The deep learning-based face forgery detection is a novel yet challenging task. Despite impressive results have been achieved, there are still some limitations in the existing …
Y Lai, Z Luo, Z Yu - Chinese Conference on Biometric Recognition, 2023 - Springer
The rapid advancements in computer vision have stimulated remarkable progress in face forgery techniques, capturing the dedicated attention of researchers committed to detecting …
Recently, Deepfake arises as a powerful tool to fool the existing real-world face detection systems, which has received wide attention in both academia and society. Most existing …
Y Lai, Z Yu, J Yang, B Li, X Kang, L Shen - arXiv preprint arXiv:2406.20078, 2024 - arxiv.org
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and …
D Zhang, J Chen, X Liao, F Li, J Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid growth of Internet technology, security concerns have risen, particularly with the prevalence of Deepfakes, a popular visual forgery technique. Therefore, there is …
VN Tran, SG Kwon, SH Lee, HS Le, KR Kwon - IEEE Access, 2022 - ieeexplore.ieee.org
Face forgery generating algorithms that produce a range of manipulated videos/images have developed quickly. Consequently, this causes an increase in the production of fake …
J Yang, A Li, S Xiao, W Lu, X Gao - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid development of face manipulation technology, it is difficult for human eyes to distinguish fake face images. On the contrary, Convolutional Neural Network (CNN) …
In this paper, we propose a domain-general model, termed learning-to-weight (LTW), that guarantees face detection performance across multiple domains, particularly the target …
M Yu, S Ju, J Zhang, S Li, J Lei, X Li - Neurocomputing, 2022 - Elsevier
Facial forgery by DeepFake has recently attracted more public attention. Face image contains sensitive personal information, abuse of such technology will grow into a menace …