{"id":"https://openalex.org/W4411172409","doi":"https://doi.org/10.1109/access.2025.3578343","title":"Attention-Enhanced CNN for High-Performance Deepfake Detection: A Multi-Dataset Study","display_name":"Attention-Enhanced CNN for High-Performance Deepfake Detection: A Multi-Dataset Study","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411172409","doi":"https://doi.org/10.1109/access.2025.3578343"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3578343","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3578343","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3578343","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111306239","display_name":"Subhram Dasgupta","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Subhram Dasgupta","raw_affiliation_strings":["Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA"],"raw_orcid":"https://orcid.org/0009-0000-0399-1952","affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091951066","display_name":"Kushal Badal","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kushal Badal","raw_affiliation_strings":["Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA"],"raw_orcid":"https://orcid.org/0000-0001-7249-2049","affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034497755","display_name":"Swetha Chittam","orcid":"https://orcid.org/0000-0002-5434-2562"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swetha Chittam","raw_affiliation_strings":["Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111235330","display_name":"Md Tasnim Alam","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Tasnim Alam","raw_affiliation_strings":["Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070531407","display_name":"Kaushik Roy","orcid":"https://orcid.org/0000-0002-9026-5322"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaushik Roy","raw_affiliation_strings":["Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA"],"raw_orcid":"https://orcid.org/0000-0002-9026-5322","affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]},{"raw_affiliation_string":"Department of Computer Science, North Carolina A&#x0026;T State University, 1601 E. Market St, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111306239"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":21.3934,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.99269263,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"13","issue":null,"first_page":"101980","last_page":"101993"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9538000226020813,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084002733230591},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34244680404663086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084002733230591},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34244680404663086}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3578343","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3578343","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9e9fc9a66f104040b15d392d91982037","is_oa":true,"landing_page_url":"https://doaj.org/article/9e9fc9a66f104040b15d392d91982037","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 101980-101993 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3578343","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3578343","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8104040288","display_name":null,"funder_award_id":"1900187","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Deepfakes,":[0],"which":[1],"emerge":[2],"from":[3],"advanced":[4],"deep":[5,48],"learning":[6,49],"techniques,":[7],"present":[8],"complex":[9],"ethical":[10],"and":[11,16,25,41,59,121,134,149,153,167,170,176,218],"security":[12],"challenges":[13],"across":[14,215],"media":[15,28],"communication":[17],"landscapes.":[18],"While":[19],"offering":[20],"creative":[21],"potential":[22,35,220],"in":[23,63],"education":[24],"entertainment,":[26],"synthetic":[27],"technologies":[29],"simultaneously":[30],"threaten":[31],"societal":[32],"trust":[33],"through":[34],"misinformation,":[36],"opinion":[37],"manipulation,":[38],"privacy":[39],"violations,":[40],"identity":[42],"fraud.":[43],"With":[44],"the":[45,51,64,102,146,154,188,192,197],"advancement":[46],"of":[47,53,66,132,138,165,174,191,199],"models,":[50],"creation":[52],"deepfake":[54,68,94,209],"images":[55,113],"has":[56],"become":[57],"easier":[58],"more":[60],"convincing,":[61],"resulting":[62],"development":[65],"reliable":[67],"detection":[69,95,130],"models.":[70],"This":[71],"research":[72],"works":[73],"with":[74,82,163,203],"a":[75,83,92,99,129,204],"method":[76],"that":[77],"combines":[78],"multi-head":[79,201],"self-attention":[80,202],"(MHSA)":[81],"custom":[84],"designed":[85],"convolutional":[86,205],"neural":[87,206],"network":[88,207],"(CNN)":[89],"to":[90,186],"develop":[91],"robust":[93],"model.":[96,193],"We":[97],"created":[98],"dataset":[100,109,152],"called":[101],"Center":[103],"for":[104,208,221],"Cyber":[105],"Defense":[106],"DeepFake":[107],"(CCDDF)":[108],"by":[110],"generating":[111],"fake":[112],"using":[114],"publicly":[115],"available":[116],"Artificial":[117],"Intelligent":[118],"(AI)":[119],"tools":[120],"trained":[122],"our":[123,143],"model":[124,144],"on":[125,145],"these":[126],"data,":[127],"achieving":[128],"accuracy":[131],"97%":[133],"an":[135],"AUC":[136,172],"score":[137],"99.58.":[139],"Additionally,":[140],"we":[141,181],"evaluated":[142],"140K":[147],"Real":[148],"Fake":[150],"Faces":[151],"Celeb-DF":[155],"v2":[156],"dataset,":[157],"where":[158],"it":[159],"demonstrated":[160],"exceptional":[161],"performance":[162,214],"accuracies":[164],"98%":[166],"94%":[168],"respectively,":[169],"corresponding":[171],"scores":[173],"99.75":[175],"98.72.":[177],"To":[178],"enhance":[179],"interpretability,":[180],"utilized":[182],"attention":[183],"heatmap":[184],"visualizations":[185],"analyze":[187],"decision-making":[189],"process":[190],"Our":[194],"results":[195],"demonstrate":[196],"effectiveness":[198],"combining":[200],"detection,":[210],"highlighting":[211],"its":[212,219],"strong":[213],"multiple":[216],"datasets":[217],"real-world":[222],"applications.":[223]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-20T08:49:12.498775","created_date":"2025-10-10T00:00:00"}
