{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:51:10Z","timestamp":1760986270908},"reference-count":4,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocomwkshps61880.2024.10620878","type":"proceedings-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:19:39Z","timestamp":1723569579000},"page":"1-2","source":"Crossref","is-referenced-by-count":5,"title":["Showcasing the Threat of Scalable Generative AI Disinformation through Social Media Simulation"],"prefix":"10.1109","author":[{"given":"David","family":"Na","sequence":"first","affiliation":[{"name":"Whiting School of Engineering, Johns Hopkins University,Baltimore,Maryland,USA"}]},{"given":"Samuel","family":"Nathanson","sequence":"additional","affiliation":[{"name":"Whiting School of Engineering, Johns Hopkins University,Baltimore,Maryland,USA"}]},{"given":"Yungjun","family":"Yoo","sequence":"additional","affiliation":[{"name":"Whiting School of Engineering, Johns Hopkins University,Baltimore,Maryland,USA"}]},{"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[{"name":"Whiting School of Engineering, Johns Hopkins University,Baltimore,Maryland,USA"}]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[{"name":"Whiting School of Engineering, Johns Hopkins University,Baltimore,Maryland,USA"}]}],"member":"263","reference":[{"journal-title":"Center for Security and Emerging Technology","article-title":"Truth, Lies, and Automation: How Language Models Could Change Disinformation","author":"Buchanan","key":"ref1"},{"volume-title":"The global disinformation order: 2019 global inventory of organised social media manipulation","year":"2019","author":"Samantha","key":"ref2"},{"journal-title":"GPT-4 Technical Report","year":"2023","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,20]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10620660\/10620661\/10620878.pdf?arnumber=10620878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T05:04:59Z","timestamp":1723611899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10620878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":4,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps61880.2024.10620878","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}