{"id":"https://openalex.org/W7135050628","doi":"https://doi.org/10.1109/tifs.2026.3673104","title":"Toward Generalizable Deepfake Detection via Forgery-Aware Audio\u2013Visual Adaptation: A Variational Bayesian Approach","display_name":"Toward Generalizable Deepfake Detection via Forgery-Aware Audio\u2013Visual Adaptation: A Variational Bayesian Approach","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7135050628","doi":"https://doi.org/10.1109/tifs.2026.3673104"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3673104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3673104","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095920971","display_name":"Fan Nie","orcid":"https://orcid.org/0009-0001-6867-498X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Nie","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039213686","display_name":"Jiangqun Ni","orcid":"https://orcid.org/0000-0002-7520-9031"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangqun Ni","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425709","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0003-1152-8962"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392843","display_name":"Bin Zhang","orcid":"https://orcid.org/0000-0002-4879-0211"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Zhang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071745460","display_name":"W. J. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhe Zhang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128911396","display_name":"Bin Li","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["College of Information Engineering, Guangdong Key Laboratory of Intelligent Information Processing, and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Guangdong Key Laboratory of Intelligent Information Processing, and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5095920971"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.75295444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"2933","last_page":"2946"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9060999751091003,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9060999751091003,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.023499999195337296,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.5728999972343445},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.31130000948905945},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.28850001096725464},{"id":"https://openalex.org/keywords/bayesian-inference","display_name":"Bayesian inference","score":0.28189998865127563},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.2630000114440918}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7734000086784363},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.5728999972343445},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5357999801635742},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39719998836517334},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34860000014305115},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3221000134944916},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.28850001096725464},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.28189998865127563},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C207201462","wikidata":"https://www.wikidata.org/wiki/Q182505","display_name":"Bayes' theorem","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3673104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3673104","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1975959625","https://openalex.org/W2028261949","https://openalex.org/W2341528187","https://openalex.org/W2890952074","https://openalex.org/W2912305564","https://openalex.org/W2962770929","https://openalex.org/W2982058372","https://openalex.org/W2984700035","https://openalex.org/W3036198682","https://openalex.org/W3081492798","https://openalex.org/W3093010840","https://openalex.org/W3093077034","https://openalex.org/W3094728142","https://openalex.org/W3096323553","https://openalex.org/W3138516171","https://openalex.org/W3175342695","https://openalex.org/W3196204467","https://openalex.org/W4214684483","https://openalex.org/W4214691743","https://openalex.org/W4226548933","https://openalex.org/W4297841787","https://openalex.org/W4312388562","https://openalex.org/W4312472072","https://openalex.org/W4313177092","https://openalex.org/W4319978495","https://openalex.org/W4360993864","https://openalex.org/W4367316141","https://openalex.org/W4386072334","https://openalex.org/W4386076652","https://openalex.org/W4386102876","https://openalex.org/W4386113246","https://openalex.org/W4386267173","https://openalex.org/W4386524605","https://openalex.org/W4390872864","https://openalex.org/W4402727931","https://openalex.org/W4402774452","https://openalex.org/W4402904188","https://openalex.org/W4403780752","https://openalex.org/W4403792183","https://openalex.org/W4405741798","https://openalex.org/W7131123431","https://openalex.org/W7133238718"],"related_works":[],"abstract_inverted_index":{"The":[0],"widespread":[1],"application":[2],"of":[3,23,103,148],"AIGC":[4],"contents":[5],"has":[6],"brought":[7],"not":[8],"only":[9],"unprecedented":[10],"opportunities,":[11],"but":[12],"also":[13],"potential":[14],"security":[15],"concerns,":[16],"e.g.,":[17,47],"audio-visual":[18,39,48,71,113,149],"deepfakes.":[19],"Therefore,":[20],"it":[21],"is":[22,73],"great":[24],"importance":[25],"to":[26,111,126,169],"develop":[27,83],"an":[28],"effective":[29],"and":[30,81,122,129,161,173],"generalizable":[31],"method":[32],"for":[33,87],"multi-modal":[34],"deepfake":[35,56,88],"detection.":[36,57],"Typically,":[37],"the":[38,63,100,138,144,157],"correlation":[40,64,72,150],"learning":[41,65],"could":[42],"expose":[43],"subtle":[44],"cross-modal":[45,174],"inconsistencies,":[46],"misalignment,":[49],"which":[50],"serve":[51],"as":[52,75],"crucial":[53],"clues":[54],"in":[55,190],"In":[58],"this":[59],"paper,":[60],"we":[61,106,117,142,155],"reformulate":[62],"with":[66,94,137,164,177],"variational":[67,152],"Bayesian":[68],"estimation,":[69],"where":[70],"approximated":[74],"a":[76,84,123],"Gaussian":[77,146],"distributed":[78],"latent":[79,145],"variable,":[80],"thus":[82],"novel":[85],"framework":[86],"detection,":[89],"i.e.,":[90],"Forgery-aware":[91],"Audio-Visual":[92],"Adaptation":[93],"Variational":[95],"Bayes":[96],"(FoVB).":[97],"Specifically,":[98],"given":[99],"prior":[101],"knowledge":[102],"pre-trained":[104],"backbones,":[105],"adopt":[107],"two":[108],"core":[109],"designs":[110],"estimate":[112,143],"correlations":[114],"effectively.":[115],"First,":[116],"exploit":[118],"various":[119,191],"difference":[120],"convolutions":[121],"high-pass":[124],"filter":[125],"discern":[127],"local":[128],"global":[130],"forgery":[131,175],"traces":[132,176],"from":[133],"both":[134],"modalities.":[135],"Second,":[136],"extracted":[139],"forgery-aware":[140],"features,":[141],"variable":[147,158],"via":[151],"Bayes.":[153],"Then,":[154],"factorize":[156],"into":[159],"modality-specific":[160],"correlation-specific":[162],"ones":[163],"orthogonality":[165],"constraint,":[166],"allowing":[167],"them":[168],"better":[170],"learn":[171],"intra-modal":[172],"less":[178],"entanglement.":[179],"Extensive":[180],"experiments":[181],"demonstrate":[182],"that":[183],"our":[184],"FoVB":[185],"outperforms":[186],"other":[187],"state-of-the-art":[188],"methods":[189],"benchmarks.":[192]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-13T00:00:00"}
