{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:26Z","timestamp":1775912966151,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U19B2022"],"award-info":[{"award-number":["U19B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61772349"],"award-info":[{"award-number":["61772349"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61872244"],"award-info":[{"award-number":["61872244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62072313"],"award-info":[{"award-number":["62072313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61806131"],"award-info":[{"award-number":["61806131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61802262"],"award-info":[{"award-number":["61802262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2019B151502001"],"award-info":[{"award-number":["2019B151502001"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017622","name":"Shenzhen Research and Development Program","doi-asserted-by":"publisher","award":["JCYJ20200109105008228"],"award-info":[{"award-number":["JCYJ20200109105008228"]}],"id":[{"id":"10.13039\/501100017622","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017622","name":"Shenzhen Research and Development Program","doi-asserted-by":"publisher","award":["20200813110043002"],"award-info":[{"award-number":["20200813110043002"]}],"id":[{"id":"10.13039\/501100017622","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba Group through Alibaba Innovative Research (AIR) Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3152362","type":"journal-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T20:28:40Z","timestamp":1645043320000},"page":"819-834","source":"Crossref","is-referenced-by-count":96,"title":["Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization"],"prefix":"10.1109","volume":"17","author":[{"given":"Long","family":"Zhuo","sequence":"first","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-3691","authenticated-orcid":false,"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2613-5451","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2018.8639420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1128\/mbio.00809-16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00977"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2423261"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.05.015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00116"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.532"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2895466"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070444"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946978"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref19","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00473"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982705"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2904413"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00326"},{"key":"ref24","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"ref28","first-page":"5998","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Vaswani"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045336"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00060"},{"key":"ref31","article-title":"YOLOv4: Optimal speed and accuracy of object detection","author":"Bochkovskiy","year":"2020","journal-title":"arXiv:2004.10934"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref35","article-title":"A data set of authentic and spliced image blocks","author":"Ng","year":"2004"},{"issue":"2","key":"ref36","first-page":"2","article-title":"A picture\u2019s worth","volume":"6","author":"Krawetz","year":"2007","journal-title":"Hacker Factor Solutions"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.02.001"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09715146.pdf?arnumber=9715146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:00:46Z","timestamp":1705532446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9715146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3152362","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}