{"id":"https://openalex.org/W4403488405","doi":"https://doi.org/10.3233/faia240516","title":"Exemplar-Free Incremental Deepfake Detection","display_name":"Exemplar-Free Incremental Deepfake Detection","publication_year":2024,"publication_date":"2024-10-16","ids":{"openalex":"https://openalex.org/W4403488405","doi":"https://doi.org/10.3233/faia240516"},"language":"en","primary_location":{"id":"doi:10.3233/faia240516","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240516","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240516","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240516","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112912499","display_name":"Wuti Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Wuti Xiong","raw_affiliation_strings":["Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082301986","display_name":"Guoying Zhao","orcid":"https://orcid.org/0000-0003-3694-206X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Guoying Zhao","raw_affiliation_strings":["Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101691493","display_name":"Xiaobai Li","orcid":"https://orcid.org/0000-0003-4519-7823"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["CN","FI"],"is_corresponding":false,"raw_author_name":"Xiaobai Li","raw_affiliation_strings":["Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland","State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Center for Machine Vision and Signal Analysis, University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]},{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112912499"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39102917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44061851501464844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44061851501464844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia240516","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240516","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240516","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia240516","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240516","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240516","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403488405.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Incremental":[0],"Deepfake":[1],"Detection":[2],"(IDD)":[3],"aims":[4],"to":[5,14,23,42,81,99,114],"continuously":[6],"update":[7],"models":[8],"with":[9],"new":[10,125],"domain":[11],"data,":[12],"adapting":[13],"evolving":[15],"forgery":[16],"techniques.":[17],"Existing":[18],"works":[19],"require":[20],"extra":[21],"buffers":[22],"store":[24],"old":[25,62,90],"exemplars":[26,63],"for":[27,85],"maintaining":[28],"previously":[29],"learned":[30],"knowledge.":[31],"However,":[32],"it":[33],"is":[34,39,149],"infeasible":[35],"when":[36,64],"previous":[37],"data":[38],"unavailable":[40],"due":[41],"storage":[43],"and":[44],"privacy":[45],"issues.":[46],"This":[47],"paper":[48],"focuses":[49],"on":[50,128],"a":[51,74,144],"more":[52,103],"challenging":[53],"but":[54],"practical":[55,120],"exemplar-free":[56],"IDD":[57],"problem":[58],"that":[59,77,136],"requests":[60],"zero":[61],"updating":[65],"the":[66,101,119,140],"model.":[67],"To":[68,117],"address":[69],"this":[70],"problem,":[71],"we":[72,93,122],"design":[73],"domain-adaptive":[75],"module":[76],"uses":[78],"independent":[79],"adapters":[80,102],"learn":[82],"domain-specific":[83],"knowledge":[84],"each":[86],"domain,":[87],"avoiding":[88],"using":[89],"exemplars.":[91],"Besides,":[92],"introduce":[94],"an":[95],"uncertainty":[96],"optimization":[97],"strategy":[98],"optimize":[100],"efficiently.":[104],"With":[105],"excellent":[106],"scalability,":[107],"our":[108,137],"method":[109,138],"can":[110],"be":[111],"easily":[112],"deployed":[113],"various":[115],"models.":[116],"simulate":[118],"scenarios,":[121],"designed":[123],"two":[124],"protocols":[126],"based":[127],"diverse":[129],"deepfake":[130],"datasets.":[131],"Extensive":[132],"experimental":[133],"results":[134],"demonstrate":[135],"outperforms":[139],"state-of-the-art":[141],"methods":[142],"by":[143],"large":[145],"margin.":[146],"The":[147],"code":[148],"available":[150],"at":[151],"https://github.com/woody-panda/EF-IDD.":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
