{"id":"https://openalex.org/W4416251514","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228117","title":"Face Forgery Detection Attack via Hybrid Perturbation with Dual Mask","display_name":"Face Forgery Detection Attack via Hybrid Perturbation with Dual Mask","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251514","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228117"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056604529","display_name":"Zhiwei Wu","orcid":"https://orcid.org/0000-0002-8163-2215"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zixiang Wu","raw_affiliation_strings":["Beijing University of Technology,School of Information Science and Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,School of Information Science and Technology,Beijing,China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100632765","display_name":"Dongming Zhang","orcid":"https://orcid.org/0000-0002-1237-7177"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dongming Zhang","raw_affiliation_strings":["People&#x2019;s Daily Online,State Key Laboratory of Communication Content Cognition,Beijing,China"],"affiliations":[{"raw_affiliation_string":"People&#x2019;s Daily Online,State Key Laboratory of Communication Content Cognition,Beijing,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032383728","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0003-1290-0738"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["Beijing University of Technology,School of Information Science and Technology,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,School of Information Science and Technology,Beijing,China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056087686","display_name":"Zijie Yang","orcid":"https://orcid.org/0000-0003-4359-2600"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zijie Yang","raw_affiliation_strings":["People&#x2019;s Daily Online,State Key Laboratory of Communication Content Cognition,Beijing,China"],"affiliations":[{"raw_affiliation_string":"People&#x2019;s Daily Online,State Key Laboratory of Communication Content Cognition,Beijing,China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056604529"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18285263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.009100000374019146,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0038999998942017555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7001000046730042},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6133999824523926},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.5321000218391418},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.447299987077713},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.35760000348091125},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.3337000012397766},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.3312000036239624},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3077999949455261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7400000095367432},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7001000046730042},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6133999824523926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5478000044822693},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.5321000218391418},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5073000192642212},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.447299987077713},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.35760000348091125},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3352999985218048},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3337000012397766},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.3312000036239624},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30660000443458557},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.30379998683929443},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3028999865055084},{"id":"https://openalex.org/C2986089797","wikidata":"https://www.wikidata.org/wiki/Q6501338","display_name":"Visual attention","level":3,"score":0.29580000042915344},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.2915000021457672},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2849000096321106},{"id":"https://openalex.org/C2779679900","wikidata":"https://www.wikidata.org/wiki/Q25304431","display_name":"Saliency map","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C3019440502","wikidata":"https://www.wikidata.org/wiki/Q500430","display_name":"Dual role","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26159998774528503},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.26089999079704285},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.2565000057220459},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2133665775","https://openalex.org/W2180612164","https://openalex.org/W2475287302","https://openalex.org/W2603766943","https://openalex.org/W2765424254","https://openalex.org/W2891145043","https://openalex.org/W2962770929","https://openalex.org/W2962858109","https://openalex.org/W2963448658","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2979259381","https://openalex.org/W2981803355","https://openalex.org/W2982058372","https://openalex.org/W3034577585","https://openalex.org/W3034795015","https://openalex.org/W3035743198","https://openalex.org/W3136555065","https://openalex.org/W3161810785","https://openalex.org/W3174814557","https://openalex.org/W3175958943","https://openalex.org/W3193285461","https://openalex.org/W3202281277","https://openalex.org/W3204217431","https://openalex.org/W4214636423","https://openalex.org/W4296079585","https://openalex.org/W4312716239","https://openalex.org/W4386072305","https://openalex.org/W4388430649","https://openalex.org/W4390052175","https://openalex.org/W4394717653"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,115],"attempt":[4],"to":[5,12,24,33,40,72,77,90,101,106,161],"attack":[6,21,143,169,197],"deep":[7],"forgery":[8],"detection":[9,99],"systems":[10],"rigorously":[11],"uncover":[13],"their":[14,26],"shortcomings.":[15],"Unlike":[16],"existing":[17,191],"methods":[18,192],"that":[19,140,186],"solely":[20],"fake":[22,66,94],"regions":[23,32,57,67],"increase":[25],"authenticity,":[27],"the":[28,73,86,98,108,112,124,136],"proposed":[29],"identifies":[30,55],"decisive":[31],"decision":[34],"and":[35,61,126,131,165,171,181],"creates":[36],"a":[37,51,62,117,155],"dual":[38,46],"mask":[39,47,75,88],"carry":[41],"out":[42],"different":[43],"attacks.":[44],"The":[45,183],"comprises":[48],"two":[49,150],"components:":[50],"positive":[52,74],"mask,":[53,64],"which":[54,121],"real":[56,81],"for":[58,68],"targeted":[59],"attacks,":[60],"negative":[63,87],"pinpointing":[65],"disruption.":[69],"Perturbations":[70],"applied":[71],"aim":[76,89],"bolster":[78],"confidence":[79,92],"in":[80,93,168,193],"decisions,":[82,95],"while":[83,145],"those":[84],"on":[85,179],"diminish":[91],"thereby":[96],"inducing":[97],"system":[100],"make":[102],"erroneous":[103],"judgments.":[104],"Additionally,":[105],"enhance":[107],"visual":[109,147],"quality":[110],"of":[111,128,138,195],"manipulated":[113],"samples,":[114,134],"introduce":[116],"hybrid":[118],"constraint":[119],"optimization,":[120],"carefully":[122],"balances":[123],"advantages":[125],"disadvantages":[127],"spatial":[129],"perturbations":[130,139],"frequency-domain":[132],"adversarial":[133,163],"facilitating":[135],"learning":[137],"maintain":[141],"high":[142],"efficacy":[144],"preserving":[146],"fidelity.":[148],"These":[149],"modules":[151],"are":[152],"integrated":[153],"into":[154],"novel":[156],"GAN-based":[157],"attacking":[158],"network,":[159],"HPDM,":[160],"generate":[162],"samples":[164],"achieve":[166],"improvements":[167],"transferability":[170],"imperceptibility.":[172],"We":[173],"evaluated":[174],"our":[175,187],"method":[176],"through":[177],"experiments":[178],"FFHQ":[180],"FF++.":[182],"results":[184],"demonstrate":[185],"approach":[188],"consistently":[189],"outperforms":[190],"terms":[194],"average":[196],"efficacy.":[198]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
