{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:34:36Z","timestamp":1736573676323,"version":"3.32.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/milcom61039.2024.10773642","type":"proceedings-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:47:40Z","timestamp":1733510860000},"page":"621-626","source":"Crossref","is-referenced-by-count":0,"title":["Disinformation at Scale: Detecting AI-Human Composite Images via Convolution Ensembles"],"prefix":"10.1109","author":[{"given":"Yungjun","family":"Yoo","sequence":"first","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"David","family":"Na","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Samuel","family":"Nathanson","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620878"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780190931407.001.0001","volume-title":"Computational Propaganda.","author":"Wooley","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.2006.00380.x"},{"key":"ref4","article-title":"Do GANs leave artificial fingerprints?","volume-title":"CoRR","author":"Marra","year":"2018"},{"key":"ref5","article-title":"Attributing Fake Images to GANs: An-alyzing Fingerprints in Generated Images","volume-title":"CoRR","author":"Yu","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icassp49357.2023.10095167"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icme51207.2021.9428429"},{"volume-title":"CS231n: Deep Learning for Computer Vision","year":"2023","author":"Li","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2019.00-44"},{"author":"Corvey","key":"ref10","article-title":"Media Forensics"},{"author":"Corvey","key":"ref11","article-title":"Semantic Forensics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107614"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24359"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"ref16","first-page":"1","article-title":"A. What is Multimodality?","volume-title":"Proceedings of the 1st Workshop on Multimodal Semantic Representations (MMSR)","author":"Parcalabescu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01469"},{"article-title":"HuggingGPT: Solving AI Tasks with ChatGPT and its Friends in HuggingFace","year":"2023","author":"Shen","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10602-1_48","article-title":"Microsoft COCO: Common Objects in Context","volume-title":"CoRR","author":"Lin","year":"2014"},{"key":"ref20","article-title":"Openjourney v4"},{"key":"ref21","article-title":"Stable Diffusion 2.1"},{"key":"ref22","article-title":"Black-Box Watermarking for Generative Adversarial Networks","volume-title":"CoRR","author":"Skripniuk","year":"2020"},{"article-title":"Generalizable Synthetic Image Detection via Language-guided Contrastive Learning","year":"2023","author":"Wu","key":"ref23"},{"author":"Edwards","key":"ref24","article-title":"Fake Pentagon \u201dexplosion\" photo sows confusion on Twitter"}],"event":{"name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2024,10,28]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,11,1]]}},"container-title":["MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10773620\/10773624\/10773642.pdf?arnumber=10773642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:00:47Z","timestamp":1736539247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10773642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/milcom61039.2024.10773642","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}