{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:16:42Z","timestamp":1775913402507,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543873.3587321","type":"proceedings-article","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T11:36:14Z","timestamp":1682681774000},"page":"94-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Copyright Protection and Accountability of Generative AI: Attack, Watermarking and Attribution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5849-3489","authenticated-orcid":false,"given":"Haonan","family":"Zhong","sequence":"first","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8428-884X","authenticated-orcid":false,"given":"Jiamin","family":"Chang","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9526-8567","authenticated-orcid":false,"given":"Ziyue","family":"Yang","sequence":"additional","affiliation":[{"name":"Australian National University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0626-3576","authenticated-orcid":false,"given":"Tingmin","family":"Wu","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3774","authenticated-orcid":false,"given":"Pathum Chamikara","family":"Mahawaga Arachchige","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0277-104X","authenticated-orcid":false,"given":"Chehara","family":"Pathmabandu","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5411-5039","authenticated-orcid":false,"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Jialuo Chen Jingyi Wang Tinglan Peng Youcheng Sun Peng Cheng Shouling Ji Xingjun Ma Bo Li and Dawn Song. 2022. Copy Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP.","DOI":"10.1109\/SP46214.2022.9833747"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Yunjey Choi Minje Choi Munyoung Kim Jung-Woo Ha Sunghun Kim and Jaegul Choo. 2018. StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation. CVPR.","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Yunjey Choi Youngjung Uh Jaejun Yoo and Jung-Woo Ha. 2020. StarGAN v2: Diverse Image Synthesis for Multiple Domains. CVPR.","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Chengdong Dong Ajay Kumar and Eryun Liu. 2022. Think Twice Before Detecting GAN-generated Fake Images from their Spectral Domain Imprints. CVPR.","DOI":"10.1109\/CVPR52688.2022.00771"},{"key":"e_1_3_2_1_5_1","volume-title":"Supervised gan watermarking for intellectual property protection","author":"Fei Jianwei","unstructured":"Jianwei Fei, Zhihua Xia, Benedetta Tondi, and Mauro Barni. 2022. Supervised gan watermarking for intellectual property protection. IEEE WIFS."},{"key":"e_1_3_2_1_6_1","unstructured":"Joel Frank Thorsten Eisenhofer Lea Sch\u00f6nherr Asja Fischer Dorothea Kolossa and Thorsten Holz. 2020. Leveraging frequency analysis for deep fake image recognition. ICML."},{"key":"e_1_3_2_1_7_1","unstructured":"Martin Heusel Hubert Ramsauer Thomas Unterthiner Bernhard Nessler and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. NeurIPS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Hao Huang Yongtao Wang Zhaoyu Chen Yuze Zhang Yuheng Li Zhi Tang Wei Chu Jingdong Chen Weisi Lin and Kai-Kuang Ma. 2022. CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes. AAAI.","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"e_1_3_2_1_9_1","unstructured":"Tero Karras Miika Aittala Samuli Laine Erik H\u00e4rk\u00f6nen Janne Hellsten Jaakko Lehtinen and Timo Aila. 2021. Alias-Free Generative Adversarial Networks. NeurIPS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Tero Karras Samuli Laine Miika Aittala Janne Hellsten Jaakko Lehtinen and Timo Aila. 2020. Analyzing and Improving the Image Quality of StyleGAN. CVPR.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_1_11_1","unstructured":"Cheng-Han Lee Ziwei Liu Lingyun Wu and Ping Luo. 2020. MaskGAN: Towards Diverse and Interactive Facial Image Manipulation. CVPR."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ziwei Liu Ping Luo Xiaogang Wang and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. ICCV.","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_13_1","unstructured":"Ding\u00a0Sheng Ong Chee\u00a0Seng Chan Kam\u00a0Woh Ng Lixin Fan and Qiang Yang. 2021. Protecting intellectual property of generative adversarial networks from ambiguity attacks. CVPR."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Taesung Park Alexei\u00a0A. Efros Richard Zhang and Jun-Yan Zhu. 2020. Contrastive Learning for Unpaired Image-to-Image Translation. ECCV.","DOI":"10.1007\/978-3-030-58545-7_19"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Nataniel Ruiz Sarah\u00a0Adel Bargal and Stan Sclaroff. 2020. Disrupting deepfakes: Adversarial attacks against conditional image translation networks and facial manipulation systems. CVPR.","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"e_1_3_2_1_16_1","volume-title":"AttentionGAN: Unpaired Image-to-Image Translation using Attention-Guided Generative Adversarial Networks","author":"Tang Hao","year":"2021","unstructured":"Hao Tang, Hong Liu, Dan Xu, Philip\u00a0HS Torr, and Nicu Sebe. 2021. AttentionGAN: Unpaired Image-to-Image Translation using Attention-Guided Generative Adversarial Networks. IEEE TNNLS (2021)."},{"key":"e_1_3_2_1_17_1","unstructured":"Zhisheng Xiao Karsten Kreis and Arash Vahdat. 2022. Tackling the Generative Learning Trilemma with Denoising Diffusion GANs. ICLR."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Tianyun Yang Ziyao Huang Juan Cao Lei Li and Xirong Li. 2022. Deepfake Network Architecture Attribution. AAAI.","DOI":"10.1609\/aaai.v36i4.20391"},{"key":"e_1_3_2_1_19_1","unstructured":"Ning Yu Vladislav Skripniuk Sahar Abdelnabi and Mario Fritz. 2021. Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. ICCV."},{"key":"e_1_3_2_1_20_1","volume-title":"Styleswin: Transformer-based gan for high-resolution image generation. CVPR.","author":"Zhang Bowen","year":"2022","unstructured":"Bowen Zhang, Shuyang Gu, Bo Zhang, Jianmin Bao, Dong Chen, Fang Wen, Yong Wang, and Baining Guo. 2022. Styleswin: Transformer-based gan for high-resolution image generation. CVPR."},{"key":"e_1_3_2_1_21_1","unstructured":"Jun-Yan Zhu Taesung Park Phillip Isola and Alexei\u00a0A. Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. ICCV."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543873.3587321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:29:31Z","timestamp":1755818971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":21,"alternative-id":["10.1145\/3543873.3587321","10.1145\/3543873"],"URL":"https:\/\/doi.org\/10.1145\/3543873.3587321","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}