{"id":"https://openalex.org/W4376480824","doi":"https://doi.org/10.1109/wcnc55385.2023.10118664","title":"Self-supervised Multi-Modal Video Forgery Attack Detection","display_name":"Self-supervised Multi-Modal Video Forgery Attack Detection","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4376480824","doi":"https://doi.org/10.1109/wcnc55385.2023.10118664"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc55385.2023.10118664","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wcnc55385.2023.10118664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101213798","display_name":"Chenhui Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chenhui Zhao","raw_affiliation_strings":["University of Michigan,Department of Electrical and Computer Engineering,Ann Arbor,USA","Department of Electrical and Computer Engineering, University of Michigan, Ann Arbor, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan,Department of Electrical and Computer Engineering,Ann Arbor,USA","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Michigan, Ann Arbor, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423220","display_name":"Xiang Li","orcid":"https://orcid.org/0009-0006-0591-1892"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiang Li","raw_affiliation_strings":["Carnegia Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,USA","Department of Electrical and Computer Engineering, Carnegia Mellon University, Pittsburgh, USA"],"affiliations":[{"raw_affiliation_string":"Carnegia Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegia Mellon University, Pittsburgh, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035110831","display_name":"Rabih Younes","orcid":"https://orcid.org/0000-0002-5720-8553"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rabih Younes","raw_affiliation_strings":["Duke University,Department of Electrical and Computer Engineering,Durham,USA","Department of Electrical and Computer Engineering, Duke University, Durham, USA"],"affiliations":[{"raw_affiliation_string":"Duke University,Department of Electrical and Computer Engineering,Durham,USA","institution_ids":["https://openalex.org/I170897317"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Duke University, Durham, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101213798"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":0.2456,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49732925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8512251377105713},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5994539856910706},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5270056128501892},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5077191591262817},{"id":"https://openalex.org/keywords/modality","display_name":"Modality (human\u2013computer interaction)","score":0.49862146377563477},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.44163113832473755},{"id":"https://openalex.org/keywords/modalities","display_name":"Modalities","score":0.4377763271331787},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.4202408194541931},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4172397255897522},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08837372064590454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8512251377105713},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5994539856910706},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5270056128501892},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5077191591262817},{"id":"https://openalex.org/C2780226545","wikidata":"https://www.wikidata.org/wiki/Q6888030","display_name":"Modality (human\u2013computer interaction)","level":2,"score":0.49862146377563477},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.44163113832473755},{"id":"https://openalex.org/C2779903281","wikidata":"https://www.wikidata.org/wiki/Q6888026","display_name":"Modalities","level":2,"score":0.4377763271331787},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.4202408194541931},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4172397255897522},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08837372064590454},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc55385.2023.10118664","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wcnc55385.2023.10118664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W23868392","https://openalex.org/W1522301498","https://openalex.org/W1984107941","https://openalex.org/W2016549506","https://openalex.org/W2108587916","https://openalex.org/W2129045955","https://openalex.org/W2340671224","https://openalex.org/W2612706635","https://openalex.org/W2614478700","https://openalex.org/W2726019568","https://openalex.org/W2799062425","https://openalex.org/W2809440904","https://openalex.org/W2827033964","https://openalex.org/W2916798096","https://openalex.org/W2945464869","https://openalex.org/W2962793481","https://openalex.org/W2997222501","https://openalex.org/W3010205642","https://openalex.org/W3021587713","https://openalex.org/W3022968096","https://openalex.org/W3045810779","https://openalex.org/W3086632078","https://openalex.org/W3098220564","https://openalex.org/W3113410735","https://openalex.org/W3133425057","https://openalex.org/W3166517279","https://openalex.org/W4200629187","https://openalex.org/W4285428151","https://openalex.org/W4285513035","https://openalex.org/W4312837597","https://openalex.org/W4382467756","https://openalex.org/W6631190155","https://openalex.org/W6735463952","https://openalex.org/W6760224987","https://openalex.org/W6804269029","https://openalex.org/W6839939770","https://openalex.org/W6847133950"],"related_works":["https://openalex.org/W73545470","https://openalex.org/W4224266612","https://openalex.org/W2383394264","https://openalex.org/W4320153225","https://openalex.org/W4293261942","https://openalex.org/W3125968744","https://openalex.org/W2167701463","https://openalex.org/W2110287964","https://openalex.org/W4307407935","https://openalex.org/W649759291"],"abstract_inverted_index":{"Video":[0],"forgery":[1,72,122],"attacks":[2],"threaten":[3],"surveillance":[4],"systems":[5],"by":[6,18],"replacing":[7],"the":[8,19,28,51,98],"video":[9,49,71],"captures":[10],"with":[11,42,131],"unrealistic":[12],"synthesis,":[13],"which":[14,128],"can":[15],"be":[16],"powered":[17],"latest":[20],"augmented":[21],"reality":[22,25],"and":[23,62,79,105,119],"virtual":[24],"technologies.":[26],"From":[27],"machine":[29],"perception":[30,86],"aspect,":[31],"visual":[32,78],"objects":[33],"often":[34],"have":[35],"RF":[36,52],"signatures":[37,53],"that":[38],"are":[39,54],"naturally":[40],"synchronized":[41],"them":[43],"during":[44],"recording.":[45],"In":[46,65],"contrast":[47],"to":[48,57,96,100,108],"captures,":[50],"more":[55],"difficult":[56],"attack":[58,73,123],"given":[59],"their":[60],"concealed":[61],"ubiquitous":[63],"nature.":[64],"this":[66],"work,":[67],"we":[68,90],"investigate":[69],"multimodal":[70],"detection":[74,117,124],"methods":[75],"using":[76],"both":[77],"wireless":[80,83],"modalities.":[81],"Since":[82],"signal-based":[84],"human":[85,116],"is":[87,129,136],"environmentally":[88],"sensitive,":[89],"propose":[91],"a":[92,114,120],"self-supervised":[93],"training":[94],"strategy":[95],"enable":[97],"system":[99],"work":[101],"without":[102],"external":[103],"annotation":[104],"thus":[106],"adapt":[107],"different":[109],"environments.":[110],"Our":[111],"method":[112],"achieves":[113],"perfect":[115],"accuracy":[118,125],"high":[121],"of":[126],"94.38%":[127],"comparable":[130],"supervised":[132],"methods.":[133],"The":[134],"code":[135],"publicly":[137],"available":[138],"at:":[139],"https://github.com/ChuiZhao/Secure-Mask.git":[140]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
