{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:47:59Z","timestamp":1777495679533,"version":"3.51.4"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["GXCZ-D-21070106"],"award-info":[{"award-number":["GXCZ-D-21070106"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/besc64747.2024.10780724","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:07:29Z","timestamp":1734030449000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["DDEM: Deepfake Detection Enhanced Model for Image Forgery Detection Combat Academic Misconduct"],"prefix":"10.1109","author":[{"given":"Junpeng","family":"Ding","sequence":"first","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Jianhua","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Wanfang Data Co., Ltd.,Beijing,China"}]},{"given":"Jiayi","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Xinyang","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Xiaodong","family":"Qiao","sequence":"additional","affiliation":[{"name":"Beijing Wanfang Data Co., Ltd.,Beijing,China"}]},{"given":"Haihong","family":"E","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1128\/mBio.00809-16"},{"key":"ref2","article-title":"Bioscience-scale automated detection of figure element reuse","author":"Daniel","year":"2018","journal-title":"[J] preprint bioRxiv 269415"},{"issue":"2","key":"ref3","first-page":"231","article-title":"Multidimensional analysis of retraction reasons of Chinese scholars\u2019 papers in international journals[J]","volume":"34","author":"Zihan","year":"2023","journal-title":"Chinese Journal of Scientific and Technical Periodicals"},{"issue":"5","key":"ref4","first-page":"563","article-title":"Strategies for preventing image academic misconduct in scienpngic journals[J]","volume":"32","author":"Liwei","year":"2021","journal-title":"Chi-nese Journal of Scientific and Technical Periodicals"},{"issue":"01","key":"ref5","first-page":"45","volume":"31","author":"Qing","year":"2019","journal-title":"Academic misconduct relating to images and corresponding countermeasures[J]"},{"key":"ref6","first-page":"2021","article-title":"Journals adopt AI to spot duplicated images in manuscripts-A few publishers are using automated soft-ware to catch flaws in submitted papers","volume-title":"Nature[j]","author":"Van Noorden"},{"key":"ref7","article-title":"Analysis and Correction of Inappropriate Image Duplication: The Molecular and Cellular Biology Experience[J]","volume":"20","author":"Casadevall","year":"2018","journal-title":"Cold Spring Harbor Laboratory"},{"key":"ref8","first-page":"1577","article-title":"Image forgery techniques: a review","volume-title":"Artif Intell Rev","volume":"56","author":"Kaur","year":"2023"},{"key":"ref9","article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","author":"Simonyan","year":"2014","journal-title":"Computer Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2983686"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2572683"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.02051"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924552"},{"key":"ref16","first-page":"3431","article-title":"Fully convolutional networks for semantic segmentation","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01308"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref23","first-page":"3247","article-title":"Leveraging frequency analysis for deep fake image recognition[C]","volume-title":"International conference on machine learning. PMLR","author":"Frank"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897820"},{"key":"ref26","first-page":"12105","article-title":"Learning on Gradients: Gener-alized Artifacts Representation for GAN- Generated Images Detection[C]","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Tan"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"ref28","article-title":"Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection[J]","volume-title":"arXiv preprint","author":"Zhong"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00045"},{"key":"ref30","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"arXiv preprint"},{"key":"ref31","article-title":"Diffusion Noise Feature: Accurate and Fast Generated Image Detection","author":"Zhang","year":"2023","journal-title":"CVPR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"ref33","article-title":"A review on deep learning techniques applied to semantic segmentation","author":"Garcia-Garcia","year":"2017","journal-title":"arXiv preprint"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/wacv48630.2021.00042"},{"key":"ref39","article-title":"A survey of large language models for healthcare: from data, technology, and applications to accountability and ethics","author":"He","year":"2023","journal-title":"arXiv preprint"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106744"},{"key":"ref41","article-title":"LLaMA-E: Empowering E-commerce Authoring with Object-Interleaved Instruction Following","author":"Shi","year":"2024","journal-title":"arXiv preprint"}],"event":{"name":"2024 11th International Conference on Behavioural and Social Computing (BESC)","location":"Harbin, China","start":{"date-parts":[[2024,8,16]]},"end":{"date-parts":[[2024,8,18]]}},"container-title":["2024 11th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10779601\/10780446\/10780724.pdf?arnumber=10780724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:56:08Z","timestamp":1734072968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10780724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/besc64747.2024.10780724","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}