J Zhang, J Ni - … Conference on Multimedia and Expo (ICME), 2023 - ieeexplore.ieee.org
Though existing methods for face forgery detection achieve fairly good performance under the intra-dataset scenario, few of them gain satisfying results in the case of cross-dataset …
L Guan, F Liu, R Zhang, J Liu, Y Tang - Sensors, 2023 - mdpi.com
With the development of deepfake technology, deepfake detection has received widespread attention. Although some deepfake forensics techniques have been proposed, they are still …
J Liu, J Wang, P Zhang, C Wang… - Proceedings of the …, 2022 - openaccess.thecvf.com
Currently, many face forgery detection methods aggregate spatial and frequency features to enhance the generalization ability and gain promising performance under the cross-dataset …
A Das, S Das, A Dantcheva - 2021 16th IEEE International …, 2021 - ieeexplore.ieee.org
Manipulated images and videos, ie, deepfakes have become increasingly realistic due to the tremendous progress of deep learning methods. However, such manipulation has …
B Li, J Sun, CM Poskitt - arXiv preprint arXiv:2308.04177, 2023 - arxiv.org
Deepfake videos and images are becoming increasingly credible, posing a significant threat given their potential to facilitate fraud or bypass access control systems. This has motivated …
C Peng, F Sun, D Liu, N Wang, X Gao - Neural Networks, 2024 - Elsevier
With the rapid and continuous development of AIGC, It is becoming increasingly difficult to distinguish between real and forged facial images, which calls for efficient forgery detection …
Y Lai, G Yang, Y He, Z Luo, S Li - ICASSP 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
With diverse presentation forgery methods emerging continually, detecting the authenticity of images has drawn growing attention. Although existing methods have achieved impressive …
J Hu, X Liao, D Gao, S Tsutsui, Q Wang, Z Qin… - arXiv preprint arXiv …, 2023 - arxiv.org
Deepfake techniques have been widely used for malicious purposes, prompting extensive research interest in developing Deepfake detection methods. Deepfake manipulations …