{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:21:18Z","timestamp":1767705678282,"version":"3.32.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/milcom61039.2024.10773838","type":"proceedings-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:47:40Z","timestamp":1733510860000},"page":"615-620","source":"Crossref","is-referenced-by-count":4,"title":["A Step Towards Modern Disinformation Detection: Novel Methods for Detecting LLM-Generated Text"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Nathanson","sequence":"first","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Yungjun","family":"Yoo","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"David","family":"Na","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[{"name":"Johns Hopkins University,Whiting School of Engineering,Baltimore,Maryland,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620878"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780190931407.001.0001","volume-title":"Computational Propaganda","author":"Wooley","year":"2018"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.51593\/2021CA003","volume-title":"Truth, Lies, and Automation: How Language Models Could Change Disinformation","author":"Buchanan","year":"2021"},{"article-title":"Detecting Fake Content with Relative Entropy Scoring","volume-title":"Proceedings of PAN","author":"Lavergne","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-3019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iemtronics52119.2021.9422605"},{"key":"ref7","article-title":"Twitter bot detection using machine learning algorithms","author":"Battur","year":"2018","journal-title":"International Journal of Science and Research (IJSR)"},{"article-title":"How Close is ChatGPT to Human Experts? Comparison Corpus, Evaluation, and Detection","year":"2023","author":"Guo","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sieds58326.2023.10137767"},{"article-title":"Release Strategies and the Social Impacts of Language Models","year":"2019","author":"Solaiman","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-demo.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599921"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0251415"},{"article-title":"DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature","year":"2023","author":"Mitchell","key":"ref15"},{"key":"ref16","article-title":"Deep Learning Based Text Classification: A Comprehensive Review","volume-title":"CoRR","volume":"abs\/2004.03705","author":"Minaee","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW51313.2020.00071"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2019.00-44"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i10.7230"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107614"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482019"},{"article-title":"Twitter News","volume-title":"Onla collection of news as reported on twitter","year":"2020","key":"ref22"},{"author":"Solaiman","key":"ref23","article-title":"Release strategies and the social impacts of language models"},{"article-title":"HuggingGPT: Solving AI Tasks with ChatGPT and its Friends in HuggingFace","year":"2023","author":"Shen","key":"ref24"},{"article-title":"Twitter Topic Classification","year":"2022","author":"Antypas","key":"ref25"},{"key":"ref26","article-title":"Black-Box Watermarking for Generative Adversarial Networks","volume-title":"CoRR","volume":"abs\/2007.08457","author":"Skripniuk","year":"2020"},{"article-title":"Vicuna: An Open-Source Chatbot Impressing GPT-4 with 90 percent ChatGPT Quality","year":"2023","author":"Chiang","key":"ref27"}],"event":{"name":"MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2024,10,28]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,11,1]]}},"container-title":["MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10773620\/10773624\/10773838.pdf?arnumber=10773838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:00:26Z","timestamp":1736539226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10773838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom61039.2024.10773838","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}