{"id":"https://openalex.org/W3138631890","doi":"https://doi.org/10.1109/imcom51814.2021.9377373","title":"Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation","display_name":"Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation","publication_year":2021,"publication_date":"2021-01-04","ids":{"openalex":"https://openalex.org/W3138631890","doi":"https://doi.org/10.1109/imcom51814.2021.9377373","mag":"3138631890"},"language":"en","primary_location":{"id":"doi:10.1109/imcom51814.2021.9377373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom51814.2021.9377373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053862284","display_name":"Eric Tjon","orcid":"https://orcid.org/0000-0002-0887-3100"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eric Tjon","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021884742","display_name":"Melody Moh","orcid":"https://orcid.org/0000-0002-8313-6645"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Melody Moh","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019298277","display_name":"Teng-Sheng Moh","orcid":"https://orcid.org/0000-0002-2726-102X"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Teng-Sheng Moh","raw_affiliation_strings":["Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jos\u00e9 State University, San Jos\u00e9, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053862284"],"corresponding_institution_ids":["https://openalex.org/I51504820"],"apc_list":null,"apc_paid":null,"fwci":0.9607,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.76735294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8348101377487183},{"id":"https://openalex.org/keywords/segmentation","display_name":"Segmentation","score":0.7404335737228394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6887962222099304},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6352142691612244},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6139596700668335},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.534069836139679},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5321810841560364},{"id":"https://openalex.org/keywords/residual-neural-network","display_name":"Residual neural network","score":0.5280107855796814},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.47099441289901733},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.44944408535957336},{"id":"https://openalex.org/keywords/image-segmentation","display_name":"Image segmentation","score":0.43736183643341064},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39620208740234375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8348101377487183},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.7404335737228394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6887962222099304},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6352142691612244},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6139596700668335},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.534069836139679},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5321810841560364},{"id":"https://openalex.org/C2944601119","wikidata":"https://www.wikidata.org/wiki/Q43744058","display_name":"Residual neural network","level":3,"score":0.5280107855796814},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.47099441289901733},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.44944408535957336},{"id":"https://openalex.org/C124504099","wikidata":"https://www.wikidata.org/wiki/Q56933","display_name":"Image segmentation","level":3,"score":0.43736183643341064},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39620208740234375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom51814.2021.9377373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom51814.2021.9377373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W2341528187","https://openalex.org/W2806757392","https://openalex.org/W2891145043","https://openalex.org/W2902304528","https://openalex.org/W2911424785","https://openalex.org/W2922358462","https://openalex.org/W2955425717","https://openalex.org/W2963155035","https://openalex.org/W2963616706","https://openalex.org/W2963684180","https://openalex.org/W2964150021","https://openalex.org/W2982058372","https://openalex.org/W3009360213","https://openalex.org/W3011743184","https://openalex.org/W3034713808","https://openalex.org/W3034785488","https://openalex.org/W3035446294","https://openalex.org/W3037967553","https://openalex.org/W3083246145","https://openalex.org/W3093010840","https://openalex.org/W3096493794","https://openalex.org/W3101998545","https://openalex.org/W3116020990","https://openalex.org/W4287752100","https://openalex.org/W6751846511","https://openalex.org/W6756925667","https://openalex.org/W6762718338","https://openalex.org/W6763289557","https://openalex.org/W6779607597","https://openalex.org/W6787988991"],"related_works":["https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W41015297","https://openalex.org/W4298072154"],"abstract_inverted_index":{"Advances":[0],"in":[1,34],"generative":[2],"models":[3],"and":[4,26,41,61,70,84,96,124],"manipulation":[5],"techniques":[6],"have":[7],"given":[8],"rise":[9],"to":[10,21,55,107],"digitally":[11],"altered":[12,60],"videos":[13,18],"known":[14],"as":[15,38],"deepfakes.":[16],"These":[17],"are":[19],"difficult":[20],"identify":[22],"for":[23],"both":[24,82],"humans":[25],"machines.":[27],"Modern":[28],"detection":[29],"methods":[30],"exploit":[31],"various":[32],"weaknesses":[33],"deepfake":[35,86],"videos,":[36],"such":[37],"visual":[39,57],"artifacts":[40],"inconsistent":[42],"posing.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47,115,132],"describe":[48],"a":[49,71,74,78,144],"novel":[50],"architecture":[51,65],"called":[52],"Eff-YNet":[53],"designed":[54],"detect":[56,108],"differences":[58],"between":[59],"unaltered":[62],"areas.":[63],"The":[64,88],"combines":[66],"an":[67,135],"EfficientNet":[68],"encoder":[69],"U-Net":[72],"with":[73],"classification":[75,129],"branch":[76],"into":[77],"model":[79],"capable":[80],"of":[81,90,137],"classifying":[83],"segmenting":[85],"videos.":[87],"task":[89],"segmentation":[91,100],"helps":[92],"train":[93],"the":[94,119],"classifier":[95],"also":[97,103],"produces":[98],"useful":[99],"masks.":[101],"We":[102],"implement":[104],"ResNet":[105],"3D":[106],"spatiotemporal":[109],"inconsistencies.":[110],"To":[111],"test":[112],"these":[113,138],"models,":[114],"run":[116],"experiments":[117],"against":[118],"Deepfake":[120],"Detection":[121],"Challenge":[122],"dataset":[123],"show":[125],"improvements":[126],"over":[127,143],"baseline":[128],"models.":[130],"Furthermore,":[131],"find":[133],"that":[134],"ensemble":[136],"two":[139],"approaches":[140],"improves":[141],"performance":[142],"single":[145],"approach":[146],"alone.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
