{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T12:24:05Z","timestamp":1777292645411,"version":"3.51.4"},"reference-count":31,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"abstract":"<p>Deepfake detection in e-commerce platforms demands lightweight, efficient, and accurate models capable of real-time performance. This paper proposes a semantic-aware, lightweight ShuffleNet-based model optimized for detecting image-based deepfake content. The proposed model integrates ShuffleNet with a Semantic Knowledge Graph (SKG) for enhanced deepfake image detection. The SKG links extracted visual features with contextual metadata, enabling a more interpretable and knowledge-driven classification process. The proposed model achieves an accuracy of 76.15%, precision of 80.97%, recall of 76.15%, and F1-score of 74.79% while significantly reducing computational costs. Compared to standard architectures like DenseNet, MobileNet, and EfficientNet, the model achieves the lowest FLOPs (295.57M) and parameter count (1.26M). These results highlight the model's ability to outperform existing architectures in balancing performance and computational efficiency. The proposed solution is ideal for real-time, resource-constrained environments, positioning it as an effective tool for combating deepfake challenges in online retail.<\/p>","DOI":"10.4018\/ijswis.384517","type":"journal-article","created":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T12:08:09Z","timestamp":1752062889000},"page":"1-16","source":"Crossref","is-referenced-by-count":2,"title":["Semantic-Aware Lightweight AI Model for Deepfake Image Detection in Online Retail Platforms"],"prefix":"10.4018","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1366-539X","authenticated-orcid":true,"given":"Vincent Shin-Hung","family":"Pan","sequence":"first","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5796-9424","authenticated-orcid":true,"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[{"name":"Ronin Institute, USA & Center for Interdisciplinary Research, University of Petroleum and Energy Studies, Dehradun, India"}]},{"given":"Saoucene","family":"Mahfoudh","sequence":"additional","affiliation":[{"name":"School of Engineering, Computing, and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7288-0122","authenticated-orcid":true,"given":"Turki","family":"Althaqafi","sequence":"additional","affiliation":[{"name":"Computer Science Department, School of Engineering, Computing and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4505-7268","authenticated-orcid":true,"given":"Wadee","family":"Alhalabi","sequence":"additional","affiliation":[{"name":"Immersive Virtual Reality Research Group, Department of Computer Science, King Abdulaziz University, Jeddah, Saudi Arabia & Computer Science Department, School of Engineering, Computing, and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia"}]},{"given":"Ramakrishnan","family":"Raman","sequence":"additional","affiliation":[{"name":"Symbiosis International University, Pune, India"}]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Asia University, Taiwan"}]}],"member":"2432","reference":[{"key":"IJSWIS.384517-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-7371-8_6"},{"key":"IJSWIS.384517-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103911"},{"key":"IJSWIS.384517-2","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297032"},{"key":"IJSWIS.384517-3","unstructured":"Bharath, G. (2025) The Evolution of Phishing Attacks: From Emails to Deepfake Scams, Insights2Techinfo, pp.1 https:\/\/insights2techinfo.com\/the-evolution-of-phishing-attacks-from-emails-to-deepfake-scams\/"},{"key":"IJSWIS.384517-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78305-0_8"},{"key":"IJSWIS.384517-5","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.332769"},{"key":"IJSWIS.384517-6","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.328771"},{"key":"IJSWIS.384517-7","unstructured":"Cruz, B. (2024). 2024 deepfakes guide and statistics. Security.org. https:\/\/www.security.org\/resources\/deepfake-statistics\/"},{"key":"IJSWIS.384517-8","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01241-0"},{"key":"IJSWIS.384517-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.365288"},{"key":"IJSWIS.384517-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78305-0_15"},{"key":"IJSWIS.384517-11","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.336550"},{"key":"IJSWIS.384517-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78305-0_13"},{"key":"IJSWIS.384517-13","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.353301"},{"key":"IJSWIS.384517-14","unstructured":"Karki, M. (2022). Deepfake and real images. Kaggle. https:\/\/www.kaggle.com\/datasets\/manjilkarki\/deepfake-and-real-images"},{"key":"IJSWIS.384517-15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78189-6_5"},{"key":"IJSWIS.384517-16","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00047"},{"key":"IJSWIS.384517-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.129055"},{"key":"IJSWIS.384517-18","unstructured":"Mounish, K. V. S. (2024) Deepfakes impact on Biometric Authentication, Insights2Techinfo, pp.1 https:\/\/insights2techinfo.com\/deepfakes-impact-on-biometric-authentication\/"},{"key":"IJSWIS.384517-19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3352890"},{"key":"IJSWIS.384517-20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78305-0_9"},{"key":"IJSWIS.384517-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2024.105370"},{"key":"IJSWIS.384517-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111299"},{"key":"IJSWIS.384517-23","doi-asserted-by":"publisher","DOI":"10.1108\/IJRDM-12-2021-0583"},{"key":"IJSWIS.384517-24","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.345246"},{"key":"IJSWIS.384517-25","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.21.3.0889"},{"key":"IJSWIS.384517-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.08.010"},{"key":"IJSWIS.384517-27","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.367281"},{"key":"IJSWIS.384517-28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4637-6"},{"key":"IJSWIS.384517-29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"IJSWIS.384517-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111253"}],"container-title":["International Journal on Semantic Web and Information Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=384517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T22:07:29Z","timestamp":1765577249000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSWIS.384517"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijswis.384517","relation":{},"ISSN":["1552-6283","1552-6291"],"issn-type":[{"value":"1552-6283","type":"print"},{"value":"1552-6291","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,8]]}}}