{"id":"https://openalex.org/W4407639662","doi":"https://doi.org/10.1109/acit62805.2024.10877153","title":"Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning","display_name":"Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407639662","doi":"https://doi.org/10.1109/acit62805.2024.10877153"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10877153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095690985","display_name":"Shahad Altamimi","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Shahad Altamimi","raw_affiliation_strings":["Princess Sumaya University for Technology,Cyber Security Department,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Cyber Security Department,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086930227","display_name":"Walid Salameh","orcid":"https://orcid.org/0000-0002-6281-0362"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Walid Salameh","raw_affiliation_strings":["Princess Sumaya University for Technology,Computer Science Department,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology,Computer Science Department,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5095690985"],"corresponding_institution_ids":["https://openalex.org/I158749337"],"apc_list":null,"apc_paid":null,"fwci":0.275,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59446763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.926800012588501,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.8082528114318848},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7713147401809692},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5708956122398376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5595039129257202},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4359268546104431}],"concepts":[{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.8082528114318848},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7713147401809692},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5708956122398376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5595039129257202},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4359268546104431}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62805.2024.10877153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W3045543353","https://openalex.org/W3090899510","https://openalex.org/W3112260362","https://openalex.org/W3175691511","https://openalex.org/W3212277844","https://openalex.org/W4206251372","https://openalex.org/W4211008685","https://openalex.org/W4234049788","https://openalex.org/W4312539889","https://openalex.org/W4313037573","https://openalex.org/W4316660588","https://openalex.org/W4317796367","https://openalex.org/W4352981324","https://openalex.org/W4361792588","https://openalex.org/W4386323971","https://openalex.org/W4387446068","https://openalex.org/W4389633690","https://openalex.org/W4390188318","https://openalex.org/W4391020828","https://openalex.org/W4392313553","https://openalex.org/W4393405747","https://openalex.org/W4394564913","https://openalex.org/W4395070086","https://openalex.org/W6796949262"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W2951211570"],"abstract_inverted_index":{"The":[0,14,28,61,118],"unchecked":[1],"spread":[2],"of":[3,35,71,84,128,134,185,191,199],"deepfake":[4,42,171,192],"videos":[5,19],"jeopardizes":[6],"public":[7],"trust,":[8],"national":[9],"security,":[10],"and":[11,25,54,88,97,108,130,152,164,194],"media":[12],"credibility.":[13],"capacity":[15],"to":[16,31,67,182],"recognize":[17],"falsified":[18],"is":[20,175],"critical":[21],"for":[22,40],"protecting":[23],"privacy":[24],"combatting":[26],"misinformation.":[27],"article":[29],"seeks":[30],"illustrate":[32],"the":[33,64,69,78,95,102,114,122,161,183,188,197,200],"usage":[34],"Deep":[36],"Learning":[37],"(DL)":[38],"approaches":[39],"recognizing":[41,170],"videos,":[43,87],"including":[44],"Recurrent":[45],"Neural":[46],"Networks":[47],"(RNN),":[48],"Long":[49],"Short-Term":[50],"Memory":[51],"(LSTM)":[52],"networks,":[53],"an":[55],"RNN-LSTM":[56],"combination":[57],"with":[58,203],"Transfer":[59],"Learning.":[60],"research":[62],"used":[63,104],"LSTM":[65],"model":[66,123],"examine":[68],"efficacy":[70],"temporal":[72],"correlations":[73],"between":[74],"video":[75],"frames":[76],"in":[77,93,159,169,187,196],"Deepfake":[79],"Detection":[80],"Challenge":[81],"(DFDC)":[82],"dataset":[83],"deep":[85],"fake":[86],"it":[89,138,179],"claimed":[90],"complete":[91],"success":[92],"both":[94],"training":[96],"testing":[98],"stages.":[99],"In":[100],"addition,":[101],"study":[103,174],"frame":[105],"level":[106],"masks":[107],"characteristics":[109],"that":[110,121,137],"were":[111],"created":[112],"throughout":[113],"research's":[115],"pre-processing":[116],"steps.":[117],"findings":[119],"show":[120],"had":[124],"a":[125,131],"train":[126],"loss":[127,133],"0.021":[129],"test":[132],"0.813,":[135],"suggesting":[136],"was":[139],"extremely":[140],"resilient.":[141],"Other":[142],"crucial":[143],"indicator":[144],"measures,":[145],"such":[146],"as":[147],"Mean":[148],"Squared":[149],"Error":[150],"(MSE)":[151],"Structural":[153],"Similarity":[154],"Index":[155],"Measure":[156],"(SSIM),":[157],"aid":[158],"evaluating":[160],"model's":[162],"performance":[163],"validate":[165],"its":[166],"high":[167],"accuracy":[168],"material.":[172],"This":[173],"very":[176],"important":[177],"since":[178],"greatly":[180],"contributes":[181],"body":[184],"knowledge":[186],"early":[189],"phases":[190],"identification":[193],"aids":[195],"mitigation":[198],"risks":[201],"connected":[202],"manipulated":[204],"media.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
