{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:08:53Z","timestamp":1767262133559,"version":"3.41.0"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62372452","62272460"],"award-info":[{"award-number":["62372452","62272460"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Open Research Project of the State Key Laboratory of Media Convergence and Communication, Communication University of China","doi-asserted-by":"publisher","award":["SKLMCC2022KF002"],"award-info":[{"award-number":["SKLMCC2022KF002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3573161","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T17:13:10Z","timestamp":1748538790000},"page":"5256-5268","source":"Crossref","is-referenced-by-count":1,"title":["Noise-Informed Diffusion-Generated Image Detection With Anomaly Attention"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7128-5002","authenticated-orcid":false,"given":"Weinan","family":"Guan","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8598-0831","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"New Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9014-7369","authenticated-orcid":false,"given":"Bo","family":"Peng","sequence":"additional","affiliation":[{"name":"New Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1019-3884","authenticated-orcid":false,"given":"Ziwen","family":"He","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-7832","authenticated-orcid":false,"given":"Jing","family":"Dong","sequence":"additional","affiliation":[{"name":"New Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3407-4318","authenticated-orcid":false,"given":"Haonan","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref2","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dhariwal"},{"article-title":"Pseudo numerical methods for diffusion models on manifolds","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Liu","key":"ref3"},{"key":"ref4","first-page":"8162","article-title":"Improved denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nichol"},{"article-title":"Denoising diffusion implicit models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song","key":"ref5"},{"key":"ref6","first-page":"16784","article-title":"GLIDE: Towards photorealistic image generation and editing with text-guided diffusion models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nichol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01043"},{"key":"ref8","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref9","article-title":"Hierarchical text-conditional image generation with CLIP latents","author":"Ramesh","year":"2022","journal-title":"arXiv:2204.06125"},{"volume-title":"Midjourney","year":"2023","key":"ref10"},{"key":"ref11","first-page":"36479","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Saharia"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00872"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"ref17","first-page":"77771","article-title":"GenImage: A million-scale benchmark for detecting AI-generated image","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00325"},{"key":"ref20","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Karras","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00686"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41682-8_27"},{"key":"ref24","article-title":"Deediff: Dynamic uncertainty-aware early exiting for accelerating diffusion model generation","author":"Tang","year":"2023","journal-title":"arXiv:2309.17074v2"},{"article-title":"Score-based generative modeling through stochastic differential equations","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song","key":"ref25"},{"key":"ref26","first-page":"26565","article-title":"Elucidating the design space of diffusion-based generative models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Karras"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00246"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00584"},{"key":"ref29","article-title":"Guiding text-to-image diffusion model towards grounded generation","author":"Li","year":"2023","journal-title":"arXiv:2301.05221"},{"volume-title":"Wukong","year":"2023","key":"ref30"},{"volume-title":"Sora: Creating Video from Text","year":"2024","key":"ref31"},{"key":"ref32","article-title":"Sora: A review on background, technology, limitations, and opportunities of large vision models","author":"Liu","year":"2024","journal-title":"arXiv:2402.17177"},{"volume-title":"Veo and Imagen 3: Announcing New Video and Image Generation Models on Vertex Ai","year":"2025","key":"ref33"},{"volume-title":"Introducing Gen-3 Alpha: A New Frontier for Video Generation","year":"2025","key":"ref34"},{"key":"ref35","article-title":"CogVideoX: Text-to-video diffusion models with an expert transformer","author":"Yang","year":"2024","journal-title":"arXiv:2408.06072"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref38","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref40","article-title":"The DeepFake detection challenge (DFDC) dataset","author":"Dolhansky","year":"2020","journal-title":"arXiv:2006.07397"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484407"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803661"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3249566"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102487"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00771"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198275"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01453"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3146781"},{"article-title":"Exposing the fake: Effective diffusion-generated images detection","volume-title":"Proc. Int. Conf. Mach. Learn. Workshop","author":"Ma","key":"ref66"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52733.2024.01609"},{"key":"ref68","article-title":"FIRE: Robust detection of diffusion-generated images via frequency-guided reconstruction error","author":"Chu","year":"2024","journal-title":"arXiv:2412.07140"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00051"},{"key":"ref70","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Ma"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01024"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref74","article-title":"Improved regularization of convolutional neural networks with cutout","author":"DeVries","year":"2017","journal-title":"arXiv:1708.04552"},{"key":"ref75","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Touvron"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428429"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58574-7_7"},{"article-title":"Large scale GAN training for high fidelity natural image synthesis","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Brock","key":"ref79"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"issue":"86","key":"ref84","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11018089.pdf?arnumber=11018089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:23:26Z","timestamp":1749183806000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11018089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3573161","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}