{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:06:29Z","timestamp":1730246789516,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/icip42928.2021.9506460","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T21:08:41Z","timestamp":1629752921000},"page":"3917-3921","source":"Crossref","is-referenced-by-count":3,"title":["Fake Face Detection using Local Binary Pattern and Ensemble Modeling"],"prefix":"10.1109","author":[{"given":"Yonghui","family":"Wang","sequence":"first","affiliation":[{"name":"Prairie View A&M University, Prairie View,Computer Science,TX,USA"}]},{"given":"Vahid","family":"Zarghami","sequence":"additional","affiliation":[{"name":"Prairie View A&M University, Prairie View,Computer Science,TX,USA"}]},{"given":"Suxia","family":"Cui","sequence":"additional","affiliation":[{"name":"Prairie View A&M University, Prairie View,Electrical and Computer Engineering,TX,USA"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Advancing high ?delity identity swapping for forgery detection","author":"li","year":"2020","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref11","first-page":"1","article-title":"Deepfake video detection using recurrent neural networks","author":"g\u00fcera","year":"2018","journal-title":"2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"},{"key":"ref12","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"2019","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops"},{"key":"ref13","article-title":"Fighting fake news: Image splice detection via learned self-consistency","author":"huh","year":"2018","journal-title":"arXiv preprint arXiv 1805 04096 [cs CV]"},{"key":"ref14","article-title":"Exposing fake images with forensic similarity graphs","author":"mayer","year":"2019","journal-title":"arXiv preprint arXiv 1912 02861 [eess IV]"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT50178.2020.9241108"},{"key":"ref16","article-title":"Deep residual learning for image recognition","author":"he","year":"2015","journal-title":"arXiv preprint arXiv 1512 03385"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890743"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref19","article-title":"Pollen grain microscopic image classification using an ensemble of fine-tuned deep convolutional neural networks","author":"mahbod","year":"2020","journal-title":"arXiv preprint arXiv 2011 07428 [cs CV]"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1360612.1360638","article-title":"Face swapping: Automatically replacing faces in photographs","volume":"27","author":"bitouk","year":"2008","journal-title":"ACM Trans Graph"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref5","article-title":"The deepfake detection challenge (DFDC) preview dataset","author":"dolhansky","year":"2019","journal-title":"arXiv preprint arXiv 1910 08854"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3414034"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref2","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning"},{"key":"ref9","article-title":"Fake face detection via adaptive residuals extraction network","author":"guo","year":"2020","journal-title":"arXiv preprint arXiv 2005 04945 [cs CV]"},{"key":"ref1","first-page":"2672","article-title":"Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"Proceedings of the International Conference on Neural Information Processing Systems (NIPS 2014)"},{"key":"ref20","article-title":"Uncertainty-driven ensembles of deep architectures for multiclass classification. application to covid-19 diagnosis in chest x-ray images","author":"arco","year":"2020","journal-title":"arXiv preprint arXiv 2011 14894 [eess IV]"},{"key":"ref21","article-title":"Going deeper with convolutions","author":"szegedy","year":"2014","journal-title":"arXiv preprint arXiv 1409 4842"}],"event":{"name":"2021 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2021,9,19]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9506008\/9506009\/09506460.pdf?arnumber=9506460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T23:58:30Z","timestamp":1670371110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9506460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icip42928.2021.9506460","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}