{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:20:29Z","timestamp":1770747629735,"version":"3.49.0"},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Vision and Image Understanding"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1016\/j.cviu.2024.104078","type":"journal-article","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T08:20:08Z","timestamp":1720945208000},"page":"104078","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["Artifact feature purification for cross-domain detection of AI-generated images"],"prefix":"10.1016","volume":"247","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1287-164X","authenticated-orcid":false,"given":"Zheling","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9014-7369","authenticated-orcid":false,"given":"Bo","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Haonan","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cviu.2024.104078_b1","series-title":"Parents and children: Distinguishing multimodal deepfakes from natural images","author":"Amoroso","year":"2023"},{"key":"10.1016\/j.cviu.2024.104078_b2","first-page":"122","article-title":"ADD: Frequency attention and multi-view based knowledge distillation to detect low-quality compressed deepfake images","volume":"vol. 36","author":"Binh","year":"2022"},{"key":"10.1016\/j.cviu.2024.104078_b3","unstructured":"Brock,\u00a0A., Donahue,\u00a0J., Simonyan,\u00a0K., 2019. Large scale GAN training for high fidelity natural image synthesis. In: International Conference on Learning Representations."},{"key":"10.1016\/j.cviu.2024.104078_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2023.103818","article-title":"Glitch in the matrix: A large scale benchmark for content driven audio\u2013visual forgery detection and localization","volume":"236","author":"Cai","year":"2023","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.cviu.2024.104078_b5","unstructured":"Carlini,\u00a0N., Hayes,\u00a0J., Nasr,\u00a0M., Jagielski,\u00a0M., Sehwag,\u00a0V., Tramer,\u00a0F., Balle,\u00a0B., Ippolito,\u00a0D., Wallace,\u00a0E., 2023. Extracting training data from diffusion models. In: Proceedings of the 32nd USENIX Security Symposium. pp. 5253\u20135270."},{"key":"10.1016\/j.cviu.2024.104078_b6","doi-asserted-by":"crossref","unstructured":"Chai,\u00a0L., Bau,\u00a0D., Lim,\u00a0S.-N., Isola,\u00a0P., 2020. What makes fake images detectable? Understanding properties that generalize. In: Proceedings of European Conference on Computer Vision. pp. 103\u2013120.","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"10.1016\/j.cviu.2024.104078_b7","first-page":"1081","article-title":"Local relation learning for face forgery detection","volume":"vol. 35","author":"Chen","year":"2021"},{"key":"10.1016\/j.cviu.2024.104078_b8","unstructured":"Cheng,\u00a0P., Hao,\u00a0W., Dai,\u00a0S., Liu,\u00a0J., Gan,\u00a0Z., Carin,\u00a0L., 2020. CLUB: A contrastive log-ratio upper bound of mutual information. In: Proceedings of International Conference on Machine Learning. pp. 1779\u20131788."},{"key":"10.1016\/j.cviu.2024.104078_b9","doi-asserted-by":"crossref","unstructured":"Corvi,\u00a0R., Cozzolino,\u00a0D., Poggi,\u00a0G., Nagano,\u00a0K., Verdoliva,\u00a0L., 2023a. Intriguing properties of synthetic images: From generative adversarial networks to diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 973\u2013982.","DOI":"10.1109\/CVPRW59228.2023.00104"},{"key":"10.1016\/j.cviu.2024.104078_b10","doi-asserted-by":"crossref","unstructured":"Corvi,\u00a0R., Cozzolino,\u00a0D., Zingarini,\u00a0G., Poggi,\u00a0G., Nagano,\u00a0K., Verdoliva,\u00a0L., 2023b. On the detection of synthetic images generated by diffusion models. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. pp. 1\u20135.","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"10.1016\/j.cviu.2024.104078_b11","doi-asserted-by":"crossref","unstructured":"Deng,\u00a0J., Dong,\u00a0W., Socher,\u00a0R., Li,\u00a0L., Li,\u00a0K., Feifei,\u00a0L., 2009. ImageNet: A large-scale hierarchical image database. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 248\u2013255.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"10.1016\/j.cviu.2024.104078_b12","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume":"vol. 34","author":"Dhariwal","year":"2021"},{"key":"10.1016\/j.cviu.2024.104078_b13","doi-asserted-by":"crossref","unstructured":"Fei,\u00a0J., Dai,\u00a0Y., Yu,\u00a0P., Shen,\u00a0T., Xia,\u00a0Z., Weng,\u00a0J., 2022. Learning second order local anomaly for general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 20270\u201320280.","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"10.1016\/j.cviu.2024.104078_b14","unstructured":"Frank,\u00a0J., Eisenhofer,\u00a0T., Sch\u00f6nherr,\u00a0L., Fischer,\u00a0A., Kolossa,\u00a0D., Holz,\u00a0T., 2020. Leveraging frequency analysis for deep fake image recognition. In: Proceedings of International Conference on Machine Learning. pp. 3247\u20133258."},{"issue":"3","key":"10.1016\/j.cviu.2024.104078_b15","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.cviu.2024.104078_b16","doi-asserted-by":"crossref","unstructured":"Gu,\u00a0S., Chen,\u00a0D., Bao,\u00a0J., Wen,\u00a0F., Zhang,\u00a0B., Chen,\u00a0D., Yuan,\u00a0L., Guo,\u00a0B., 2022a. Vector quantized diffusion model for text-to-image synthesis. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 10696\u201310706.","DOI":"10.1109\/CVPR52688.2022.01043"},{"key":"10.1016\/j.cviu.2024.104078_b17","first-page":"735","article-title":"Exploiting fine-grained face forgery clues via progressive enhancement learning","volume":"vol. 36","author":"Gu","year":"2022"},{"key":"10.1016\/j.cviu.2024.104078_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2022.103587","article-title":"A data augmentation framework by mining structured features for fake face image detection","volume":"226","author":"Guo","year":"2023","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.cviu.2024.104078_b19","doi-asserted-by":"crossref","unstructured":"He,\u00a0K., Zhang,\u00a0X., Ren,\u00a0S., Sun,\u00a0J., 2016. Deep residual learning for image recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"issue":"9","key":"10.1016\/j.cviu.2024.104078_b20","first-page":"5149","article-title":"Meta-learning in neural networks: A survey","volume":"44","author":"Hospedales","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.cviu.2024.104078_b21","doi-asserted-by":"crossref","first-page":"1668","DOI":"10.1109\/TIP.2023.3246793","article-title":"Learning patch-channel correspondence for interpretable face forgery detection","volume":"32","author":"Hua","year":"2023","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.cviu.2024.104078_b22","doi-asserted-by":"crossref","unstructured":"Jia,\u00a0S., Ma,\u00a0C., Yao,\u00a0T., Yin,\u00a0B., Ding,\u00a0S., Yang,\u00a0X., 2022. Exploring frequency adversarial attacks for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 4103\u20134112.","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"10.1016\/j.cviu.2024.104078_b23","doi-asserted-by":"crossref","first-page":"5875","DOI":"10.1109\/TIP.2021.3089943","article-title":"LayerCam: Exploring hierarchical class activation maps for localization","volume":"30","author":"Jiang","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.cviu.2024.104078_b24","doi-asserted-by":"crossref","unstructured":"Ju,\u00a0Y., Jia,\u00a0S., Ke,\u00a0L., Xue,\u00a0H., Nagano,\u00a0K., Lyu,\u00a0S., 2022. Fusing global and local features for generalized ai-synthesized image detection. In: Proceedings of the IEEE International Conference on Image Processing. pp. 3465\u20133469.","DOI":"10.1109\/ICIP46576.2022.9897820"},{"issue":"12","key":"10.1016\/j.cviu.2024.104078_b25","doi-asserted-by":"crossref","first-page":"4217","DOI":"10.1109\/TPAMI.2020.2970919","article-title":"A style-based generator architecture for generative adversarial networks","volume":"43","author":"Karras","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"10.1016\/j.cviu.2024.104078_b26","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/TCSVT.2022.3217950","article-title":"Artifacts-disentangled adversarial learning for deepfake detection","volume":"33","author":"Li","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.cviu.2024.104078_b27","doi-asserted-by":"crossref","unstructured":"Li,\u00a0J., Xie,\u00a0H., Li,\u00a0J., Wang,\u00a0Z., Zhang,\u00a0Y., 2021. Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 6458\u20136467.","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"10.1016\/j.cviu.2024.104078_b28","doi-asserted-by":"crossref","unstructured":"Liu,\u00a0Z., Lin,\u00a0Y., Cao,\u00a0Y., Hu,\u00a0H., Wei,\u00a0Y., Zhang,\u00a0Z., Lin,\u00a0S., Guo,\u00a0B., 2021. Swin Transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 10012\u201310022.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"10.1016\/j.cviu.2024.104078_b29","doi-asserted-by":"crossref","unstructured":"Liu,\u00a0Z., Qi,\u00a0X., Torr,\u00a0P.H., 2020. Global texture enhancement for fake face detection in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 8060\u20138069.","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"10.1016\/j.cviu.2024.104078_b30","doi-asserted-by":"crossref","unstructured":"Liu,\u00a0B., Yang,\u00a0F., Bi,\u00a0X., Xiao,\u00a0B., Li,\u00a0W., Gao,\u00a0X., 2022. Detecting generated images by real images. In: European Conference on Computer Vision. pp. 95\u2013110.","DOI":"10.1007\/978-3-031-19781-9_6"},{"key":"10.1016\/j.cviu.2024.104078_b31","doi-asserted-by":"crossref","unstructured":"Lorenz,\u00a0P., Durall,\u00a0R.L., Keuper,\u00a0J., 2023. Detecting images generated by deep diffusion models using their Local Intrinsic Dimensionality. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops. pp. 448\u2013459.","DOI":"10.1109\/ICCVW60793.2023.00051"},{"key":"10.1016\/j.cviu.2024.104078_b32","doi-asserted-by":"crossref","unstructured":"Luo,\u00a0Y., Zhang,\u00a0Y., Yan,\u00a0J., Liu,\u00a0W., 2021. Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 16317\u201316326.","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"10.1016\/j.cviu.2024.104078_b33","unstructured":"Ma,\u00a0R., Duan,\u00a0J., Kong,\u00a0F., Shi,\u00a0X., Xu,\u00a0K., 2023. Exposing the fake: Effective diffusion-generated images detection. In: Proceedings of International Conference on Machine Learning Workshops."},{"key":"10.1016\/j.cviu.2024.104078_b34","doi-asserted-by":"crossref","unstructured":"Mandelli,\u00a0S., Bonettini,\u00a0N., Bestagini,\u00a0P., Tubaro,\u00a0S., 2022. Detecting GAN-generated images by orthogonal training of multiple CNNs. In: Proceedings of the IEEE International Conference on Image Processing. pp. 3091\u20133095.","DOI":"10.1109\/ICIP46576.2022.9897310"},{"key":"10.1016\/j.cviu.2024.104078_b35","series-title":"Midjourney","author":"Midjourney","year":"2022"},{"issue":"1","key":"10.1016\/j.cviu.2024.104078_b36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3425780","article-title":"The creation and detection of deepfakes: A survey","volume":"54","author":"Mirsky","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cviu.2024.104078_b37","unstructured":"Nichol,\u00a0A.Q., Dhariwal,\u00a0P., 2021. Improved denoising diffusion probabilistic models. In: Proceedings of International Conference on Machine Learning. pp. 8162\u20138171."},{"key":"10.1016\/j.cviu.2024.104078_b38","unstructured":"Nichol,\u00a0A.Q., Dhariwal,\u00a0P., Ramesh,\u00a0A., Shyam,\u00a0P., Mishkin,\u00a0P., Mcgrew,\u00a0B., Sutskever,\u00a0I., Chen,\u00a0M., 2022. GLIDE: Towards photorealistic image generation and editing with text-guided diffusion models. In: Proceedings of International Conference on Machine Learning. pp. 16784\u201316804."},{"key":"10.1016\/j.cviu.2024.104078_b39","doi-asserted-by":"crossref","unstructured":"Ojha,\u00a0U., Li,\u00a0Y., Lee,\u00a0Y.J., 2023. Towards universal fake image detectors that generalize across generative models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 24480\u201324489.","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"10.1016\/j.cviu.2024.104078_b40","doi-asserted-by":"crossref","unstructured":"Qian,\u00a0Y., Yin,\u00a0G., Sheng,\u00a0L., Chen,\u00a0Z., Shao,\u00a0J., 2020. Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: Proceedings of European Conference on Computer Vision. pp. 86\u2013103.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"10.1016\/j.cviu.2024.104078_b41","series-title":"Hierarchical text-conditional image generation with CLIP latents","author":"Ramesh","year":"2022"},{"key":"10.1016\/j.cviu.2024.104078_b42","doi-asserted-by":"crossref","unstructured":"Ricker,\u00a0J., Damm,\u00a0S., Holz,\u00a0T., Fischer,\u00a0A., 2023. Towards the detection of diffusion model deepfakes. In: International Conference on Learning Representations.","DOI":"10.5220\/0012422000003660"},{"key":"10.1016\/j.cviu.2024.104078_b43","doi-asserted-by":"crossref","unstructured":"Rombach,\u00a0R., Blattmann,\u00a0A., Lorenz,\u00a0D., Esser,\u00a0P., Ommer,\u00a0B., 2022. High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 10684\u201310695.","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"10.1016\/j.cviu.2024.104078_b44","first-page":"36479","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","volume":"35","author":"Saharia","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.cviu.2024.104078_b45","first-page":"17480","article-title":"Projected gans converge faster","volume":"34","author":"Sauer","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.cviu.2024.104078_b46","doi-asserted-by":"crossref","unstructured":"Sha,\u00a0Z., Li,\u00a0Z., Yu,\u00a0N., Zhang,\u00a0Y., 2022. De-fake: Detection and attribution of fake images generated by text-to-image diffusion models. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. pp. 3418\u20133432.","DOI":"10.1145\/3576915.3616588"},{"key":"10.1016\/j.cviu.2024.104078_b47","unstructured":"Song,\u00a0J., Meng,\u00a0C., Ermon,\u00a0S., 2020. Denoising diffusion implicit models. In: International Conference on Learning Representations."},{"key":"10.1016\/j.cviu.2024.104078_b48","doi-asserted-by":"crossref","unstructured":"Sun,\u00a0K., Liu,\u00a0H., Yao,\u00a0T., Sun,\u00a0X., Chen,\u00a0S., Ding,\u00a0S., Ji,\u00a0R., 2022. An information theoretic approach for attention-driven face forgery detection. In: Proceedings of European Conference on Computer Vision. pp. 111\u2013127.","DOI":"10.1007\/978-3-031-19781-9_7"},{"key":"10.1016\/j.cviu.2024.104078_b49","doi-asserted-by":"crossref","unstructured":"Tan,\u00a0C., Zhao,\u00a0Y., Wei,\u00a0S., Gu,\u00a0G., Wei,\u00a0Y., 2023. Learning on gradients: Generalized artifacts representation for gan-generated images detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 12105\u201312114.","DOI":"10.1109\/CVPR52729.2023.01165"},{"key":"10.1016\/j.cviu.2024.104078_b50","doi-asserted-by":"crossref","unstructured":"Tian,\u00a0C., Luo,\u00a0Z., Shi,\u00a0G., Li,\u00a0S., 2023. Frequency-aware attentional feature fusion for deepfake detection. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. pp. 1\u20135.","DOI":"10.1109\/ICASSP49357.2023.10094654"},{"key":"10.1016\/j.cviu.2024.104078_b51","unstructured":"Touvron,\u00a0H., Cord,\u00a0M., Douze,\u00a0M., Massa,\u00a0F., Sablayrolles,\u00a0A., J\u00e9gou,\u00a0H., 2021. Training data-efficient image transformers & distillation through attention. In: Proceedings of International Conference on Machine Learning. pp. 10347\u201310357."},{"key":"10.1016\/j.cviu.2024.104078_b52","article-title":"Attention is all you need","volume":"vol. 30","author":"Vaswani","year":"2017"},{"key":"10.1016\/j.cviu.2024.104078_b53","doi-asserted-by":"crossref","unstructured":"Wang,\u00a0Z., Bao,\u00a0J., Zhou,\u00a0W., Wang,\u00a0W., Hu,\u00a0H., Chen,\u00a0H., Li,\u00a0H., 2023a. DIRE for diffusion-generated image detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 22445\u201322455.","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"10.1016\/j.cviu.2024.104078_b54","doi-asserted-by":"crossref","unstructured":"Wang,\u00a0C., Deng,\u00a0W., 2021. Representative forgery mining for fake face detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 14923\u201314932.","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"10.1016\/j.cviu.2024.104078_b55","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/TIFS.2022.3146766","article-title":"Forgerynir: Deep face forgery and detection in near-infrared scenario","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.cviu.2024.104078_b56","doi-asserted-by":"crossref","unstructured":"Wang,\u00a0S., Wang,\u00a0O., Zhang,\u00a0R., Owens,\u00a0A., Efros,\u00a0A.A., 2020. CNN-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 8695\u20138704.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"10.1016\/j.cviu.2024.104078_b57","unstructured":"Wang,\u00a0Z., Zheng,\u00a0H., He,\u00a0P., Chen,\u00a0W., Zhou,\u00a0M., 2023b. Diffusion-gan: Training gans with diffusion. In: International Conference on Learning Representations."},{"key":"10.1016\/j.cviu.2024.104078_b58","series-title":"Generalizable synthetic image detection via language-guided contrastive learning","author":"Wu","year":"2023"},{"key":"10.1016\/j.cviu.2024.104078_b59","series-title":"Wukong","author":"Wukong","year":"2022"},{"key":"10.1016\/j.cviu.2024.104078_b60","series-title":"AI-generated image detection using a cross-attention enhanced dual-stream network","author":"Xi","year":"2023"},{"key":"10.1016\/j.cviu.2024.104078_b61","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2023.3290752","article-title":"Dynamic difference learning with spatio-temporal correlation for deepfake video detection","volume":"18","author":"Yin","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.cviu.2024.104078_b62","series-title":"LSUN: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"Yu","year":"2015"},{"key":"10.1016\/j.cviu.2024.104078_b63","doi-asserted-by":"crossref","unstructured":"Zhang,\u00a0X., Karaman,\u00a0S., Chang,\u00a0S., 2019. Detecting and simulating artifacts in GAN fake images. In: IEEE International Workshop on Information Forensics and Security. pp. 1\u20136.","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"10.1016\/j.cviu.2024.104078_b64","series-title":"Data forensics in diffusion models: A systematic analysis of membership privacy","author":"Zhu","year":"2023"},{"key":"10.1016\/j.cviu.2024.104078_b65","first-page":"77771","article-title":"GenImage: A million-scale benchmark for detecting AI-generated image","volume":"vol. 36","author":"Zhu","year":"2023"}],"container-title":["Computer Vision and Image Understanding"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1077314224001590?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1077314224001590?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T21:10:26Z","timestamp":1723669826000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1077314224001590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":65,"alternative-id":["S1077314224001590"],"URL":"https:\/\/doi.org\/10.1016\/j.cviu.2024.104078","relation":{},"ISSN":["1077-3142"],"issn-type":[{"value":"1077-3142","type":"print"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Artifact feature purification for cross-domain detection of AI-generated images","name":"articletitle","label":"Article Title"},{"value":"Computer Vision and Image Understanding","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cviu.2024.104078","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104078"}}