{"id":"https://openalex.org/W7140744944","doi":"https://doi.org/10.1109/tifs.2026.3678021","title":"Component-Specific Prompt Tuning for Deepfake Detection","display_name":"Component-Specific Prompt Tuning for Deepfake Detection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140744944","doi":"https://doi.org/10.1109/tifs.2026.3678021"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3678021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3678021","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042229140","display_name":"Y. Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinyin Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0009-0009-5486-182X","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101085658","display_name":"Huiqing Guo","orcid":"https://orcid.org/0000-0003-0832-8046"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqing Guo","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130641588","display_name":"Chunlei Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunlei Peng","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-3448-2514","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130714204","display_name":"Nannan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nannan Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-4695-6134","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xinbo Gao","orcid":"https://orcid.org/0000-0002-7985-0037"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinbo Gao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-7985-0037","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042229140"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63790253,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3424","last_page":"3435"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.5450000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.5450000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.057100001722574234,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.04560000076889992,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.2808000147342682},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.27320000529289246},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.26829999685287476},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.2632000148296356},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.2551000118255615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7662000060081482},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.382999986410141},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3246999979019165},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31279999017715454},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27320000529289246},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25450000166893005},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3678021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3678021","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.6467330455780029}],"awards":[{"id":"https://openalex.org/G4297946667","display_name":null,"funder_award_id":"U22A2096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5302744849","display_name":null,"funder_award_id":"U22A2035","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5405834107","display_name":null,"funder_award_id":"62276198","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5420252985","display_name":null,"funder_award_id":"B16037","funder_id":"https://openalex.org/F4320336698","funder_display_name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health (111 Center)"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336698","display_name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health (111 Center)","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,7,71,131,146,153,182,187,214,225,244,249,252],"development":[2],"of":[3,18,38,145,150,155,190,217,228,251,266,281],"deep":[4],"learning":[5],"technology,":[6],"facial":[8,173],"images":[9],"generated":[10],"by":[11,238],"deepfake":[12,46,60,80,118,132],"technology":[13],"have":[14,56,74],"reached":[15],"a":[16,26,136,162,202],"level":[17],"authenticity":[19,250],"that":[20,270],"is":[21,37,273],"difficult":[22],"to":[23,29,41,59,64,86,110,166,184,221,247],"distinguish,":[24],"posing":[25],"serious":[27],"threat":[28],"personal":[30],"privacy":[31],"and":[32,44,97,125,152,179,240,284],"data":[33],"security.":[34],"Therefore,":[35],"it":[36],"great":[39],"significance":[40],"develop":[42],"efficient":[43],"reliable":[45],"detection":[47,61,81,120,133,282],"technology.":[48,158],"In":[49,108,198],"recent":[50],"years,":[51],"Visual":[52,137],"Language":[53],"Models":[54],"(VLM)":[55],"been":[57,76],"applied":[58,85],"tasks":[62],"due":[63],"their":[65],"powerful":[66],"multimodal":[67,147],"understanding":[68,148],"capabilities.":[69],"However,":[70],"existing":[72,277],"VLM":[73,124,151],"not":[75],"specifically":[77],"optimized":[78],"for":[79,171],"tasks.":[82],"When":[83],"directly":[84],"this":[87,113],"task,":[88,141],"there":[89],"are":[90],"problems":[91],"such":[92,175],"as":[93,176],"insufficient":[94,98],"model":[95,183,246],"accuracy":[96,283],"feature":[99,203],"extraction,":[100],"especially":[101],"when":[102],"dealing":[103],"with":[104,243],"complex":[105],"forgery":[106,196],"scenes.":[107],"response":[109],"these":[111,191,234],"challenges,":[112],"paper":[114],"proposes":[115],"an":[116],"innovative":[117],"face":[119,254],"method":[121,160,272],"based":[122,207],"on":[123,186,208],"component-specific":[126],"prompt":[127,156,164,169],"tuning.":[128],"We":[129],"transform":[130],"task":[134],"into":[135],"Question":[138],"Answering":[139],"(VQA)":[140],"making":[142],"full":[143],"use":[144],"capabilities":[149],"flexibility":[154],"tuning":[157],"This":[159],"uses":[161],"local":[163,188,235],"strategy":[165],"customize":[167],"specific":[168],"questions":[170],"key":[172],"components":[174],"eyes,":[177],"nose,":[178],"mouth,":[180],"guiding":[181],"focus":[185,215],"features":[189,219,236],"areas,":[192],"thereby":[193],"accurately":[194],"capturing":[195],"traces.":[197],"addition,":[199],"we":[200,256],"introduced":[201],"extraction":[204],"module":[205],"Q-Former":[206,239],"instructions,":[209],"which":[210],"can":[211,257],"flexibly":[212],"adjust":[213],"area":[216],"visual":[218],"according":[220],"prompts,":[222],"significantly":[223,274],"improving":[224],"model\u2019s":[226],"perception":[227],"locally":[229],"forged":[230],"features.":[231],"By":[232],"fusing":[233],"extracted":[237],"combining":[241],"them":[242],"language":[245],"judge":[248],"overall":[253],"image,":[255],"finally":[258],"generate":[259],"accurate":[260],"prediction":[261],"results.":[262],"A":[263],"large":[264],"number":[265],"experimental":[267],"results":[268],"show":[269],"our":[271],"better":[275],"than":[276],"technologies":[278],"in":[279],"terms":[280],"robustness.":[285]},"counts_by_year":[],"updated_date":"2026-04-02T13:48:15.688549","created_date":"2026-03-27T00:00:00"}
