{"id":"https://openalex.org/W4295046748","doi":"https://doi.org/10.1109/lsp.2022.3205562","title":"Protecting World Leader Using Facial Speaking Pattern Against Deepfakes","display_name":"Protecting World Leader Using Facial Speaking Pattern Against Deepfakes","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4295046748","doi":"https://doi.org/10.1109/lsp.2022.3205562"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2022.3205562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2022.3205562","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062868287","display_name":"Beilin Chu","orcid":"https://orcid.org/0000-0002-3024-0983"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Beilin Chu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003269656","display_name":"Weike You","orcid":"https://orcid.org/0000-0002-2642-6005"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weike You","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077813610","display_name":"Zhen Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059744997","display_name":"Linna Zhou","orcid":"https://orcid.org/0009-0004-0727-2436"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linna Zhou","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064139736","display_name":"Renying Wang","orcid":"https://orcid.org/0000-0002-4192-8054"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renying Wang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062868287"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":2.1129,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.88673127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"29","issue":null,"first_page":"2078","last_page":"2082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7792524099349976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.544888436794281},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.49908924102783203},{"id":"https://openalex.org/keywords/swap","display_name":"Swap (finance)","score":0.4871825575828552},{"id":"https://openalex.org/keywords/animation","display_name":"Animation","score":0.47559937834739685},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.43432000279426575},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4141172468662262},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.34011393785476685},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33624911308288574},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.12543022632598877},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09501615166664124}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7792524099349976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.544888436794281},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.49908924102783203},{"id":"https://openalex.org/C99821215","wikidata":"https://www.wikidata.org/wiki/Q1136583","display_name":"Swap (finance)","level":2,"score":0.4871825575828552},{"id":"https://openalex.org/C502989409","wikidata":"https://www.wikidata.org/wiki/Q11425","display_name":"Animation","level":2,"score":0.47559937834739685},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.43432000279426575},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4141172468662262},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.34011393785476685},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33624911308288574},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.12543022632598877},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09501615166664124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2022.3205562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2022.3205562","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G2425701146","display_name":null,"funder_award_id":"62172053","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1983586459","https://openalex.org/W2194775991","https://openalex.org/W2281375574","https://openalex.org/W2395639500","https://openalex.org/W2594690981","https://openalex.org/W2738947046","https://openalex.org/W2808631503","https://openalex.org/W2888519208","https://openalex.org/W2909336075","https://openalex.org/W2911424785","https://openalex.org/W2913399670","https://openalex.org/W2914447220","https://openalex.org/W2943235166","https://openalex.org/W2945262873","https://openalex.org/W2962793481","https://openalex.org/W2963541165","https://openalex.org/W2964024144","https://openalex.org/W2979259381","https://openalex.org/W2982058372","https://openalex.org/W2984700035","https://openalex.org/W2987809008","https://openalex.org/W2995516027","https://openalex.org/W3016011581","https://openalex.org/W3034577585","https://openalex.org/W3034713808","https://openalex.org/W3034900344","https://openalex.org/W3035446294","https://openalex.org/W3037675456","https://openalex.org/W3037967553","https://openalex.org/W3094728142","https://openalex.org/W3108854358","https://openalex.org/W3118709007","https://openalex.org/W3175342695","https://openalex.org/W4287752100","https://openalex.org/W6631190155","https://openalex.org/W6757663408","https://openalex.org/W6761937618","https://openalex.org/W6762480454","https://openalex.org/W6764542186","https://openalex.org/W6769920582","https://openalex.org/W6779607597","https://openalex.org/W6799942944"],"related_works":["https://openalex.org/W2103413230","https://openalex.org/W1899364738","https://openalex.org/W43171467","https://openalex.org/W2908959303","https://openalex.org/W2663901905","https://openalex.org/W2138569648","https://openalex.org/W2143020626","https://openalex.org/W2126942212","https://openalex.org/W2116300362","https://openalex.org/W2018638282"],"abstract_inverted_index":{"Face":[0],"forgery":[1],"instances":[2],"involving":[3],"celebrities":[4,81,112],"are":[5],"on":[6,23,38,52,122],"the":[7,11,24,70,162,173],"rise,":[8],"owing":[9],"to":[10,110,136,155,198],"ease":[12],"with":[13,45,90,128],"which":[14,42,91],"their":[15],"large":[16],"quantity":[17],"of":[18,175],"videos":[19,64],"may":[20],"be":[21],"accessible":[22],"Internet,":[25],"world":[26],"leaders":[27],"particularly.":[28],"While":[29],"current":[30],"face":[31,76],"manipulation":[32,77],"detectors":[33],"have":[34,94],"achieved":[35],"impressive":[36],"results":[37],"several":[39],"open":[40],"datasets,":[41],"incorporate":[43],"persons":[44],"various":[46],"identities,":[47],"they":[48],"show":[49,186],"performance":[50,192],"degradation":[51],"these":[53,62],"high-quality":[54],"ones":[55],"targeting":[56],"at":[57],"celebrities.":[58],"What":[59],"is":[60],"more,":[61],"online":[63],"usually":[65],"undergo":[66],"compression":[67,200],"processing,":[68],"marking":[69],"detection":[71,203],"task":[72],"harder.":[73],"Besides,":[74,141],"more":[75],"techniques":[78],"arise":[79],"for":[80],"other":[82],"than":[83,201],"face-swap,":[84],"such":[85],"as":[86],"lip-synchronize":[87],"and":[88,106,160,166,193],"image-animation,":[89],"most":[92],"works":[93],"not":[95],"been":[96],"concerned.":[97],"This":[98],"paper":[99],"proposes":[100],"a":[101,148,195],"dual":[102,144],"stream":[103,145],"learning":[104],"facial":[105,123,138,165],"speaking":[107,167],"patterns":[108],"method":[109,170,189],"protect":[111,172],"against":[113,178],"deepfakes.":[114],"We":[115],"design":[116],"an":[117,129,181],"action":[118,124],"unit":[119],"module":[120],"based":[121],"coding":[125],"system":[126],"along":[127],"<italic":[130,149],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[131,150],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Action":[132],"Unit":[133],"Transformer</i>":[134],"(AUT)":[135],"exploit":[137],"expressions":[139],"embeddings.":[140],"our":[142,188],"method's":[143],"architecture":[146],"utilizes":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Temporal":[151],"Convolutional":[152],"Network</i>":[153],"(TCN)":[154],"extract":[156],"lip":[157],"motion":[158],"pattern":[159],"learns":[161],"relatedness":[163],"between":[164],"patterns.":[168],"Our":[169],"could":[171],"person":[174],"interest":[176],"(POI)":[177],"deepfakes":[179],"in":[180],"end-to-end":[182],"manner.":[183],"Extensive":[184],"experiments":[185],"that":[187],"achieves":[190],"better":[191],"has":[194],"higher":[196],"resistance":[197],"video":[199],"state-of-the-art":[202],"models.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
