Deepfake detection using deep learning methods: A systematic and comprehensive review
Saved in:
| Published in | Wiley interdisciplinary reviews. Data mining and knowledge discovery |
|---|---|
| Format | Journal Article |
| Language | English |
| Online Access | Get full text |
| ISSN | 1942-4787 1942-4795 |
| DOI | 10.1002/widm.1520 |
Cover
| BookMark | eNotzz1PwzAUhWEPZSiFgX_gGSnl2o7zwVaVT6kSC52jG_uaWiROFKeN8u8hgunoXY70XLNV6AIxdidgKwDkw-RtuxVawoqtRZnKJM2LfM2OT0S9w2_ilkYyo-8CP0cfvn6bet4QDmGplsZTZ-Mj3_E4x5FaHL3hGCw3XdsPdKIQ_YX4QBdP0w27cthEuv3fDTu-PH_u35LDx-v7fndIjCzlmChHWhGmjkpAiyhRuyw3ugAwIjcOCgWZJJW5EiykVtnayVxKpUnXztRqw-7_fs-hx3nCpqn6wbc4zJWAanFXi7ta3OoHN4tTCQ |
|---|---|
| CitedBy_id | crossref_primary_10_1080_00051144_2024_2400640 crossref_primary_10_1002_hsr2_70300 crossref_primary_10_1049_ipr2_13201 crossref_primary_10_54525_bbmd_1460699 crossref_primary_10_1186_s13677_024_00685_x crossref_primary_10_3390_s24196300 crossref_primary_10_1109_ACCESS_2024_3395656 crossref_primary_10_3389_fdata_2024_1400024 crossref_primary_10_3390_bioengineering11040408 crossref_primary_10_3390_foods13223697 crossref_primary_10_3390_jsan14010017 crossref_primary_10_32628_CSEIT2410584 crossref_primary_10_32628_CSEIT24105811 crossref_primary_10_1038_s41598_025_93365_y crossref_primary_10_1016_j_chbr_2024_100538 crossref_primary_10_32604_cmc_2024_060077 crossref_primary_10_3390_forensicsci4030021 crossref_primary_10_3390_su16031081 crossref_primary_10_1007_s00521_024_10181_7 crossref_primary_10_1007_s11042_024_20012_5 crossref_primary_10_1038_s44168_024_00202_5 crossref_primary_10_32628_CSEIT2410582 crossref_primary_10_1002_nem_2318 crossref_primary_10_3390_electronics13152947 crossref_primary_10_1038_s41598_024_81162_y crossref_primary_10_1109_ACCESS_2024_3521026 crossref_primary_10_1007_s13202_024_01887_4 crossref_primary_10_1007_s00202_024_02745_6 crossref_primary_10_1007_s11760_025_03970_7 crossref_primary_10_1007_s13369_024_09419_2 crossref_primary_10_1007_s12559_024_10255_7 crossref_primary_10_1007_s43926_024_00088_z crossref_primary_10_1016_j_renene_2025_122598 crossref_primary_10_1038_s41598_024_80842_z crossref_primary_10_1109_ACCESS_2025_3527868 crossref_primary_10_3390_computers14030093 crossref_primary_10_1007_s00202_024_02586_3 crossref_primary_10_1108_K_04_2024_0894 crossref_primary_10_1080_10494820_2024_2361378 crossref_primary_10_1049_cit2_12362 crossref_primary_10_5772_acrt_20240042 crossref_primary_10_1039_D4NR01832J crossref_primary_10_1109_MITP_2024_3518919 crossref_primary_10_1002_ett_4969 crossref_primary_10_1080_08911762_2025_2469293 crossref_primary_10_7717_peerj_cs_2654 crossref_primary_10_59400_cai_v2i2_1409 |
| ContentType | Journal Article |
| DBID | ADTOC UNPAY |
| DOI | 10.1002/widm.1520 |
| DatabaseName | Unpaywall for CDI: Periodical Content Unpaywall |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10.1002/widm.1520 |
| GroupedDBID | 05W 0R~ 1OC 33P 4.4 8-0 8-1 AAESR AAHQN AAMMB AAMNL AANHP AANLZ AASGY AAXRX AAYCA AAZKR ABCUV ACAHQ ACBWZ ACCZN ACGFS ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADKYN ADMGS ADNMO ADTOC ADZMN AEFGJ AEIGN AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AFZJQ AGQPQ AGXDD AGYGG AHBTC AIDQK AIDYY AITYG AIURR AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ASPBG AUFTA AVWKF AZFZN AZVAB BDRZF BHBCM BMNLL BRXPI D-A DCZOG DRFUL DRSTM EBS EJD FEDTE G-S GODZA HGLYW HVGLF HZ~ LATKE LEEKS LH4 LITHE LOXES LUTES LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM MY. MY~ O66 O9- P2W PQQKQ ROL SUPJJ UNPAY WBKPD WIH WIK WMRSR WOHZO WSUWO WXSBR ZZTAW |
| ID | FETCH-LOGICAL-c292t-3fe53ea4fe90adaa2a5f67c5800c17cf083062e36f90d04d3dbf272235e5bfcb3 |
| IEDL.DBID | UNPAY |
| ISSN | 1942-4787 1942-4795 |
| IngestDate | Wed Oct 01 16:16:47 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c292t-3fe53ea4fe90adaa2a5f67c5800c17cf083062e36f90d04d3dbf272235e5bfcb3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/widm.1520 |
| ParticipantIDs | unpaywall_primary_10_1002_widm_1520 |
| PublicationTitle | Wiley interdisciplinary reviews. Data mining and knowledge discovery |
| Score | 2.6578796 |
| SecondaryResourceType | review_article |
| SourceID | unpaywall |
| SourceType | Open Access Repository |
| Title | Deepfake detection using deep learning methods: A systematic and comprehensive review |
| URI | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/widm.1520 |
| UnpaywallVersion | publishedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1dS8MwFA2yPYgPzk9UVAL62lnz1cW3oY4hOHywMJ9qmtxMcdYyO4b-epum-8AnwbcWGgiX3NuT5NxzEDqnRoaSGBoA5TpgIGVZB0EGwqni8shKUvWt3Q9EP2Z3Qz6sfU5dL4zXh1gcuLnMqOq1S_DcWF_n69t9cjF7Ne_OwafcszcFL8F4AzXjwUP3qbpLZiRw0jPLZ8nn2kKrYzfQ-jTL1ddMjccr_5ZeCz3PZ-UpJW_taZG29fcvwcZ_THsLbda4E3f9QtlGa5DtoNbc0wHXKb6L4huA3Ko3wAaKiqaVYceNH5XvkOPaZGKEvfP05xXu4qUYNFaZwY6kPoEXT4zHvjVmD8W928frflBbLwSaSFIE1AKnoJgFGSqjFFHcikjzEl7qy0jbEriFggAVVoYmZIaa1JKohBoceGp1SvdRI_vI4ABhENqJ-KUdSwVTvJOKlEVaGm5DIy1jh-hsEf4k9xIbiRdTJomLVOIidfSnr45Ro5hM4aTECUV6Wq-FH48pwig |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1dS8MwFA2yPYgPzk9UVAL62lnz1cW3oY4hOHywMJ9qmtxMcdYyO4b-epum-8AnwbcWGgiX3NuT5NxzEDqnRoaSGBoA5TpgIGVZB0EGwqni8shKUvWt3Q9EP2Z3Qz6sfU5dL4zXh1gcuLnMqOq1S_DcWF_n69t9cjF7Ne_OwafcszcFL8F4AzXjwUP3qbpLZiRw0jPLZ8nn2kKrYzfQ-jTL1ddMjccr_5ZeCz3PZ-UpJW_taZG29fcvwcZ_THsLbda4E3f9QtlGa5DtoNbc0wHXKb6L4huA3Ko3wAaKiqaVYceNH5XvkOPaZGKEvfP05xXu4qUYNFaZwY6kPoEXT4zHvjVmD8W928frflBbLwSaSFIE1AKnoJgFGSqjFFHcikjzEl7qy0jbEriFggAVVoYmZIaa1JKohBoceGp1SvdRI_vI4ABhENqJ-KUdSwVTvJOKlEVaGm5DIy1jh-hsEf4k9xIbiRdTJomLVOIidfSnr45Ro5hM4aTECUV6Wq-FH48pwig |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deepfake+detection+using+deep+learning+methods%3A+A+systematic+and+comprehensive+review&rft.jtitle=Wiley+interdisciplinary+reviews.+Data+mining+and+knowledge+discovery&rft.issn=1942-4787&rft_id=info:doi/10.1002%2Fwidm.1520&rft.externalDocID=10.1002%2Fwidm.1520 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1942-4787&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1942-4787&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1942-4787&client=summon |