{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T09:11:47Z","timestamp":1759396307418,"version":"build-2065373602"},"reference-count":98,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Publications"],"abstract":"<jats:p>The recent growth of generative artificial intelligence (AI) has brought new possibilities and revolutionary applications in many fields. It has also, however, created important ethical and security issues, especially with the abusive use of deepfakes, which are artificial media that can propagate very realistic but false information. This paper provides an extensive bibliometric, statistical, and trend analysis of deepfake research in the age of generative AI. Utilizing the Web of Science (WoS) database for the years 2014\u20132024, the research identifies key authors, influential publications, collaboration networks, and leading institutions. Biblioshiny (Bibliometrix R package, University of Naples Federico II, Naples, Italy) and VOSviewer (version 1.6.20, Centre for Science and Technology Studies, Leiden University, Leiden, The Netherlands) are utilized in the research for mapping the science production, theme development, and geographical distribution. The cutoff point of ten keyword frequencies by occurrence was applied to the data for relevance. This study aims to provide a comprehensive snapshot of the research status, identify gaps in the knowledge, and direct upcoming studies in the creation, detection, and mitigation of deepfakes. The study is intended to help researchers, developers, and policymakers understand the trajectory and impact of deepfake technology, supporting innovation and governance strategies. The findings highlight a strong average annual growth rate of 61.94% in publications between 2014 and 2024, with China, the United States, and India as leading contributors, IEEE Access among the most influential sources, and three dominant clusters emerging around disinformation, generative models, and detection methods.<\/jats:p>","DOI":"10.3390\/publications13040050","type":"journal-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T08:20:28Z","timestamp":1759393228000},"page":"50","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Decade of Deepfake Research in the Generative AI Era, 2014\u20132024: A Bibliometric Analysis"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1219-5963","authenticated-orcid":false,"given":"Btissam","family":"Acim","sequence":"first","affiliation":[{"name":"IPSS Team, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9053-4345","authenticated-orcid":false,"given":"Mohamed","family":"Boukhlif","sequence":"additional","affiliation":[{"name":"LTI Laboratory, National School of Applied Sciences, Chouaib Doukkali University, El Jadida 24000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6064-9302","authenticated-orcid":false,"given":"Hamid","family":"Ouhnni","sequence":"additional","affiliation":[{"name":"IPSS Team, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9105-1062","authenticated-orcid":false,"given":"Nassim","family":"Kharmoum","sequence":"additional","affiliation":[{"name":"IPSS Team, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco"},{"name":"National Center for Scientific and Technical Research (CNRST), Rabat 10000, Morocco"},{"name":"SMSD, Moroccan Society of Digital Health, Rabat 08007, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5357-9170","authenticated-orcid":false,"given":"Soumia","family":"Ziti","sequence":"additional","affiliation":[{"name":"IPSS Team, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco"},{"name":"SMSD, Moroccan Society of Digital Health, Rabat 08007, Morocco"},{"name":"LIAS, Artificial Intelligence and Systems Laboratory, Hassan II University in Casablanca, Casablanca 20360, Morocco"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Abafe, E. A., Bahta, Y. T., and Jordaan, H. (2022). Exploring Biblioshiny for historical assessment of global research on sustainable use of water in agriculture. Sustainability, 14, (17).","DOI":"10.3390\/su141710651"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"101475","DOI":"10.1016\/j.imu.2024.101475","article-title":"Towards revolutionizing precision healthcare: A systematic literature review of artificial intelligence methods in precision medicine","volume":"46","author":"Abbaoui","year":"2024","journal-title":"Informatics in Medicine Unlocked"},{"key":"ref_3","first-page":"351","article-title":"Mental health therapy: A comparative study of generative AI and deepfake technology","volume":"Vol. 1403","author":"Ezziyyani","year":"2025a","journal-title":"International conference on advanced intelligent systems for sustainable development (AI2SD 2024)"},{"key":"ref_4","first-page":"349","article-title":"The role of generative AI in deepfake detection: A systematic literature review","volume":"Vol. 1330","author":"Lagmiri","year":"2025b","journal-title":"Smart business and technologies. ICSBT 2024"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., Fried, O., and Agrawala, M. (, January June). Detecting deep-fake videos from phoneme\u2013Viseme mismatches. IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW 2020), Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"ref_6","first-page":"18","article-title":"A comparison between two main academic literature collections: Web of science and scopus databases","volume":"9","author":"Salehi","year":"2013","journal-title":"Asian Social Science"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alkhammash, R. (2023). Bibliometric, network, and thematic mapping analyses of metaphor and discourse in COVID-19 publications from 2020 to 2022. Frontiers in Psychology, 13.","DOI":"10.3389\/fpsyg.2022.1062943"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"16711","DOI":"10.1109\/ACCESS.2023.3246661","article-title":"DFFMD: A deepfake face mask dataset for infectious disease era with deepfake detection algorithms","volume":"11","author":"Alnaim","year":"2023","journal-title":"IEEE Access"},{"key":"ref_9","unstructured":"Amerini, I., Galteri, L., Caldelli, R., and Del Bimbo, A. (, January October). Deepfake video detection through optical flow based CNN. IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW), Seoul, Republic of Korea."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1002\/ehf2.12583","article-title":"The difference in referencing in Web of Science, Scopus, and Google Scholar","volume":"6","author":"Anker","year":"2019","journal-title":"ESC Heart Failure"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ansorge, L. (2024). Bibliometric studies as a publication strategy. Metrics, 1, (1).","DOI":"10.3390\/metrics1010005"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TTS.2024.3427816","article-title":"Beyond a reasonable doubt? Audiovisual evidence, AI manipulation, deepfakes, and the law","volume":"5","author":"Apolo","year":"2024","journal-title":"IEEE Transactions on Technology and Society"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","article-title":"Bibliometrix: An R-tool for comprehensive science mapping analysis","volume":"11","author":"Aria","year":"2017","journal-title":"Journal of Informetrics"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"482","DOI":"10.5195\/jmla.2022.1434","article-title":"VOSviewer and Bibliometrix","volume":"110","author":"Arruda","year":"2022","journal-title":"Journal of the Medical Library Association"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1162\/qss_a_00018","article-title":"Web of Science as a data source for research on scientific and scholarly activity","volume":"1","author":"Birkle","year":"2020","journal-title":"Quantitative Science Studies"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Lakhera, G., Taneja, S., Ozen, E., Kukreti, M., and Kumar, P. (2024). A decade and a half of deepfake research: A bibliometric investigation into key themes. Navigating the world of deepfake technology, IGI Global.","DOI":"10.4018\/979-8-3693-5298-4"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Boukhlif, M., Hanine, M., and Kharmoum, N. (2023). A decade of intelligent software testing research: A bibliometric analysis. Electronics, 12, (9).","DOI":"10.3390\/electronics12092109"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"79383","DOI":"10.1109\/ACCESS.2024.3407753","article-title":"Natural language processing-based software testing: A systematic literature review","volume":"12","author":"Boukhlif","year":"2024a","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-031-52388-5_4","article-title":"Exploring the application of classical and intelligent software testing in medicine: A literature review","volume":"Vol. 904","author":"Boukhlif","year":"2024b","journal-title":"Lecture notes in networks and systems"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"102339","DOI":"10.1016\/j.mex.2023.102339","article-title":"A method for analyzing text using VOSviewer","volume":"11","author":"Bukar","year":"2023","journal-title":"MethodsX"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/JSTSP.2020.2999185","article-title":"Recurrent convolutional structures for audio spoof and video deepfake detection","volume":"14","author":"Chintha","year":"2020","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1002\/asi.4630280610","article-title":"Lotka\u2019s frequency distribution of scientific productivity","volume":"28","author":"Coile","year":"1977","journal-title":"Journal of the American Society for Information Science"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1080\/10304312.2022.2084039","article-title":"Deepfake culture: The emergence of audio-video deception as an object of social anxiety and regulation","volume":"36","author":"Cover","year":"2022","journal-title":"Continuum"},{"key":"ref_24","unstructured":"Cozzolino, D., Poggi, G., and Verdoliva, L. (, January June). Recasting residual-based local descriptors as convolutional neural networks: An application to image forgery detection. 5th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec \u201917), Philadelphia, PA, USA."},{"key":"ref_25","first-page":"156","article-title":"Bibliometric analysis using Bibliometrix: An R package","volume":"8","author":"Dervis","year":"2019","journal-title":"Journal of Scientific Research"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dhiman, B. (2023). Exploding AI-generated deepfakes and misinformation: A threat to global concern in the 21st century. Qeios.","DOI":"10.32388\/DPLE2L"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1007\/s11135-015-0206-0","article-title":"Multiple correspondence analysis: One only or several techniques?","volume":"50","year":"2016","journal-title":"Quality & Quantity"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3429","DOI":"10.1109\/TMM.2021.3098422","article-title":"Anti-forensics for face swapping videos via adversarial training","volume":"24","author":"Ding","year":"2022","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Domenteanu, A., T\u0103taru, G.-C., Cr\u0103ciun, L., Mol\u0103nescu, A.-G., Cotfas, L.-A., and Delcea, C. (2024). Living in the age of deepfakes: A bibliometric exploration of trends, challenges, and detection approaches. Information, 15, (9).","DOI":"10.3390\/info15090525"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","article-title":"How to conduct a bibliometric analysis: An overview and guidelines","volume":"133","author":"Donthu","year":"2021","journal-title":"Journal of Business Research"},{"key":"ref_31","first-page":"27","article-title":"A novel approach for detecting deep fake videos using graph neural network","volume":"11","author":"Abouhawwash","year":"2024","journal-title":"Journal of Big Data"},{"key":"ref_32","first-page":"65","article-title":"Artificial intelligence for fake news","volume":"Vol. 637","author":"Kacprzyk","year":"2023","journal-title":"International conference on advanced intelligent systems for sustainable development (AI2SD)"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Garg, D., and Gill, R. (, January December). Deepfake generation and detection\u2014An exploratory study. 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gautam Buddha Nagar, India.","DOI":"10.1109\/UPCON59197.2023.10434896"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"e4883","DOI":"10.4108\/eetsis.4883","article-title":"A bibliometric analysis of deepfakes: Trends, applications and challenges","volume":"11","author":"Garg","year":"2024","journal-title":"ICST Transactions on Scalable Information Systems"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"11295","DOI":"10.1007\/s00500-023-08605-y","article-title":"Deepfakes: Evolution and trends","volume":"27","author":"Gil","year":"2023","journal-title":"Soft Computing"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Communications of the ACM"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"165085","DOI":"10.1109\/ACCESS.2020.3023037","article-title":"Fighting deepfake by exposing the convolutional traces on images","volume":"8","author":"Guarnera","year":"2020","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"103170","DOI":"10.1016\/j.cviu.2021.103170","article-title":"Fake face detection via adaptive manipulation traces extraction network","volume":"204","author":"Guo","year":"2021","journal-title":"Computer Vision and Image Understanding"},{"key":"ref_39","first-page":"23","article-title":"Uncertainty-aware multidimensional scaling","volume":"29","author":"Hagele","year":"2023","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"134018","DOI":"10.1109\/ACCESS.2022.3231480","article-title":"Deepfake audio detection via MFCC features using machine learning","volume":"10","author":"Hamza","year":"2022","journal-title":"IEEE Access"},{"key":"ref_41","unstructured":"Harbath, K., and Khizanishvili, A. (2023). Insights from data: What the numbers tell us about elections and future of democracy, Integrity Institute. Available online: https:\/\/integrityinstitute.org\/blog\/insights-from-data."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TCSVT.2021.3074259","article-title":"Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network","volume":"32","author":"Hu","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.tust.2018.07.006","article-title":"Micro-seismic event detection and location in underground mines by using Convolutional Neural Networks (CNN) and deep learning","volume":"81","author":"Huang","year":"2018","journal-title":"Tunnelling and Underground Space Technology"},{"key":"ref_44","first-page":"191","article-title":"A study on CNN transfer learning for image classification","volume":"Vol. 840","author":"Lotfi","year":"2019","journal-title":"Advances in computational intelligence systems. UKCI 2018; Advances in intelligent systems and computing"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"151188","DOI":"10.1109\/ACCESS.2024.3480320","article-title":"Empirical assessment of deepfake detection: Advancing judicial evidence verification through artificial intelligence","volume":"12","author":"Hydara","year":"2024","journal-title":"IEEE Access"},{"key":"ref_46","first-page":"050020","article-title":"Deepfake impact, security threats and potential preventions","volume":"Vol. 2802","author":"Kalaiarasu","year":"2024","journal-title":"AIP conference proceedings"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"16","DOI":"10.22146\/jwk.5202","article-title":"Deepfake pornografi: Tren kekerasan gender berbasis online (KGBO) di era pandemi COVID-19","volume":"3","author":"Kasita","year":"2022","journal-title":"Jurnal Wanita dan Keluarga"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.bushor.2019.11.006","article-title":"Deepfakes: Trick or treat?","volume":"63","author":"Kietzmann","year":"2020","journal-title":"Business Horizons"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"301","DOI":"10.59534\/jcss.1358318","article-title":"Current usage areas of deepfake applications with artificial intelligence technology","volume":"3","author":"Kahraman","year":"2023","journal-title":"\u0130leti\u015fim ve Toplum Ara\u015ft\u0131rmalar\u0131 Dergisi"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"18461","DOI":"10.1007\/s11042-020-10420-8","article-title":"Detecting DeepFake, FaceSwap and Face2Face facial forgeries using frequency CNN","volume":"80","author":"Kohli","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"ref_51","first-page":"304","article-title":"An overview of deepfake methods in medical image processing for health care applications","volume":"Vol. 383","author":"Lakshmi","year":"2024","journal-title":"Frontiers in artificial intelligence and applications"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"107256","DOI":"10.1016\/j.asoc.2021.107256","article-title":"Detecting handcrafted facial image manipulations and GAN-generated facial images using Shallow-FakeFaceNet","volume":"105","author":"Lee","year":"2021","journal-title":"Applied Soft Computing"},{"key":"ref_53","unstructured":"Li, Y., Chang, M.-C., and Lyu, S. (, January December). In ictu oculi: Exposing AI-created fake videos by detecting eye blinking. IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Lim, S. Y., Chae, D. K., and Lee, S. C. (2022). Detecting deepfake voice using explainable deep learning techniques. Applied Sciences, 12, (8).","DOI":"10.3390\/app12083926"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1002\/joe.22229","article-title":"Guidelines for interpreting the results of bibliometric analysis: A sensemaking approach","volume":"43","author":"Lim","year":"2023","journal-title":"Global Business and Organizational Excellence"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"109628","DOI":"10.1016\/j.patcog.2023.109628","article-title":"DeepFaceLab: Integrated, flexible and extensible face-swapping framework","volume":"141","author":"Liu","year":"2023","journal-title":"Pattern Recognition"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/s13640-024-00621-8","article-title":"Assessment framework for deepfake detection in real-world situations","volume":"2024","author":"Lu","year":"2024","journal-title":"EURASIP Journal on Image and Video Processing"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Maddi, A., Maisonobe, M., and Boukacem-Zeghmouri, C. (2025). Geographical and disciplinary coverage of open access journals: OpenAlex, Scopus, and WoS. PLoS ONE, 20, (4).","DOI":"10.1371\/journal.pone.0320347"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1080\/23268743.2020.1757499","article-title":"\u2018A deepfake porn plot intended to silence me\u2019: Exploring continuities between pornographic and \u2018political\u2019 deep fakes","volume":"7","author":"Maddocks","year":"2020","journal-title":"Porn Studies"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","article-title":"Deepfake detection for human face images and videos: A survey","volume":"10","author":"Malik","year":"2022","journal-title":"IEEE Access"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"15557","DOI":"10.1007\/s10489-021-03156-x","article-title":"A shared updatable method of content regulation for deepfake videos based on blockchain","volume":"52","author":"Mao","year":"2022","journal-title":"Applied Intelligence"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Martin-Rodriguez, F., Garcia-Mojon, R., and Fernandez-Barciela, M. (2023). Detection of AI-created images using pixel-wise feature extraction and convolutional neural networks. Sensors, 23, (22).","DOI":"10.3390\/s23229037"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2023","journal-title":"Applied Intelligence"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Mira, F. (, January May). Deep learning technique for recognition of deep fake videos. 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET), London, UK.","DOI":"10.1109\/GlobConET56651.2023.10150143"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3425780","article-title":"The Creation and Detection of Deepfakes: A Survey","volume":"54","author":"Mirsky","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s11192-015-1765-5","article-title":"The journal coverage of Web of Science and Scopus: A comparative analysis","volume":"106","author":"Mongeon","year":"2016","journal-title":"Scientometrics"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"144497","DOI":"10.1109\/ACCESS.2023.3344653","article-title":"A survey on the detection and impacts of deepfakes in visual, audio, and textual formats","volume":"11","author":"Mubarak","year":"2023","journal-title":"IEEE Access"},{"key":"ref_68","first-page":"1","article-title":"Correspondence analysis in R, with two- and three-dimensional graphics: The ca package","volume":"20","author":"Greenacre","year":"2007","journal-title":"Journal of Statistical Software"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"103525","DOI":"10.1016\/j.cviu.2022.103525","article-title":"Deep learning for deepfakes creation and detection: A survey","volume":"223","author":"Nguyen","year":"2022","journal-title":"Computer Vision and Image Understanding"},{"key":"ref_70","first-page":"301394","article-title":"Likelihood ratios, health apps, artificial intelligence and deepfakes","volume":"41","author":"Nikkel","year":"2022","journal-title":"Forensic Science International: Digital Investigation"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Ouhnni, H., Acim, B., Belhiah, M., El Bouchti, K., Seghroucheni, Y. Z., Lagmiri, S. N., Benachir, R., and Ziti, S. (2025). The evolution of virtual identity: A systematic review of avatar customization technologies and their behavioral effects in VR environments. Frontiers in Virtual Reality, 6.","DOI":"10.3389\/frvir.2025.1496128"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"3333","DOI":"10.1007\/s11846-024-00738-0","article-title":"How to design bibliometric research: An overview and a framework proposal","volume":"18","author":"Kocaman","year":"2024","journal-title":"Review of Managerial Science"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"11674","DOI":"10.1109\/ACCESS.2024.3353785","article-title":"Coexistence of deepfake defenses: Addressing the poisoning challenge","volume":"12","author":"Park","year":"2024","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"22081","DOI":"10.1109\/ACCESS.2023.3251417","article-title":"An improved dense CNN architecture for deepfake image detection","volume":"11","author":"Patel","year":"2023a","journal-title":"IEEE Access"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"143296","DOI":"10.1109\/ACCESS.2023.3342107","article-title":"Deepfake generation and detection: Case study and challenges","volume":"11","author":"Patel","year":"2023b","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Pranckut\u0117, R. (2021). Web of Science (WoS) and Scopus: The titans of bibliographic information in today\u2019s academic world. Publications, 9, (1).","DOI":"10.3390\/publications9010012"},{"key":"ref_77","first-page":"318","article-title":"Overview of deepfake proactive defense techniques","volume":"29","author":"Qu","year":"2024","journal-title":"Journal of Image and Graphics"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"44","DOI":"10.34293\/sijash.v9i2.4197","article-title":"The research output of bibliometrics using Bibliometrix R package and VOSviewer","volume":"9","author":"Radha","year":"2021","journal-title":"Shanlax International Journal of Arts, Science and Humanities"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Ramluckan, T. (, January March). Deepfakes: The legal implications. 19th International Conference on Cyber Warfare and Security (ICCWS), Johannesburg, South Africa.","DOI":"10.34190\/iccws.19.1.2099"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Raza, A., Munir, K., and Almutairi, M. (2022). A novel deep learning approach for deepfake image detection. Applied Sciences, 12.","DOI":"10.3390\/app12199820"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"15","DOI":"10.53761\/2y2np178","article-title":"Deepfakes and higher education: A research agenda and scoping review of synthetic media","volume":"21","author":"Roe","year":"2024","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Saadouni, C., Jaouhari, S. E., Tamani, N., Ziti, S., Mroueh, L., and El Bouchti, K. (2025). Identification techniques in the Internet of Things: Survey, taxonomy and research frontier. IEEE Communications Surveys & Tutorials.","DOI":"10.1109\/COMST.2025.3541165"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1186\/s40537-020-00392-9","article-title":"Deep learning applications for COVID-19","volume":"8","author":"Shorten","year":"2021","journal-title":"Journal of Big Data"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Siegel, D., Kraetzer, C., Seidlitz, S., and Dittmann, J. (2021). Media forensics considerations on deepfake detection with handcrafted features. Journal of Imaging, 7, (7).","DOI":"10.3390\/jimaging7070108"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"5113","DOI":"10.1007\/s11192-021-03948-5","article-title":"The journal coverage of Web of Science, Scopus and Dimensions: A comparative analysis","volume":"126","author":"Singh","year":"2021","journal-title":"Scientometrics"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"17157","DOI":"10.1109\/TITS.2022.3154098","article-title":"A bibliometric analysis of IEEE T-ITS literature between 2010 and 2019","volume":"23","author":"Sun","year":"2022","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"3601","DOI":"10.1109\/TIFS.2025.3553803","article-title":"DDL: Effective and comprehensible interpretation framework for diverse deepfake detectors","volume":"20","author":"Sun","year":"2025","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Suratkar, S., Kazi, F., Sakhalkar, M., Abhyankar, N., and Kshirsagar, M. (, January December). Exposing deepfakes using convolutional neural networks and transfer learning approaches. 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India.","DOI":"10.1109\/INDICON49873.2020.9342252"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1016\/j.joi.2018.03.006","article-title":"Dimensions: A competitor to Scopus and the Web of Science?","volume":"12","author":"Thelwall","year":"2018","journal-title":"Journal of Informetrics"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","article-title":"Deepfakes and beyond: A survey of face manipulation and fake detection","volume":"64","author":"Tolosana","year":"2020","journal-title":"Information Fusion"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/TTS.2024.3493465","article-title":"What is so deep about deepfakes? A multidisciplinary thematic analysis of academic narratives about deepfake technology","volume":"6","author":"Twomey","year":"2025","journal-title":"IEEE Transactions on Technology and Society"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1923","DOI":"10.1109\/ACCESS.2024.3523288","article-title":"Visual deepfake detection: Review of techniques, tools, limitations, and future prospects","volume":"13","author":"Badshah","year":"2025","journal-title":"IEEE Access"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","article-title":"Software survey: VOSviewer, a computer program for bibliometric mapping","volume":"84","author":"Waltman","year":"2010","journal-title":"Scientometrics"},{"key":"ref_94","first-page":"5563868","article-title":"A bibliometric analysis of edge computing for internet of things","volume":"2021","author":"Wang","year":"2021","journal-title":"Security and Communication Networks"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"117865","DOI":"10.1109\/ACCESS.2023.3324403","article-title":"Deepfake on face and expression swap: A review","volume":"11","author":"Waseem","year":"2023","journal-title":"IEEE Access"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"102780","DOI":"10.1016\/j.technovation.2023.102784","article-title":"Mapping the deepfake landscape for innovation: A multidisciplinary systematic review and future research agenda","volume":"125","author":"Whittaker","year":"2023","journal-title":"Technovation"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"103119","DOI":"10.1016\/j.jvcir.2021.103119","article-title":"Detecting facial manipulated videos based on set convolutional neural networks","volume":"77","author":"Xu","year":"2021","journal-title":"Communication and Image Representation"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"303","DOI":"10.3390\/forecast3020020","article-title":"Fighting deepfakes using body language analysis","volume":"3","author":"Yasrab","year":"2021","journal-title":"Forecasting"}],"container-title":["Publications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2304-6775\/13\/4\/50\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T08:47:20Z","timestamp":1759394840000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2304-6775\/13\/4\/50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"references-count":98,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["publications13040050"],"URL":"https:\/\/doi.org\/10.3390\/publications13040050","relation":{},"ISSN":["2304-6775"],"issn-type":[{"value":"2304-6775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]}}}