{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:07:40Z","timestamp":1776161260038,"version":"3.50.1"},"reference-count":71,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004500","name":"Chongqing Technology and Business University","doi-asserted-by":"publisher","award":["yjscxx2025-269-184"],"award-info":[{"award-number":["yjscxx2025-269-184"]}],"id":[{"id":"10.13039\/501100004500","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Visual Communication and Image Representation"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jvcir.2026.104788","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T16:53:03Z","timestamp":1775494383000},"page":"104788","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["MLHFA: Multi-local high-frequency attention and feature aggregation for generalizable deepfake detection"],"prefix":"10.1016","volume":"118","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8225-7917","authenticated-orcid":false,"given":"Yi","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3922-3319","authenticated-orcid":false,"given":"Xiping","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9541-5214","authenticated-orcid":false,"given":"Dan","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2111-0811","authenticated-orcid":false,"given":"Xiaoqin","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2450-4741","authenticated-orcid":false,"given":"Xuyuan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4497-3223","authenticated-orcid":false,"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jvcir.2026.104788_b1","series-title":"Journal of Physics: Conference Series","article-title":"A review on autonomous remote security and mobile surveillance using internet of things","volume":"vol. 1854","author":"Diwakar","year":"2021"},{"key":"10.1016\/j.jvcir.2026.104788_b2","doi-asserted-by":"crossref","first-page":"2264","DOI":"10.1016\/j.procs.2023.01.202","article-title":"An investigation of videos for abnormal behavior detection","volume":"218","author":"Patwal","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.jvcir.2026.104788_b3","series-title":"2025 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics","first-page":"1","article-title":"Video enabled crowd monitoring system and analysis","author":"Mehra","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104788_b4","series-title":"DALL\u22c5E 3","author":"OpenAI","year":"2015"},{"key":"10.1016\/j.jvcir.2026.104788_b5","series-title":"Midjourney home","author":"Midjourney","year":"2025"},{"issue":"11","key":"10.1016\/j.jvcir.2026.104788_b6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3625547","article-title":"Proactive deepfake detection using gan-based visible watermarking","volume":"20","author":"Nadimpalli","year":"2024","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"10.1016\/j.jvcir.2026.104788_b7","doi-asserted-by":"crossref","first-page":"22081","DOI":"10.1109\/ACCESS.2023.3251417","article-title":"An improved dense CNN architecture for deepfake image detection","volume":"11","author":"Patel","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.jvcir.2026.104788_b8","series-title":"2022 IEEE 2nd Mysore Sub Section International Conference","first-page":"1","article-title":"Deepfake detection using multi-path CNN and convolutional attention mechanism","author":"Nair","year":"2022"},{"key":"10.1016\/j.jvcir.2026.104788_b9","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1109\/TIFS.2023.3249566","article-title":"Masked relation learning for deepfake detection","volume":"18","author":"Yang","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2026.104788_b10","doi-asserted-by":"crossref","unstructured":"J. Wang, Z. Wu, W. Ouyang, X. Han, J. Chen, Y.-G. Jiang, S.-N. Li, M2tr: Multi-modal multi-scale transformers for deepfake detection, in: Proceedings of the 2022 International Conference on Multimedia Retrieval, 2022, pp. 615\u2013623.","DOI":"10.1145\/3512527.3531415"},{"key":"10.1016\/j.jvcir.2026.104788_b11","series-title":"European Conference on Computer Vision","first-page":"399","article-title":"Common sense reasoning for deepfake detection","author":"Zhang","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104788_b12","doi-asserted-by":"crossref","unstructured":"H. Zhao, W. Zhou, D. Chen, T. Wei, W. Zhang, N. Yu, Multi-attentional deepfake detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2185\u20132194.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"10.1016\/j.jvcir.2026.104788_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104263","article-title":"DeepFake detection method based on multi-scale interactive dual-stream network","volume":"104","author":"Cheng","year":"2024","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2026.104788_b14","series-title":"Chinese Conference on Pattern Recognition and Computer Vision","first-page":"309","article-title":"Deepfake detection via fine-grained classification and global-local information fusion","author":"Li","year":"2023"},{"key":"10.1016\/j.jvcir.2026.104788_b15","doi-asserted-by":"crossref","unstructured":"S. Dong, J. Wang, R. Ji, J. Liang, H. Fan, Z. Ge, Implicit identity leakage: The stumbling block to improving deepfake detection generalization, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 3994\u20134004.","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"10.1016\/j.jvcir.2026.104788_b16","series-title":"Data-independent operator: A training-free artifact representation extractor for generalizable deepfake detection","author":"Tan","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104788_b17","series-title":"A single simple patch is all you need for ai-generated image detection","author":"Chen","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104788_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.127360","article-title":"GenSumNet: A genre-specific and context-aware video summarization framework with adaptive thresholding and hybrid temporal modeling","volume":"279","author":"Gupta","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.jvcir.2026.104788_b19","article-title":"Large scale adversarial representation learning","volume":"32","author":"Donahue","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jvcir.2026.104788_b20","first-page":"8780","article-title":"Diffusion models beat gans on image synthesis","volume":"34","author":"Dhariwal","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jvcir.2026.104788_b21","doi-asserted-by":"crossref","unstructured":"S. Gu, D. Chen, J. Bao, F. Wen, B. Zhang, D. Chen, L. Yuan, B. Guo, Vector quantized diffusion model for text-to-image synthesis, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 10696\u201310706.","DOI":"10.1109\/CVPR52688.2022.01043"},{"key":"10.1016\/j.jvcir.2026.104788_b22","series-title":"Glide: Towards photorealistic image generation and editing with text-guided diffusion models","author":"Nichol","year":"2021"},{"key":"10.1016\/j.jvcir.2026.104788_b23","doi-asserted-by":"crossref","unstructured":"R. Rombach, A. Blattmann, D. Lorenz, P. Esser, B. Ommer, High-resolution image synthesis with latent diffusion models, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 10684\u201310695.","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"10.1016\/j.jvcir.2026.104788_b24","series-title":"Wukong-huahua is a diffusion-based model that perfoms text-to-image task in chinese","author":"JeffDing","year":"2023"},{"key":"10.1016\/j.jvcir.2026.104788_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108792","article-title":"Learning attention-guided pyramidal features for few-shot fine-grained recognition","volume":"130","author":"Tang","year":"2022","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.jvcir.2026.104788_b26","series-title":"Journal of Physics: Conference Series","article-title":"Object detection using deep learning: A review","volume":"vol. 1854","author":"Anushka","year":"2021"},{"key":"10.1016\/j.jvcir.2026.104788_b27","series-title":"deepfakes\/faceswap","author":"deepfakes","year":"2024"},{"issue":"11","key":"10.1016\/j.jvcir.2026.104788_b28","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"key":"10.1016\/j.jvcir.2026.104788_b29","doi-asserted-by":"crossref","unstructured":"Y. Nirkin, Y. Keller, T. Hassner, Fsgan: Subject agnostic face swapping and reenactment, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2019, pp. 7184\u20137193.","DOI":"10.1109\/ICCV.2019.00728"},{"key":"10.1016\/j.jvcir.2026.104788_b30","series-title":"2017 IEEE International Conference on Image Processing","first-page":"2089","article-title":"Face aging with conditional generative adversarial networks","author":"Antipov","year":"2017"},{"key":"10.1016\/j.jvcir.2026.104788_b31","series-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014"},{"key":"10.1016\/j.jvcir.2026.104788_b32","doi-asserted-by":"crossref","unstructured":"R. Huang, S. Zhang, T. Li, R. He, Beyond face rotation: Global and local perception gan for photorealistic and identity preserving frontal view synthesis, in: Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 2439\u20132448.","DOI":"10.1109\/ICCV.2017.267"},{"key":"10.1016\/j.jvcir.2026.104788_b33","series-title":"International Conference on Machine Learning","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","author":"Sohl-Dickstein","year":"2015"},{"key":"10.1016\/j.jvcir.2026.104788_b34","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3520719","article-title":"A customizable face generation method based on stable diffusion model","author":"Xiang","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.jvcir.2026.104788_b35","article-title":"Sgdm: An adaptive style-guided diffusion model for personalized text to image generation","author":"Xu","year":"2024","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.jvcir.2026.104788_b36","first-page":"1","article-title":"Blind image quality assessment: Exploring content fidelity perceptibility via quality adversarial learning","author":"Zhou","year":"2025","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.jvcir.2026.104788_b37","doi-asserted-by":"crossref","unstructured":"W. Shen, M. Zhou, Y. Chen, X. Wei, Y. Feng, H. Pu, W. Jia, Image Quality Assessment: Investigating Causal Perceptual Effects with Abductive Counterfactual Inference, in: Proceedings of the Computer Vision and Pattern Recognition Conference, 2025, pp. 17990\u201317999.","DOI":"10.1109\/CVPR52734.2025.01676"},{"key":"10.1016\/j.jvcir.2026.104788_b38","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2025.3586106","article-title":"No-reference image quality assessment: Exploring intrinsic distortion characteristics via generative noise estimation with mamba","author":"Lan","year":"2025","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104788_b39","article-title":"Image quality assessment: Exploring joint degradation effect of deep network features via kernel representation similarity analysis","author":"Liao","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jvcir.2026.104788_b40","article-title":"Cross-attention multi-scale state space model for remaining useful life prediction of aircraft engines","volume":"69","author":"Zhang","year":"2026","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.jvcir.2026.104788_b41","series-title":"FusAD: Time-frequency fusion with adaptive denoising for general time series analysis","author":"Zhang","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104788_b42","series-title":"FAIM: Frequency-aware interactive mamba for time series classification","author":"Zhang","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104788_b43","doi-asserted-by":"crossref","unstructured":"C. Tan, Y. Zhao, S. Wei, G. Gu, P. Liu, Y. Wei, Frequency-aware deepfake detection: Improving generalizability through frequency space domain learning, in: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 38, 2024, pp. 5052\u20135060.","DOI":"10.1609\/aaai.v38i5.28310"},{"key":"10.1016\/j.jvcir.2026.104788_b44","series-title":"Deepfake detection without deepfakes: Generalization via synthetic frequency patterns injection","author":"Coccomini","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104788_b45","series-title":"European Conference on Computer Vision","first-page":"86","article-title":"Thinking in frequency: Face forgery detection by mining frequency-aware clues","author":"Qian","year":"2020"},{"issue":"3","key":"10.1016\/j.jvcir.2026.104788_b46","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.jvcir.2026.104788_b47","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/TBC.2022.3215249","article-title":"An end-to-end blind image quality assessment method using a recurrent network and self-attention","volume":"69","author":"Zhou","year":"2022","journal-title":"IEEE Trans. Broadcast."},{"issue":"3","key":"10.1016\/j.jvcir.2026.104788_b48","doi-asserted-by":"crossref","first-page":"1958","DOI":"10.1109\/TPAMI.2024.3511621","article-title":"Divide-and-conquer: Confluent triple-flow network for RGB-t salient object detection","volume":"47","author":"Tang","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jvcir.2026.104788_b49","doi-asserted-by":"crossref","unstructured":"H. Tang, J. Liu, S. Yan, R. Yan, Z. Li, J. Tang, M3net: multi-view encoding, matching, and fusion for few-shot fine-grained action recognition, in: Proceedings of the 31st ACM International Conference on Multimedia, 2023, pp. 1719\u20131728.","DOI":"10.1145\/3581783.3612221"},{"key":"10.1016\/j.jvcir.2026.104788_b50","first-page":"77771","article-title":"Genimage: A million-scale benchmark for detecting ai-generated image","volume":"36","author":"Zhu","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jvcir.2026.104788_b51","series-title":"A large-scale universal evaluation benchmark for face forgery detection","author":"Bei","year":"2024"},{"key":"10.1016\/j.jvcir.2026.104788_b52","doi-asserted-by":"crossref","unstructured":"Y. Li, X. Yang, P. Sun, H. Qi, S. Lyu, Celeb-df: A large-scale challenging dataset for deepfake forensics, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 3207\u20133216.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"10.1016\/j.jvcir.2026.104788_b53","doi-asserted-by":"crossref","unstructured":"Y. He, B. Gan, S. Chen, Y. Zhou, G. Yin, L. Song, L. Sheng, J. Shao, Z. Liu, Forgerynet: A versatile benchmark for comprehensive forgery analysis, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 4360\u20134369.","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"10.1016\/j.jvcir.2026.104788_b54","series-title":"Openjourney","author":"PromptHero","year":"2023"},{"key":"10.1016\/j.jvcir.2026.104788_b55","series-title":"stability.ai","author":"STABILITY AI LTD","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104788_b56","series-title":"Wenxin yige: AI art and creative platform","author":"Baidu","year":"2025"},{"key":"10.1016\/j.jvcir.2026.104788_b57","doi-asserted-by":"crossref","unstructured":"M. Tao, H. Tang, F. Wu, X.-Y. Jing, B.-K. Bao, C. Xu, Df-gan: A simple and effective baseline for text-to-image synthesis, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 16515\u201316525.","DOI":"10.1109\/CVPR52688.2022.01602"},{"key":"10.1016\/j.jvcir.2026.104788_b58","doi-asserted-by":"crossref","unstructured":"K. He, X. Zhang, S. Ren, J. Sun, Deep residual learning for image recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"10.1016\/j.jvcir.2026.104788_b59","doi-asserted-by":"crossref","unstructured":"R.R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, D. Batra, Grad-cam: Visual explanations from deep networks via gradient-based localization, in: Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 618\u2013626.","DOI":"10.1109\/ICCV.2017.74"},{"key":"10.1016\/j.jvcir.2026.104788_b60","series-title":"2019 IEEE International Workshop on Information Forensics and Security","first-page":"1","article-title":"Detecting and simulating artifacts in gan fake images","author":"Zhang","year":"2019"},{"key":"10.1016\/j.jvcir.2026.104788_b61","doi-asserted-by":"crossref","unstructured":"S.-Y. Wang, O. Wang, R. Zhang, A. Owens, A.A. Efros, CNN-generated images are surprisingly easy to spot... for now, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8695\u20138704.","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"10.1016\/j.jvcir.2026.104788_b62","doi-asserted-by":"crossref","unstructured":"Z. Liu, X. Qi, P.H. Torr, Global texture enhancement for fake face detection in the wild, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8060\u20138069.","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"10.1016\/j.jvcir.2026.104788_b63","series-title":"International Conference on Machine Learning","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","author":"Touvron","year":"2021"},{"key":"10.1016\/j.jvcir.2026.104788_b64","doi-asserted-by":"crossref","unstructured":"Z. Liu, Y. Lin, Y. Cao, H. Hu, Y. Wei, Z. Zhang, S. Lin, B. Guo, Swin transformer: Hierarchical vision transformer using shifted windows, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 10012\u201310022.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"10.1016\/j.jvcir.2026.104788_b65","doi-asserted-by":"crossref","unstructured":"Z. Wang, J. Bao, W. Zhou, W. Wang, H. Hu, H. Chen, H. Li, Dire for diffusion-generated image detection, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023, pp. 22445\u201322455.","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"10.1016\/j.jvcir.2026.104788_b66","doi-asserted-by":"crossref","unstructured":"U. Ojha, Y. Li, Y.J. Lee, Towards universal fake image detectors that generalize across generative models, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 24480\u201324489.","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"10.1016\/j.jvcir.2026.104788_b67","series-title":"Gendet: Towards good generalizations for ai-generated image detection","author":"Zhu","year":"2023"},{"key":"10.1016\/j.jvcir.2026.104788_b68","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2024.104078","article-title":"Artifact feature purification for cross-domain detection of AI-generated images","volume":"247","author":"Meng","year":"2024","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.jvcir.2026.104788_b69","doi-asserted-by":"crossref","unstructured":"Y. Luo, J. Du, K. Yan, S. Ding, LaRE2: Latent reconstruction error based method for diffusion-generated image detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024, pp. 17006\u201317015.","DOI":"10.1109\/CVPR52733.2024.01609"},{"key":"10.1016\/j.jvcir.2026.104788_b70","doi-asserted-by":"crossref","DOI":"10.1109\/OJCS.2025.3575507","article-title":"DiffCoR: Exposing AI-generated image by using stable diffusion model based on consistent representation learning","author":"Tran","year":"2025","journal-title":"IEEE Open J. Comput. Soc."},{"key":"10.1016\/j.jvcir.2026.104788_b71","doi-asserted-by":"crossref","unstructured":"C. Tan, Y. Zhao, S. Wei, G. Gu, P. Liu, Y. Wei, Rethinking the up-sampling operations in cnn-based generative network for generalizable deepfake detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024, pp. 28130\u201328139.","DOI":"10.1109\/CVPR52733.2024.02657"}],"container-title":["Journal of Visual Communication and Image Representation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000830?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000830?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T09:07:56Z","timestamp":1776157676000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320326000830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":71,"alternative-id":["S1047320326000830"],"URL":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104788","relation":{},"ISSN":["1047-3203"],"issn-type":[{"value":"1047-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MLHFA: Multi-local high-frequency attention and feature aggregation for generalizable deepfake detection","name":"articletitle","label":"Article Title"},{"value":"Journal of Visual Communication and Image Representation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104788","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104788"}}