{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:09:31Z","timestamp":1729613371334,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icme46284.2020.9102910","type":"proceedings-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T17:40:07Z","timestamp":1591724407000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Sed-Net: Detecting Multi-Type Edits Of Images"],"prefix":"10.1109","author":[{"given":"Hongwei","family":"Xue","sequence":"first","affiliation":[]},{"given":"Haomiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Houqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiebo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Image processing operations identification via convolutional neural network","author":"chen","year":"2017","journal-title":"arXiv preprint arXiv 1709 02505"},{"key":"ref11","article-title":"Universal image manipulation detection using deep siamese convolutional neural network","author":"mazumdar","year":"2018","journal-title":"arXiv preprint arXiv 1808 06241"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797926_0003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899663"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2766959"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10350","article-title":"Siamese recurrent architectures for learning sentence similarity","author":"mueller","year":"2016","journal-title":"AAAI Conference on Artificial Intelligence"},{"key":"ref17","article-title":"Siamese neural networks for one-shot image recognition","volume":"2","author":"koch","year":"2015","journal-title":"ICML Deep Learning Workshop"},{"key":"ref18","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"ref19","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"arXiv preprint arXiv 1502 03167"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407698"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2097593"},{"key":"ref6","first-page":"11640","article-title":"Image manipulation detection using convolutional neural network","volume":"12","author":"kim","year":"2017","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"ref8","first-page":"1","article-title":"Image manipulation detection with binary similarity measures","author":"bayram","year":"2005","journal-title":"European Signal Processing Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5573\/ieie.2014.51.3.075"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45113-7_41"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00130-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14801\/kitr.2014.12.11.119"},{"key":"ref20","article-title":"Under-standing the disharmony between dropout and batch normalization by variance shift","author":"li","year":"2018","journal-title":"arXiv preprint arXiv 1801 05078"},{"key":"ref22","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Symposium on Operating Systems Design and Implementation"},{"key":"ref21","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"}],"event":{"name":"2020 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2020,7,6]]},"location":"London, United Kingdom","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9099125\/9102711\/09102910.pdf?arnumber=9102910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T08:56:16Z","timestamp":1666860976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9102910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icme46284.2020.9102910","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}