detection Through Ensemble of CNNs. Proceedings of the International Conference on Pattern Recognition (ICPR), Milan, Italy.","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., and Yu, N. (2021, January 19\u201325). Multi-Attentional DeepFake Detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., and Yu, N. (2021, January 20\u201325). Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref_141","unstructured":"Ciftci, U.A., Demir, I., and Yin, L. (IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI), 2020). FakeCatcher: Detection of Synthetic Portrait Videos Using Biological Signals, IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI), online ahead of print."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Hosler, B., Salvi, D., Murray, A., Antonacci, F., Bestagini, P., Tubaro, S., and Stamm, M.C. (2021, January 20\u201325). Do Deepfakes Feel Emotions? A Semantic Approach to Detecting Deepfakes via Emotional Inconsistencies. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPRW53098.2021.00112"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Lomnitz, M., Hampel-Arias, Z., Sandesara, V., and Hu, S. (2020, January 13\u201315). Multimodal Approach for DeepFake Detection. Proceedings of the IEEE Applied Imagery Pattern Recognition Workshop (AIPR), Washington DC, DC, USA.","DOI":"10.1109\/AIPR50011.2020.9425192"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Khalid, H., Kim, M., Tariq, S., and Woo, S.S. (2021, January 24). Evaluation of an Audio-Video Multimodal DeepFake Dataset Using Unimodal and Multimodal Detectors. Proceedings of the Workshop on Synthetic Multimedia-Audiovisual DeepFake Generation and Detection, Virtual.","DOI":"10.1145\/3476099.3484315"},{"key":"ref_145","unstructured":"Korshunov, P., Halstead, M., Castan, D., Graciarena, M., McLaren, M., Burns, B., Lawson, A., and Marcel, S. (2019, January 10\u201315). Tampered Speaker Inconsistency Detection with Phonetically Aware Audio-Visual Features. Proceedings of the International Conference on Machine Learning (ICML), Long Beach, CA, USA."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., El-Gaaly, T., and Lim, S.N. (2020, January 6\u201311). Detecting Deep-Fake Videos from Appearance and Behavior. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), New York, NY, USA.","DOI":"10.1109\/WIFS49906.2020.9360904"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Hu, L., Ng, E., Darrell, T., Li, H., and Rohrbach, A. (2023, January 2\u20137). Watch Those Words: Video Falsification Detection Using Word-Conditioned Facial Motion. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA.","DOI":"10.1109\/WACV56688.2023.00469"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Oorloff, T., Koppisetti, S., Bonettini, N., Solanki, D., Colman, B., Yacoob, Y., Shahriyari, A., and Bharaj, G. (2024, January 17\u201321). AVFF: Audio-Visual Feature Fusion for Video Deepfake Detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR52733.2024.02559"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Salvi, D., Liu, H., Mandelli, S., Bestagini, P., Zhou, W., Zhang, W., and Tubaro, S. (2023). A Robust Approach to Multimodal Deepfake Detection. J. Imaging, 9.","DOI":"10.3390\/jimaging9060122"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSEC.2024.3390555","article-title":"Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images","volume":"22","author":"Maiano","year":"2024","journal-title":"IEEE Secur. Priv."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MSP.2023.3275319","article-title":"Information Forensics and Security: A Quarter-Century-Long Journey","volume":"40","author":"Barni","year":"2023","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1073\/pnas.1611835114","article-title":"Overcoming Catastrophic Forgetting in Neural Networks","volume":"114","author":"Kirkpatrick","year":"2017","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_153","first-page":"859","article-title":"Unlocking the Black Box: An In-Depth Review on Interpretability, Explainability, and Reliability in Deep Learning","volume":"37","author":"Arslan","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1080\/00051144.2024.2400640","article-title":"Securing Online Integrity: A Hybrid Approach to DeepFake Detection and Removal Using Explainable AI and Adversarial Robustness Training","volume":"65","author":"Maheshwari","year":"2024","journal-title":"Automatika"},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"e1438","DOI":"10.1002\/widm.1438","article-title":"DeepFake Attribution: On the Source Identification of Artificially Generated Images","volume":"12","author":"Khoo","year":"2022","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3533378","article-title":"Challenges in Deploying Machine Learning: A Survey of Case Studies","volume":"55","author":"Paleyes","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_157","unstructured":"Semola, R., Lomonaco, V., and Bacciu, D. (2022). Continual-Learning-as-a-Service (claas): On-demand Efficient Adaptation of Predictive Models. arXiv."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Boato, G., Pasquini, C., Stefani, A.L., Verde, S., and Miorandi, D. (2022, January 10\u201313). TrueFace: A Dataset for the Detection of Synthetic Face Images from Social Networks. Proceedings of the 2022 IEEE International Joint Conference on Biometrics (IJCB), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/IJCB54206.2022.10007988"},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., and Verdoliva, L. (2018, January 10\u201312). Detection of GAN-Generated Fake Images over Social Networks. Proceedings of the 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL, USA.","DOI":"10.1109\/MIPR.2018.00084"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s13635-021-00117-2","article-title":"Media Forensics on Social Media Platforms: A Survey","volume":"2021","author":"Pasquini","year":"2021","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media Forensics and DeepFakes: An Overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Maier, A., and Riess, C. (2024). Reliable Out-of-Distribution Recognition of Synthetic Images. J. Imaging, 10.","DOI":"10.3390\/jimaging10050110"},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Luk\u00e1\u0161, J., Fridrich, J., and Goljan, M. (2006, January 15). Detecting Digital Image Forgeries Using Sensor Pattern Noise. Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San Jose, CA, USA.","DOI":"10.1117\/12.640109"},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/S1364-6613(99)01294-2","article-title":"Catastrophic Forgetting in Connectionist Networks","volume":"3","author":"French","year":"1999","journal-title":"Trends Cogn. Sci."},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"59930","DOI":"10.1109\/ACCESS.2024.3391809","article-title":"Towards Open-World Multimedia Forensics Through Media Signature Encoding","volume":"12","author":"Baracchi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Yang, K.C., Singh, D., and Menczer, F. (2024). Characteristics and Prevalence of Fake Social Media Profiles with AI-Generated Faces. arXiv.","DOI":"10.54501\/jots.v2i4.197"},{"key":"ref_167","unstructured":"Ricker, J., Assenmacher, D., Holz, T., Fischer, A., and Quiring, E. (October, January 30). AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images. Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses, Padua, Italy."},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Koonce, B., and Koonce, B. (2021). ResNet 50. Convolutional Neural Networks with Swift for TensorFlow: Image Recognition and Dataset Categorization, Apress.","DOI":"10.1007\/978-1-4842-6168-2"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"2153","DOI":"10.1016\/j.procs.2023.01.191","article-title":"A GAN-Based Model of Deepfake Detection in Social Media","volume":"218","author":"Kumar","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/MSP.2021.3120982","article-title":"More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner]","volume":"39","author":"Lago","year":"2021","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Corvi, R., Nie\u00dfner, M., and Verdoliva, L. (2024, January 16\u201322). Raising the Bar of AI-Generated Image Detection with CLIP. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPRW63382.2024.00439"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Marcon, F., Pasquini, C., and Boato, G. (2021). Detection of Manipulated Face Videos Over Social Networks: A Large-Scale Study. J. Imaging, 7.","DOI":"10.3390\/jimaging7100193"},{"key":"ref_173","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2013). Intriguing Properties of Neural Networks. arXiv."},{"key":"ref_174","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. arXiv."},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., and Swami, A. (2017, January 2\u20136). Practical Black-Box Attacks Against Machine Learning. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3052973.3053009"},{"key":"ref_176","doi-asserted-by":"crossref","unstructured":"Barni, M., Kallas, K., Nowroozi, E., and Tondi, B. (2019, January 12\u201317). On the Transferability of Adversarial Examples Against CNN-Based Image Forensics. Proceedings of the ICASSP\u2014IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683772"},{"key":"ref_177","unstructured":"Rosa, V.D., Guillaro, F., Poggi, G., Cozzolino, D., and Verdoliva, L. (2024, January 2\u20135). Exploring the Adversarial Robustness of CLIP for AI-generated Image Detection. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"100573","DOI":"10.1016\/j.cosrev.2023.100573","article-title":"Defense Strategies for Adversarial Machine Learning: A Survey","volume":"49","author":"Bountakas","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref_179","doi-asserted-by":"crossref","unstructured":"Liang, H., He, E., Zhao, Y., Jia, Z., and Li, H. (2022). Adversarial Attack and Defense: A Survey. Electronics, 11.","DOI":"10.3390\/electronics11081283"},{"key":"ref_180","unstructured":"Athalye, A., Carlini, N., and Wagner, D. (2018, January 10\u201315). Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. Proceedings of the PMLR, International Conference on Machine Learning, Stockholm, Sweden."},{"key":"ref_181","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (2017). Towards Deep Learning Models Resistant to Adversarial Attacks. arXiv."},{"key":"ref_182","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., and Turner, A. (2018). Robustness May Be at Odds with Accuracy. arXiv."},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Purnekar, N., Abady, L., Tondi, B., and Barni, M. (2024, January 24\u201326). Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation. Proceedings of the Information Hiding & Multimedia Security Conference (IH&MMSEC), Baiona, Spain.","DOI":"10.1145\/3658664.3659635"},{"key":"ref_184","unstructured":"Barni, M., Nowroozi, E., and Tondi, B. (September, January 28). Higher-Order, Adversary-Aware, Double JPEG Detection via Selected Training on Attacked Samples. Proceedings of the 25th European Signal Processing Conference (EUSIPCO), Kos Island, Greece."},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"6084","DOI":"10.1109\/TIFS.2024.3409054","article-title":"MINTIME: Multi-Identity Size-Invariant Video Deepfake Detection","volume":"19","author":"Coccomini","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_186","doi-asserted-by":"crossref","unstructured":"Ciamarra, A., Caldelli, R., Becattini, F., Seidenari, L., and Del Bimbo, A. (2024, January 1\u20136). Deepfake Detection by Exploiting Surface Anomalies: The Surfake Approach. Proceedings of the 2024 IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW), Waikoloa, HI, USA.","DOI":"10.1109\/WACVW60836.2024.00112"},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Marra, F., Saltori, C., Boato, G., and Verdoliva, L. (2019, January 9\u201312). Incremental Learning for the Detection and Classification of GAN-Generated Images. Proceedings of the 2019 IEEE International Workshop on Information Forensics and Security (WIFS), Delft, The Netherlands.","DOI":"10.1109\/WIFS47025.2019.9035099"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Temmermans, F., Caldwell, S., Papadopoulos, S., Pereira, F., and Rixhon, P. (2023, January 11\u201313). Towards an International Standard to Establish Trust in Media Production, Distribution and Consumption. Proceedings of the 2023 24th International Conference on Digital Signal Processing (DSP), Island of Rhodes, Greece.","DOI":"10.1109\/DSP58604.2023.10167884"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Boyd, C. (2001). Short Signatures from the Weil Pairing. Advances in Cryptology\u2014ASIACRYPT 2001, Springer.","DOI":"10.1007\/3-540-45682-1"},{"key":"ref_190","unstructured":"Boneh, D., Gorbunov, S., Wahby, R.S., Wee, H., Wood, C.A., and Zhang, Z. (2025, January 15). BLS Signatures. Internet-Draft draft-irtf-cfrg-bls-signature-05, Internet Engineering Task Force. 202, Work in Progress. Available online: https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-bls-signature\/."},{"key":"ref_191","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA. CCS \u201906."},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Rasori, M., Perazzo, P., and Dini, G. (2018, January 18\u201320). ABE-Cities: An Attribute-Based Encryption System for Smart Cities. Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Sicily, Italy.","DOI":"10.1109\/SMARTCOMP.2018.00075"},{"key":"ref_193","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/s10207-020-00526-3","article-title":"Attribute-Based Encryption and Sticky Policies for Data Access Control in a Smart Home Scenario: A Comparison on Networked Smart Object Middleware","volume":"20","author":"Sicari","year":"2021","journal-title":"Int. J. Inf. Secur."},{"key":"ref_194","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., and Polosukhin, I. (2017). Attention Is All You Need. arXiv."},{"key":"ref_195","unstructured":"(2022, December 24). OpenAI. Available online: https:\/\/openai.com\/."},{"key":"ref_196","unstructured":"(2022, December 24). OpenAI Blog. Available online: https:\/\/openai.com\/blog\/chatgpt."},{"key":"ref_197","doi-asserted-by":"crossref","unstructured":"Catalfamo, A., Celesti, A., Fazio, M., Randazzo, G., and Villari, M. (July, January 30). A Platform for Federated Learning on the Edge: A Video Analysis Use Case. Proceedings of the 2022 IEEE Symposium on Computers and Communications (ISCC), Rhodes, Greece.","DOI":"10.1109\/ISCC55528.2022.9912968"},{"key":"ref_198","doi-asserted-by":"crossref","unstructured":"Garofalo, M., Catalfamo, A., Colosi, M., and Villari, M. (2024, January 15\u201316). Federated Objective: Assessing Client Truthfulness in Federated Learning. Proceedings of the International Conference on Big Data (IEEE BigData 2024), Washington DC, USA.","DOI":"10.1109\/BigData62323.2024.10825652"},{"key":"ref_199","doi-asserted-by":"crossref","unstructured":"Abdelgaber, Y.E., Ahmed, Y.A., Salem, M.A.M., and Salem, M.A.G. (2025, January 25\u201327). Federated Learning for Resource Management in Edge Computing. Proceedings of the 2023 Eleventh International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt.","DOI":"10.1109\/ICICIS58388.2023.10413933"},{"key":"ref_200","unstructured":"(2024, January 16\u201319). Mario Colosi, Alessio Catalfamo, M.G.; Villari., M. Enabling Flower for Federated Learning in Web Browsers in the Cloud-Edge- Client Continuum. Proceedings of the 2024 17th IEEE\/ACM International Conference on Utility and Cloud Computing (UCC 2024), Sharjah, United Arab Emirates."},{"key":"ref_201","unstructured":"(2024, January 26\u201329). Marco Garofalo, Mario Colosi, A.C.; Villari., M. Web-Centric Federated Learning over the Cloud-Edge Continuum Leveraging ONNX and WASM. Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC), Paris, France."},{"key":"ref_202","doi-asserted-by":"crossref","unstructured":"Catalfamo, A., Ruggeri, A., Celesti, A., Fazio, M., and Villari, M. (2021, January 5\u20138). A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication. Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), Athens, Greece.","DOI":"10.1109\/ISCC53001.2021.9631479"},{"key":"ref_203","doi-asserted-by":"crossref","unstructured":"Lukaj, V., Martella, F., Fazio, M., Galletta, A., Celesti, A., and Villari, M. (, January 1\u20134). Gateway-Based Certification Approach to Include IoT Nodes in a Trusted Edge\/Cloud Environment. Proceedings of the 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India.","DOI":"10.1109\/CCGridW59191.2023.00048"}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/11\/3\/73\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:44:22Z","timestamp":1760028262000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/11\/3\/73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,28]]},"references-count":203,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["jimaging11030073"],"URL":"https:\/\/doi.org\/10.3390\/jimaging11030073","relation":{},"ISSN":["2313-433X"],"issn-type":[{"value":"2313-433X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,28]]}}}