Computer Science ›› 2026, Vol. 53 ›› Issue (4): 445-453.doi: 10.11896/jsjkx.250700070
• Information Security • Previous Articles Next Articles
MENG Siyu, NIU Chunxiang, TAN Quange, WANG Rong
CLC Number:
| [1]THIES J,ZOLLHÖFER M,NIESSNER M.Deferred neuralrendering:image synthesis using neural textures[J].ACM Transactions on Graphics,2019,38(4):66. [2]THIES J,ZOLLHÖFER M,STAMMINGER M,et al.Face2-Face:Real-Time Face Capture and Reenactment of RGB Videos[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition.2016:2387-2395. [3]ZHAO H,WEI T,ZHOU W,et al.Multi-attentional deepfake detection[C]//2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:2185-2194. [4]ZHANG D,CHEN J,LIAO X,et al.Face Forgery Detection via Multi-Feature Fusion and Local Enhancement[J].IEEE Transa-ctions on Circuits and Systems for Video Technology,2024,34(9):8972-8977. [5]GUO Z,WANG L,YANG W,et al.LDFnet:Lightweight Dynamic Fusion Network for Face Forgery Detection by Integrating Local Artifacts and Global Texture Information[J].IEEE Transactions on Circuits and Systems for Video Technology,2024,34(2):1255-1265. [6]ZHANG K,FAN Z X.Improved Face Forgery Detection MethodBased on Adversarial Training[J].Journal of Chongqing Technology and Business University(Na-tural Science Edition),2025,42(4):88-94. [7]WANG Y M,HU J,WU X S,et al.Compressed deepfake video detection method based on inconsistent facial motion[J].Journal of Chongqing University of Posts and Telecommunications(Na-tural Science Edition),2025,37(3):445-452. [8]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010. [9]DOSOVITSKIY A,BEYER L,KOLESNIKOV A,et al.Animage is worth 16x16 words:transformers for image recognition at scale[C]//Proceedings of the International Conference on Learning Representations.2021. [10]ZHOU J,ZHAO X,XU Q,et al.MDCF-Net:Multi-Scale Dual-Branch Network for Compressed Face Forgery Detection[J].IEEE Access,2024,12:58740-58749. [11]KHORMALI A,YUAN J S.Self-Supervised Graph Transformerfor Deepfake Detection[J].IEEE Access,2024,12:58114-58127. [12]ZHOU K,SUN G,WANG J,et al.MH-FFNet:Leveraging Mid-High Frequency Information for Robust Fine-Grained Face Forgery Detection[J].Expert Systems with Applications,2025,276(C). [13]LAI Z M,ZHANG Y,LI D,et al.Leveraging high-frequency diversified augmentation for general deepfake detection[J].Journal of Information Security and Applications,2025,89:103994. [14]ZHANG D Y,QI F F,CHEN J H,et al.Fake face detection based on fusion of spatial texture and high-frequency noise[J].Chinese Journal Of Electronics,2025,34(1):212-221. [15]HUANG J S,YANG G M.Face Forgery Detection MethodBased on Manipulation Trace Fusion[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2025,42(4):80-87. [16]MIAO C,CHU Q,LI W,et al.Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature[C]//2021 International Conference on Visual Communications and Image Processing.2021:1-5. [17]RÖSSLER A,COZZOLINO D,VERDOLIVA L,et al.Facefo-rensics++:Learning to detect manipulated facial images[C]//IEEE/CVF International Conference on Computer Vision(ICCV 2019).2019:1-11. [18]WANG J,WU Z,OUYANG W,et al.M2TR:Multi-modalMulti-scale Transformers for Deepfake Detection[C]//Procee-dings of the 2022 International Conference on Multimedia Retrieval.2022:615-623. [19]LI Y,YANG X,SUN P,et al.Celeb-df:A large-scale challenging dataset for Deepfake forensics[C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR 2020).2020:3204-3213. [20]DOLHANSKY B,HOWES R,PFLAUM B,et al.The Deepfake detection challenge(DFDC) preview dataset[J].arXiv:1910.08854,2019. [21]ZI B,CHANG M,CHEN J,et al.WildDeepfake:A challenging real-world dataset for Deepfake detection[C]//Proceedings of the 28th ACM International Conference on Multimedia.2020:2382-2390. [22]YANG X,LI Y,LYU S.Exposing deep fakes using inconsistent head poses[C]//2019 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP 2019).2019:8261-8265. [23]DENG J,GUO J,VERVERAS E,et al.Retinaface:Single-shot multi-level face localisation in the wild[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2020:5202-5211. [24]LIU H,LI X,ZHOU W,et al.Spatial-phase shallow learning:Rethinking face forgery detection in frequency domain[C]//2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2021:772-781. [25]BADR N E A,NEBEL J C,GREENHILL D,et al.WaViT-CDC:Wavelet Vision Transformer With Central Difference Convolutions for Spatial-Frequency Deepfake Detection[J].IEEE Open Journal of Signal Processing,2025,6:621-630. [26]MIAO C,TAN Z,CHU Q,et al.Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection[J].IEEE Transactions on Information Forensics and Security,2022,17:3008-3021. [27]WANG J,SUN Y,TANG J.Lisiam:Localization invariance Siamese network for Deepfake detection[J].IEEE Transactions on Information Forensics and Security,2022,17:2425-2436. [28]MIAO C,TAN Z,CHU Q,et al.F2Trans:High-FrequencyFine-Grained Transformer for Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2023,18:1039-1051. [29]ZHUANG W,CHU Q,TAN Z,et al.UIA-ViT:Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection[C]//Computer Vision-ECCV 2022.2022:391-407. [30]GAO J,MICHELETTO M,ORRÙ G,et al.Texture and Artifact Decomposition for Improving Generalization in Deep-Lear-ning-Based Deepfake Detection[J].Engineering Applications of Artificial Intelligence,2024,133(C):108450. [31]GONG R,HE R,ZHANG D,et al.Robust face forgery detection integrating local texture and global texture information[J].EURASIP Journal on Information Security,2025,2025(3):1-14. [32]ZHAO Y,JIN X,GAO S,et al.TAN-GFD:generalizing face forgery detection based on textureinformation and adaptive noise mining[J].Applied Intelligence,2023,53:19007-19027. [33]JIANG Q,LIU S,MIAO S,et al.Robust manipulated media localization and detection based on high frequency and texture features[J].Discover Computing,2025,28(1):1-17. [34]TIAN J H,CHEN P,YU C,et al.Learning to Discover Forgery Cues for Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2024,19:3814-3828. [35]ZHENG J S,ZHOU Y C,ZHANG N,et al.A Spatio-Frequency Cross Fusion Model for Deepfake Detection and Segmentation[J].Neurocomputing,2025,628:129683. [36]LUO A,KONG C,HUANG J,et al.Beyond the Prior Forgery Knowledge:Mining Critical Clues for General Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2024,19:1168-1182. [37]DONG F,ZOU X,WANG J,et al.Contrastive Learning-Based General Deepfake Detection with Multi-Scale RGB Frequency Clues[J].Journal of King Saud University-Computer and Information Sciences,2023,35(4):90-99. [38]SELVARAJU R,COGSWELL M,DAS A,et al.Grad-CAM:Visual Explanations from Deep Networks via Gradient-Based Localization[C]//2017 IEEE International Conference on Computer Vision(ICCV).2017:618-626. |
| [1] | ZHAO Binbei, ZHU Li, ZHAO Hongli, LI Yutong. Computer Vision Applications in Rail Transit Systems [J]. Computer Science, 2026, 53(3): 214-224. |
| [2] | GUO Xingxing, XIAO Yannan, WEN Peizhi, XU Zhi, HUANG Wenming. Attention-based Audio-driven Digital Face Video Generation Method [J]. Computer Science, 2026, 53(2): 245-252. |
| [3] | LI Mengxi, GAO Xindan, LI Xue. Two-way Feature Augmentation Graph Convolution Networks Algorithm [J]. Computer Science, 2025, 52(7): 127-134. |
| [4] | LIU Yuanhong, WU Yubin. Local Linear Embedding Algorithm Based on Probability Model and Information Entropy [J]. Computer Science, 2025, 52(6A): 240500021-8. |
| [5] | WU Zhihua, CHENG Jianghua, LIU Tong, CAI Yahui, CHENG Bang, PAN Lehao. Human Target Detection Algorithm for Low-quality Laser Through-window Imaging [J]. Computer Science, 2025, 52(6A): 240600069-6. |
| [6] | MIAO Zhuang, CUI Haoran, ZHANG Qiyang, WANG Jiabao, LI Yang. Restoration of Atmospheric Turbulence-degraded Images Based on Contrastive Learning [J]. Computer Science, 2025, 52(5): 171-178. |
| [7] | KONG Yu, XIONG Fengguang, ZHANG Zhiqiang, SHEN Chaofan, HU Mingyue. Low Overlap Point Cloud Registration Method Based on Deep Position-aware Transformer [J]. Computer Science, 2025, 52(5): 199-211. |
| [8] | LI Xiaolan, MA Yong. Study on Lightweight Flame Detection Algorithm with Progressive Adaptive Feature Fusion [J]. Computer Science, 2025, 52(4): 64-73. |
| [9] | WANG Mengwei, YANG Zhe. Speaker Verification Method Based on Sub-band Front-end Model and Inverse Feature Fusion [J]. Computer Science, 2025, 52(3): 214-221. |
| [10] | ZUO Xuhong, WANG Yongquan, QIU Geping. Study on Integrated Model of Securities Illegal Margin Trading Accounts Identification Based on Trading Behavior Characteristics [J]. Computer Science, 2025, 52(2): 125-133. |
| [11] | WANG Kangyue, CHENG Ming, XIE Yixiang, ZOU Xiaobing, LI Ming. Role-aware Speaker Diarization in Autism Interview Scenarios [J]. Computer Science, 2025, 52(2): 231-241. |
| [12] | MIAO Lin, SHEN Hongjing, WANG Li, CAO Yiwen, LU Chongyu. Design of Centralized Management and Control Platform for Multi-system HeterogeneousAerospace TT&C and Data Transmission Resources [J]. Computer Science, 2025, 52(11A): 250200110-6. |
| [13] | ZHU Sifan, ZHU Guosheng. Retinal Vessel Segmentation Based on Multi-scale Attention [J]. Computer Science, 2025, 52(11A): 241200112-10. |
| [14] | YUE Qianwen, WANG Dongqiang, ZHANG Qiang. Point Cloud Registration Network Integrating Adaptive Optimization and Multi-dimensional Focusing [J]. Computer Science, 2025, 52(11A): 250100019-7. |
| [15] | ZHANG Wei, CAI Yufan, YE Lintao, LIU Dazhi. Real-time Transformer Small Target Detection Model Based on Feature Extraction Enhancement and Pyramid Structure [J]. Computer Science, 2025, 52(11A): 250100139-11. |
|
||