ABSTRACT The seminar is about a meta-learning approach to deepfake detection models. Deepfake techniques are becoming more advanced. Meta-learning allows a model to quickly adapt to new types of attacks by leveraging previous experience. The model is trained on a large dataset of diverse deepfake examples to learn the general patterns of forgery, and then fine-tuned on a smaller dataset of specific deepfake attacks to deepfake detection. Data augmentation techniques can further enhance the model's generalization ability. This seminar will discuss the theoretical aspects of meta-learning, data augmentation techniques, and their applications in deepfake detection. REFERENCES [1] Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, ‘‘Generative adversarial networks,’’ Commun. ACM, vol. 63, no. 11, pp. 139–144, 2020. [2] D. P. Kingma and M. Welling, ‘‘Auto-encoding variational Bayes,’’ 2013, arXiv:1312.6114. [3] D. J. Rezende, S. Mohamed, and D. Wierstra, ‘‘Stochastic backpropagation and approximate inference in deep generative models,’’ in Proc. Int. Conf. Mach. Learn., 2014, pp. 1278–1286. [4] R. Wu, G. Zhang, S. Lu, and T. Chen, ‘‘Cascade EF-GAN: Progressive facial expression editing with local focuses,’’ in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2020, pp. 5021–5030. [5] Y. Shen, J. Gu, X. Tang, and B. Zhou, ‘‘Interpreting the latent space of GANs for semantic face editing,’’ in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2020, pp. 9243–9252. [6] C.-H. Lee, Z. Liu, L. Wu, and P. Luo, ‘‘MaskGAN: Towards diverse and interactive facial image manipulation,’’ in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2020, pp. 5549–5558. [7] F. Matern, C. Riess, and M. Stamminger, ‘‘Exploiting visual artifacts to expose deepfakes and face manipulations,’’ in Proc. IEEE Winter Appl. Comput. Vis. Workshops (WACVW), Jan. 2019, pp. 83–92. [8] L. Li, J. Bao, T. Zhang, H. Yang, D. Chen, F. Wen, and B. Guo, ‘‘Face X-ray for more general face forgery detection,’’ in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2020, pp. 5001–5010. [9] X. Wu, Z. Xie, Y. Gao, and Y. Xiao, ‘‘SSTNet: Detecting manipulated faces through spatial, steganalysis and temporal features,’’ in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), May 2020, pp. 2952–2956. SIGNATURE OF PROJECT GUIDE: SIGNATURE OF SEMINAR COORDINATOR: