SlideShare a Scribd company logo
1 of 14
FReTAL: Generalizing Deepfake Detection using Knowledge
Distillation and Representation Learning
Minha Kim
kimminha@g.skku.edu
Workshop on Media Forensics
CVPR 2021 - Virtual
Data-drive AI Security HCI (DASH) Lab
Sungkyunkwan University, South Korea
Simon S. Woo
swoo@g.skku.edu
Shahroz Tariq
shahroz@g.skku.edu
Training
Dataset A
(Deepfakes)
Model
Dataset A
(Deepfakes)
Accuracy 95%
Introduction
Transfer
Introduction
Dataset B
(Face2Face)
Dataset A
Dataset B
(Face2Face)
Accuracy 95%87% ↓
Accuracy 98%
Catastrophic
Forgetting
However, It can lead to “catastrophic forgetting”
Accuracy of original domain drops from 95% (dataset A) to 87% (dataset A),
while achieving the new domain detection accuracy w/ 98% (dataset B).
Problem Statements
1. Catastrophic forgetting may occur due to training with data from different domains.
2. Pretrained model requires a few source data to prevent the catastrophic forgetting during
domain adaptation. However, sometimes source data may not be available.
3. It is difficult to classify low-quality (LQ) deepfake data compared to high-quality (HQ)
data
HQ
LQ
VS.
Contributions
1. We propose a novel domain adaption framework, “Feature Representation Transfer
Adaptation Learning” (FReTAL), based on knowledge distillation and representation
learning that can prevent catastrophic forgetting without accessing to the source
domain data.
2. We show that leveraging knowledge distillation and representation learning can enhance
adaptability across different deepfake domains.
3. We demonstrate that our method outperforms baseline approaches on deepfake
benchmark datasets with up to 86.97% accuracy on low-quality deepfake detection.
KD Loss
Non-trainable Teacher Model
(Pre-trained on Source Data)
Student Model
(To-be trained on Target Data)
Our Approach - Knowledge Distillation (KD)
 KD is a method to compress knowledge of a large model to a small model
 The main idea is the student model can mimic the knowledge of the teacher model
Target Data
 Representation learning is the process of learning representations of input data.
 Representation Learning is a training method by representing the hidden layers of a network
by applying some conditions to the learned intermediate features.
Default Representation Semantic Representation
Our Approach – Feature-based Representation Learning
Assume : Similar features exist
Representation Learning
Dataset – FaceForensics++
Rossler, Andreas, et al. "Faceforensics++: Learning to detect manipulated facial images.“
Proceedings of the IEEE/CVF International Conference on Computer Vision. 2019.
Real Fake
Deepfakes Face2Face FaceSwap Neural
Textures
Dataset
Total
Videos
Training
Videos
Transfer
Learning
Testing
Videos
Pristine (Real) 1,000 750 10 250
DeepFake (DF) 1,000 750 10 250
FaceSwap (FS) 1,000 750 10 250
Face2Face (F2F) 1,000 750 10 250
Neural Textures (NT) 1,000 750 10 250
The details of datasets used for training and
testing
Experiments - Baselines
● Baselines for transfer learning
Backbone Network is Xception
○ Fine-Turning (FT): General Transfer Learning method with 10 few shot target videos
○ Transferable GAN-generated images detection framework (T-GD) [ICML2020]
○ Knowledge-Distillation (KD): [Hinton2015]
Experiments (High-quality)
Method Domain DF→F2F (%) DF→FS (%) F2F→DF (%) F2F→FS (%) FS→DF (%) FS→F2F (%)
Xception
+ FT
Source 93.65 70.00 95.1 90.35 93.77 94.91
Target 84.59 55.18 91.32 55.26 86.56 83.11
Avg. 89.12 62.59 93.21 72.81 90.17 89.01
Xception
+ T-GD
Source 92.96 73.92 96.89 90.42 92.55 94.85
Target 77.89 55.64 84.55 55.6 79.38 78.49
Avg. 85.43 64.78 90.72 73.01 85.97 86.67
Xception
+ KD
Source 95.58 82.77 96.91 84.57 95.65 96.28
Target 84.31 59.55 92.51 76.45 87.05 85.12
Avg. 89.95 71.16 94.72 80.51 91.35 90.70
Xception
+ FReTAL
Source 95.68 88.6 98.09 93.36 92.57 96.41
Target 84.54 76.23 89.90 80.63 86.45 88.64
Avg. 90.11 82.42 94.00 82.00 89.51 92.53
Student model performance on both source/target dataset (HQ) Source→Targ
et
Student model performance on both source/target dataset (LQ)
Method Domain FS→F2F (%) F2F→FS (%) FS→DF (%) DF→F2F (%) F2F→NT (%) DF→NT (%)
Xception
+ FT
Source 40.93 84.78 80.56 89.84 87.12 88.29
Target 60.30 52.97 64.61 58.24 76.78 82.4
Avg. 50.62 75.05 72.59 74.04 81.95 85.35
Xception
+ T-GD
Source 36.08 84.70 85.98 88.07 83.22 81.23
Target 56.95 52.95 55.90 49.55 52.69 67.11
Avg. 46.52 68.83 70.94 68.81 67.96 74.17
Xception
+ KD
Source 48.07 84.84 80.48 82.59 86.07 89.61
Target 61.40 65.26 64.63 64.34 74.56 81.03
Avg. 54.74 75.05 72.56 73.47 80.32 85.32
Xception
+ FReTAL
Source 81.78 82.03 85.93 91.20 82.85 90.56
Target 64.45 68.79 65.78 62.09 83.87 83.38
Avg. 73.12 75.41 75.86 76.65 83.36 86.97
Experiments (Low-quality)
Conclusion
1. We found that similar features exist between the source and target dataset that can help in
domain adaptation though our representation learning framework.
2. We demonstrate that applying our FReTAL loss without even using the source dataset can
significantly reduce catastrophic forgetting.
3. We achieve higher performances than other methods, on both source dataset as well as
target dataset.
Deepfakes
Face2Fa
ce
Thank you!
https://dash-lab.github.io/
Code is available here:
https://github.com/alsgkals2/FReTAL

More Related Content

What's hot

DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptxsandeshsb
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...Edge AI and Vision Alliance
 
Latent diffusions vs DALL-E v2
Latent diffusions vs DALL-E v2Latent diffusions vs DALL-E v2
Latent diffusions vs DALL-E v2Vitaly Bondar
 
DeepFake: Trick or Treat
DeepFake: Trick or TreatDeepFake: Trick or Treat
DeepFake: Trick or TreatSamama Khan
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
Emerging Properties in Self-Supervised Vision Transformers
Emerging Properties in Self-Supervised Vision TransformersEmerging Properties in Self-Supervised Vision Transformers
Emerging Properties in Self-Supervised Vision TransformersSungchul Kim
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1San Kim
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxNilayDeshmukh3
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Ian McCarthy
 
Presentation on "Computer vision".
Presentation on "Computer vision".Presentation on "Computer vision".
Presentation on "Computer vision".MobeenAhmed25
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognitionRushin Shah
 

What's hot (20)

DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
 
Deep fake
Deep fakeDeep fake
Deep fake
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Latent diffusions vs DALL-E v2
Latent diffusions vs DALL-E v2Latent diffusions vs DALL-E v2
Latent diffusions vs DALL-E v2
 
DeepFake: Trick or Treat
DeepFake: Trick or TreatDeepFake: Trick or Treat
DeepFake: Trick or Treat
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deep fakes and beyond
Deep fakes and beyondDeep fakes and beyond
Deep fakes and beyond
 
Emerging Properties in Self-Supervised Vision Transformers
Emerging Properties in Self-Supervised Vision TransformersEmerging Properties in Self-Supervised Vision Transformers
Emerging Properties in Self-Supervised Vision Transformers
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
 
Deep fake
Deep fakeDeep fake
Deep fake
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
Presentation on "Computer vision".
Presentation on "Computer vision".Presentation on "Computer vision".
Presentation on "Computer vision".
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognition
 

Similar to Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning

Presentation on Machine Learning and Data Mining
Presentation on Machine Learning and Data MiningPresentation on Machine Learning and Data Mining
Presentation on Machine Learning and Data Miningbutest
 
B4UConference_machine learning_deeplearning
B4UConference_machine learning_deeplearningB4UConference_machine learning_deeplearning
B4UConference_machine learning_deeplearningHoa Le
 
MPerceptron
MPerceptronMPerceptron
MPerceptronbutest
 
Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Julien SIMON
 
Eswc2009
Eswc2009Eswc2009
Eswc2009fanizzi
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakPyData
 
Forest Cover type prediction
Forest Cover type predictionForest Cover type prediction
Forest Cover type predictionDaniel Gribel
 
Hands on Mahout!
Hands on Mahout!Hands on Mahout!
Hands on Mahout!OSCON Byrum
 
How to use transfer learning to bootstrap image classification and question a...
How to use transfer learning to bootstrap image classification and question a...How to use transfer learning to bootstrap image classification and question a...
How to use transfer learning to bootstrap image classification and question a...Wee Hyong Tok
 
Deep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and HypeDeep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and HypeSiby Jose Plathottam
 
Computational Biology, Part 4 Protein Coding Regions
Computational Biology, Part 4 Protein Coding RegionsComputational Biology, Part 4 Protein Coding Regions
Computational Biology, Part 4 Protein Coding Regionsbutest
 
Course Title CS591-Advance Artificial Intelligence
Course Title CS591-Advance Artificial Intelligence           Course Title CS591-Advance Artificial Intelligence
Course Title CS591-Advance Artificial Intelligence CruzIbarra161
 
230208 MLOps Getting from Good to Great.pptx
230208 MLOps Getting from Good to Great.pptx230208 MLOps Getting from Good to Great.pptx
230208 MLOps Getting from Good to Great.pptxArthur240715
 
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017StampedeCon
 
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...SimranKetha
 
Automated_attendance_system_project.pptx
Automated_attendance_system_project.pptxAutomated_attendance_system_project.pptx
Automated_attendance_system_project.pptxNaveensai51
 
AI & ML in Defence Systems - Sunil Chomal
AI & ML in Defence Systems   - Sunil ChomalAI & ML in Defence Systems   - Sunil Chomal
AI & ML in Defence Systems - Sunil ChomalSunil Chomal
 
(Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing (Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing Gilles Perrouin
 
Evaluating Classification Algorithms Applied To Data Streams Esteban Donato
Evaluating Classification Algorithms Applied To Data Streams   Esteban DonatoEvaluating Classification Algorithms Applied To Data Streams   Esteban Donato
Evaluating Classification Algorithms Applied To Data Streams Esteban DonatoEsteban Donato
 

Similar to Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning (20)

Presentation on Machine Learning and Data Mining
Presentation on Machine Learning and Data MiningPresentation on Machine Learning and Data Mining
Presentation on Machine Learning and Data Mining
 
B4UConference_machine learning_deeplearning
B4UConference_machine learning_deeplearningB4UConference_machine learning_deeplearning
B4UConference_machine learning_deeplearning
 
MPerceptron
MPerceptronMPerceptron
MPerceptron
 
Human Emotion Recognition
Human Emotion RecognitionHuman Emotion Recognition
Human Emotion Recognition
 
Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)
 
Eswc2009
Eswc2009Eswc2009
Eswc2009
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
 
Forest Cover type prediction
Forest Cover type predictionForest Cover type prediction
Forest Cover type prediction
 
Hands on Mahout!
Hands on Mahout!Hands on Mahout!
Hands on Mahout!
 
How to use transfer learning to bootstrap image classification and question a...
How to use transfer learning to bootstrap image classification and question a...How to use transfer learning to bootstrap image classification and question a...
How to use transfer learning to bootstrap image classification and question a...
 
Deep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and HypeDeep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and Hype
 
Computational Biology, Part 4 Protein Coding Regions
Computational Biology, Part 4 Protein Coding RegionsComputational Biology, Part 4 Protein Coding Regions
Computational Biology, Part 4 Protein Coding Regions
 
Course Title CS591-Advance Artificial Intelligence
Course Title CS591-Advance Artificial Intelligence           Course Title CS591-Advance Artificial Intelligence
Course Title CS591-Advance Artificial Intelligence
 
230208 MLOps Getting from Good to Great.pptx
230208 MLOps Getting from Good to Great.pptx230208 MLOps Getting from Good to Great.pptx
230208 MLOps Getting from Good to Great.pptx
 
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
Getting Started with Keras and TensorFlow - StampedeCon AI Summit 2017
 
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...
Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL ...
 
Automated_attendance_system_project.pptx
Automated_attendance_system_project.pptxAutomated_attendance_system_project.pptx
Automated_attendance_system_project.pptx
 
AI & ML in Defence Systems - Sunil Chomal
AI & ML in Defence Systems   - Sunil ChomalAI & ML in Defence Systems   - Sunil Chomal
AI & ML in Defence Systems - Sunil Chomal
 
(Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing (Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing
 
Evaluating Classification Algorithms Applied To Data Streams Esteban Donato
Evaluating Classification Algorithms Applied To Data Streams   Esteban DonatoEvaluating Classification Algorithms Applied To Data Streams   Esteban Donato
Evaluating Classification Algorithms Applied To Data Streams Esteban Donato
 

More from KIMMINHA3

[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-SpoofingKIMMINHA3
 
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-SpoofingKIMMINHA3
 
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...KIMMINHA3
 
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-SpoofingKIMMINHA3
 
[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof TraceKIMMINHA3
 
Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)KIMMINHA3
 
[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruningKIMMINHA3
 
Methods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networksMethods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networksKIMMINHA3
 
Meta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot LearningMeta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot LearningKIMMINHA3
 
“zero-shot” super-resolution using deep internal learning [CVPR2018]
“zero-shot” super-resolution using deep internal learning [CVPR2018]“zero-shot” super-resolution using deep internal learning [CVPR2018]
“zero-shot” super-resolution using deep internal learning [CVPR2018]KIMMINHA3
 
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...KIMMINHA3
 
Transferable GAN-generated Images Detection Framework.
Transferable GAN-generated Images  Detection Framework.Transferable GAN-generated Images  Detection Framework.
Transferable GAN-generated Images Detection Framework.KIMMINHA3
 
[Seminar arxiv]fake face detection via adaptive residuals extraction network
[Seminar arxiv]fake face detection via adaptive residuals extraction network [Seminar arxiv]fake face detection via adaptive residuals extraction network
[Seminar arxiv]fake face detection via adaptive residuals extraction network KIMMINHA3
 
Xception mhkim
Xception mhkimXception mhkim
Xception mhkimKIMMINHA3
 
short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...KIMMINHA3
 

More from KIMMINHA3 (15)

[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
 
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
 
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
 
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
 
[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace
 
Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)
 
[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning
 
Methods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networksMethods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networks
 
Meta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot LearningMeta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot Learning
 
“zero-shot” super-resolution using deep internal learning [CVPR2018]
“zero-shot” super-resolution using deep internal learning [CVPR2018]“zero-shot” super-resolution using deep internal learning [CVPR2018]
“zero-shot” super-resolution using deep internal learning [CVPR2018]
 
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...
[CVPRW 2020]Real world Super-Resolution via Kernel Estimation and Noise Injec...
 
Transferable GAN-generated Images Detection Framework.
Transferable GAN-generated Images  Detection Framework.Transferable GAN-generated Images  Detection Framework.
Transferable GAN-generated Images Detection Framework.
 
[Seminar arxiv]fake face detection via adaptive residuals extraction network
[Seminar arxiv]fake face detection via adaptive residuals extraction network [Seminar arxiv]fake face detection via adaptive residuals extraction network
[Seminar arxiv]fake face detection via adaptive residuals extraction network
 
Xception mhkim
Xception mhkimXception mhkim
Xception mhkim
 
short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning

  • 1. FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning Minha Kim kimminha@g.skku.edu Workshop on Media Forensics CVPR 2021 - Virtual Data-drive AI Security HCI (DASH) Lab Sungkyunkwan University, South Korea Simon S. Woo swoo@g.skku.edu Shahroz Tariq shahroz@g.skku.edu
  • 3. Transfer Introduction Dataset B (Face2Face) Dataset A Dataset B (Face2Face) Accuracy 95%87% ↓ Accuracy 98% Catastrophic Forgetting However, It can lead to “catastrophic forgetting” Accuracy of original domain drops from 95% (dataset A) to 87% (dataset A), while achieving the new domain detection accuracy w/ 98% (dataset B).
  • 4. Problem Statements 1. Catastrophic forgetting may occur due to training with data from different domains. 2. Pretrained model requires a few source data to prevent the catastrophic forgetting during domain adaptation. However, sometimes source data may not be available. 3. It is difficult to classify low-quality (LQ) deepfake data compared to high-quality (HQ) data HQ LQ VS.
  • 5. Contributions 1. We propose a novel domain adaption framework, “Feature Representation Transfer Adaptation Learning” (FReTAL), based on knowledge distillation and representation learning that can prevent catastrophic forgetting without accessing to the source domain data. 2. We show that leveraging knowledge distillation and representation learning can enhance adaptability across different deepfake domains. 3. We demonstrate that our method outperforms baseline approaches on deepfake benchmark datasets with up to 86.97% accuracy on low-quality deepfake detection.
  • 6. KD Loss Non-trainable Teacher Model (Pre-trained on Source Data) Student Model (To-be trained on Target Data) Our Approach - Knowledge Distillation (KD)  KD is a method to compress knowledge of a large model to a small model  The main idea is the student model can mimic the knowledge of the teacher model Target Data
  • 7.  Representation learning is the process of learning representations of input data.  Representation Learning is a training method by representing the hidden layers of a network by applying some conditions to the learned intermediate features. Default Representation Semantic Representation Our Approach – Feature-based Representation Learning
  • 8. Assume : Similar features exist Representation Learning
  • 9. Dataset – FaceForensics++ Rossler, Andreas, et al. "Faceforensics++: Learning to detect manipulated facial images.“ Proceedings of the IEEE/CVF International Conference on Computer Vision. 2019. Real Fake Deepfakes Face2Face FaceSwap Neural Textures Dataset Total Videos Training Videos Transfer Learning Testing Videos Pristine (Real) 1,000 750 10 250 DeepFake (DF) 1,000 750 10 250 FaceSwap (FS) 1,000 750 10 250 Face2Face (F2F) 1,000 750 10 250 Neural Textures (NT) 1,000 750 10 250 The details of datasets used for training and testing
  • 10. Experiments - Baselines ● Baselines for transfer learning Backbone Network is Xception ○ Fine-Turning (FT): General Transfer Learning method with 10 few shot target videos ○ Transferable GAN-generated images detection framework (T-GD) [ICML2020] ○ Knowledge-Distillation (KD): [Hinton2015]
  • 11. Experiments (High-quality) Method Domain DF→F2F (%) DF→FS (%) F2F→DF (%) F2F→FS (%) FS→DF (%) FS→F2F (%) Xception + FT Source 93.65 70.00 95.1 90.35 93.77 94.91 Target 84.59 55.18 91.32 55.26 86.56 83.11 Avg. 89.12 62.59 93.21 72.81 90.17 89.01 Xception + T-GD Source 92.96 73.92 96.89 90.42 92.55 94.85 Target 77.89 55.64 84.55 55.6 79.38 78.49 Avg. 85.43 64.78 90.72 73.01 85.97 86.67 Xception + KD Source 95.58 82.77 96.91 84.57 95.65 96.28 Target 84.31 59.55 92.51 76.45 87.05 85.12 Avg. 89.95 71.16 94.72 80.51 91.35 90.70 Xception + FReTAL Source 95.68 88.6 98.09 93.36 92.57 96.41 Target 84.54 76.23 89.90 80.63 86.45 88.64 Avg. 90.11 82.42 94.00 82.00 89.51 92.53 Student model performance on both source/target dataset (HQ) Source→Targ et
  • 12. Student model performance on both source/target dataset (LQ) Method Domain FS→F2F (%) F2F→FS (%) FS→DF (%) DF→F2F (%) F2F→NT (%) DF→NT (%) Xception + FT Source 40.93 84.78 80.56 89.84 87.12 88.29 Target 60.30 52.97 64.61 58.24 76.78 82.4 Avg. 50.62 75.05 72.59 74.04 81.95 85.35 Xception + T-GD Source 36.08 84.70 85.98 88.07 83.22 81.23 Target 56.95 52.95 55.90 49.55 52.69 67.11 Avg. 46.52 68.83 70.94 68.81 67.96 74.17 Xception + KD Source 48.07 84.84 80.48 82.59 86.07 89.61 Target 61.40 65.26 64.63 64.34 74.56 81.03 Avg. 54.74 75.05 72.56 73.47 80.32 85.32 Xception + FReTAL Source 81.78 82.03 85.93 91.20 82.85 90.56 Target 64.45 68.79 65.78 62.09 83.87 83.38 Avg. 73.12 75.41 75.86 76.65 83.36 86.97 Experiments (Low-quality)
  • 13. Conclusion 1. We found that similar features exist between the source and target dataset that can help in domain adaptation though our representation learning framework. 2. We demonstrate that applying our FReTAL loss without even using the source dataset can significantly reduce catastrophic forgetting. 3. We achieve higher performances than other methods, on both source dataset as well as target dataset. Deepfakes Face2Fa ce
  • 14. Thank you! https://dash-lab.github.io/ Code is available here: https://github.com/alsgkals2/FReTAL

Editor's Notes

  1. 10sec Hello everyone, my name is Minha Kim. And, I’m going to present the paper ‘FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning’
  2. 4sec For example, we train a model with A Dataset.
  3. 23sec And then, we proceed with transfer learning using B dataset. during transfer learning, knowledge of models trained for A datasets can gradually be forgotten due to the target domain. In other words, Catastrophic Forgetting is caused, which forgets knowledge of the model about the source domain As we proceed with transfer learning using the B dataset of different domain, knowledge of the model, which had been pretrained and optimized for the A dataset, will now be more optimized for the B dataset than the A. We call this Catastrophic Forgetting in which the model forgets knowledge on source domain
  4. (v2)18sec There are three difficulties to overcome; One, catastrophic forgetting caused by cross-domain training, Two, restriction to source data access due to privacy and availability issues, and Lastly, low resolution environment that degrades performance of model ---------------------------------- (v1)32sec Our problem statement is; first, catastrophic forgetting is caused by two different domains. Second, to maintain existing information during transfer learning, the source data that you learned is usually required. However, it may raise privacy concerns. And, Most source domain data is not available. Third, It is difficult to classify low-resolution data compared to high-resolution data
  5. 36sec So, our contributions are as follows. First, our approach can prevent catastrophic forgetting without accessing to the source domain data. Second, We show that leveraging knowledge distillation and representation learning can enhance adaptability across different deepfake domains. Third, We demonstrate that our method outperforms baseline approaches on deepfake benchmark datasets with up to 86.97% accuracy on low-quality deepfakes
  6. (v2) 25sec To prevent the catastrophic forgetting, our approach mainly focuses on the Knowledge distillation and representation learning. KD is a method to compress knowledge of a large model into a smaller model with a notion of student model can mimic the teacher model. We take advantage of this and use two common networks for teacher and student models when transfer learning --------------------------------- (v1) 32sec To prevent the catastrophic forgetting, our approach mainly focuses the Knowledge distillation and representation learning. KD is a method to compress knowledge of a large model to a small model. The main idea is the student model can mimic the knowledge of the teacher model. We take advantage of the ability of student to mimic teacher's knowledge and use two same networks as teacher and student models for transfer learning.
  7. 27sec The Representation Learning is representing the hidden layers of a network by applying some conditions to the learned intermediate features. Representation learning is the process of learning representations of input data, usually by transforming or extracting features from it, making a task like classification easier to perform.
  8. ---------------------------------------------------------------- 100sec It is architecture of our model, including KD and representation learning. We assume that similar features must exist between different types of deepfakes. Therefore, a teacher model trained on the source domain can help the student learns the target domain with fewer target data samples. We divide the storage into five, Because we have to fine-tune very carefully to prevent domain shifting. And we store feature information in the appropriate storage for the softmax value of output, where input is the average value scalar of feature vector. All feature scalar values stored in this storage are fixed on the teacher model, because it is always fixed during the training progress. Also, In the same way, we store feature information in storage of the student model.. Note that, unlike the teacher model, the feature information in storage of the student model will change in each iteration as training progress. And, during transfer learning, we calculate the difference between student and teacher model using our feature-based square loss. Also, We calculate KD loss between teacher and student models and a cross-entropy loss function just for the student model. Finally, Our FReTAL method can be written with the three loss terms.
  9. 18sec For experiment, we used FaceForensics++ datasets and extract frames from the origin and manipulated video. First, we divide the number of videos as shown in the following table and then extract 80 images per video.
  10. 10sec We explored several baselines fine-tuning, T-GD, and KD methods based on Xception for comparison in transfer learning phase.
  11. 14sec We evaluate all datasets with four baselines using four domain adaptation methods. FReTAL demonstrate the best and most consistent performance. The best results are highlighted with the red color .
  12. 6sec In addition, our approach show the best performance for all low-quality datasets.
  13. 25sec To sum up, we find that similar features exist between the source and target dataset that can help in domain adaptation. Moreover, we demonstrate that applying KD loss without even using the source dataset can reduce catastrophic forgetting. Finally, we achieve higher performances than other methods, on both source dataset as well as target dataset.