{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:34:18Z","timestamp":1768268058470,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002241","name":"Japan science and technology agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003382","name":"CREST","doi-asserted-by":"publisher","award":["JPMJCR21D3"],"award-info":[{"award-number":["JPMJCR21D3"]}],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan society for the promotion of science","doi-asserted-by":"publisher","award":["19H04164,18H04099"],"award-info":[{"award-number":["19H04164,18H04099"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892704","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Did You Use My GAN to Generate Fake? Post-hoc Attribution of GAN Generated Images via Latent Recovery"],"prefix":"10.1109","author":[{"given":"Syou","family":"Hirofumi","sequence":"first","affiliation":[{"name":"Univresity of Tskuba,Dept. of Computer Science,Tsukuba,Japan"}]},{"given":"Kazuto","family":"Fukuchi","sequence":"additional","affiliation":[{"name":"Univresity of Tskuba,Faculty of EIS,Tsukuba,Japan"}]},{"given":"Yohei","family":"Akimoto","sequence":"additional","affiliation":[{"name":"Univresity of Tskuba,Faculty of EIS,Tsukuba,Japan"}]},{"given":"Jun","family":"Sakuma","sequence":"additional","affiliation":[{"name":"Univresity of Tskuba \/ RIKEN AIP,Faculty of EIS,Tsukuba,Japan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref12","article-title":"Unmasking deepfakes with simple features","author":"durall","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref15","article-title":"Black-box watermarking for generative adversarial networks","author":"skripniuk","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref16","first-page":"6626","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","author":"heusel","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01153"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref19","article-title":"Lsun: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"yu","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref6","first-page":"485","article-title":"Deepsigns: an end-to-end watermarking framework for ownership protection of deep neural networks","author":"darvish rouhani","year":"0","journal-title":"Proceedings of the fourth international conference on Architectural support for programming languages and operating systems - AS"},{"key":"ref5","article-title":"Deepmarks: a digital fingerprinting framework for deep neural networks","author":"chen","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref7","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","author":"adi","year":"0","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref2","article-title":"Progressive growing of gans for improved quality, stability, and variation","author":"karras","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref1","first-page":"2672","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","location":"Padua, Italy","start":{"date-parts":[[2022,7,18]]},"end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892704.pdf?arnumber=9892704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:52:16Z","timestamp":1665780736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892704","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}