{"id":"https://openalex.org/W4310113627","doi":"https://doi.org/10.1145/3568562.3568666","title":"Investigate Evolutionary Strategies for Black-box Attacks to Deepfake Forensic Systems","display_name":"Investigate Evolutionary Strategies for Black-box Attacks to Deepfake Forensic Systems","publication_year":2022,"publication_date":"2022-11-29","ids":{"openalex":"https://openalex.org/W4310113627","doi":"https://doi.org/10.1145/3568562.3568666"},"language":"en","primary_location":{"id":"doi:10.1145/3568562.3568666","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3568562.3568666","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3568562.3568666","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088165425","display_name":"Nguyen Thi My Binh","orcid":"https://orcid.org/0000-0002-6573-4641"},"institutions":[{"id":"https://openalex.org/I45756140","display_name":"Hanoi University of Industry","ror":"https://ror.org/05hhz4s12","country_code":"VN","type":"education","lineage":["https://openalex.org/I45756140"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Nguyen Thi My Binh","raw_affiliation_strings":["Hanoi University of Industry, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-6573-4641","affiliations":[{"raw_affiliation_string":"Hanoi University of Industry, Viet Nam","institution_ids":["https://openalex.org/I45756140"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069291267","display_name":"Dao Hoang Long","orcid":"https://orcid.org/0000-0002-5208-1899"},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Dao Hoang Long","raw_affiliation_strings":["Hanoi University of Sciece and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-5208-1899","affiliations":[{"raw_affiliation_string":"Hanoi University of Sciece and Technology, Viet Nam","institution_ids":["https://openalex.org/I94518387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086942482","display_name":"Nguyen Hong Ngoc","orcid":"https://orcid.org/0000-0001-7028-7658"},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Nguyen Ngoc","raw_affiliation_strings":["Hanoi University of Sciece and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0001-7028-7658","affiliations":[{"raw_affiliation_string":"Hanoi University of Sciece and Technology, Viet Nam","institution_ids":["https://openalex.org/I94518387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072105691","display_name":"Hu\u1ef3nh Th\u1ecb Thanh B\u00ecnh","orcid":"https://orcid.org/0000-0003-1976-6113"},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Huynh Thi Thanh Binh","raw_affiliation_strings":["Hanoi University of Science and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0003-1976-6113","affiliations":[{"raw_affiliation_string":"Hanoi University of Science and Technology, Viet Nam","institution_ids":["https://openalex.org/I94518387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103117222","display_name":"Nguyen Khanh Phuong","orcid":"https://orcid.org/0000-0002-3691-2031"},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Nguyen Khanh Phuong","raw_affiliation_strings":["Hanoi University of Science and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-3691-2031","affiliations":[{"raw_affiliation_string":"Hanoi University of Science and Technology, Viet Nam","institution_ids":["https://openalex.org/I94518387"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088165425"],"corresponding_institution_ids":["https://openalex.org/I45756140"],"apc_list":null,"apc_paid":null,"fwci":0.5102,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64839782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"126","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7637068629264832},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6284180879592896},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6027315258979797},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.5320044159889221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5113269686698914},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4880160391330719},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3383313715457916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7637068629264832},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6284180879592896},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6027315258979797},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.5320044159889221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5113269686698914},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4880160391330719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3383313715457916},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3568562.3568666","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3568562.3568666","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3568562.3568666","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3568562.3568666","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2962770929","https://openalex.org/W3010699567","https://openalex.org/W3034577585","https://openalex.org/W3035574324","https://openalex.org/W3036426855"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W3009622996"],"abstract_inverted_index":{"Recently,":[0],"the":[1,17,22,35,51,115,133],"rising":[2],"of":[3,24,53,74,114,117],"deepfake":[4,25],"generation":[5],"techniques,":[6],"cyber":[7],"security":[8,41],"against":[9,103,132],"misinformation":[10],"has":[11],"become":[12],"a":[13,62,107],"popular":[14],"topic":[15],"among":[16],"research":[18],"community.":[19],"To":[20],"improve":[21],"robustness":[23],"detection,":[26],"attacks":[27,96],"such":[28,77],"as":[29,78],"adversarial":[30,45],"examples":[31],"are":[32,48,92,97],"studied":[33],"with":[34,88],"aim":[36],"to":[37,99,130],"exploring":[38],"weaknesses":[39],"and":[40,84],"leaks.":[42],"While":[43],"most":[44],"example":[46],"generators":[47],"based":[49],"on":[50,61,127],"assumption":[52],"white-box":[54],"attack,":[55],"in":[56,109],"this":[57],"paper,":[58],"we":[59],"focus":[60],"more":[63],"realistic":[64],"black-box":[65,95],"attack":[66],"scenario":[67],"using":[68],"evolutionary":[69,75,119],"approaches.":[70],"A":[71],"wide":[72],"range":[73],"strategies":[76,120],"Genetic":[79],"Algorithm,":[80],"Particle":[81],"Swarm":[82],"Optimization,":[83],"Differential":[85],"Evolution":[86],"along":[87],"their":[89],"quantum-inspired":[90],"versions,":[91],"evaluated.":[93],"The":[94],"shown":[98],"be":[100],"highly":[101],"effective":[102],"state-of-the-art":[104],"forensics,":[105],"exposing":[106],"vulnerability":[108],"current":[110],"defense":[111],"techniques.":[112],"Analysis":[113],"performance":[116],"different":[118],"used":[121],"for":[122],"attacking":[123],"also":[124],"reveals":[125],"insights":[126],"possible":[128],"solutions":[129],"counter":[131],"attacks.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
