{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T07:30:53Z","timestamp":1772695853543,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,10]],"date-time":"2026-11-10T00:00:00Z","timestamp":1794268800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2404039"],"award-info":[{"award-number":["2404039"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3761450","type":"proceedings-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:55:33Z","timestamp":1762559733000},"page":"6853-6856","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Uncertain Boundaries: A Tutorial on Copyright Challenges and Cross-Disciplinary Solutions for Generative AI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0816-5630","authenticated-orcid":false,"given":"Zhipeng","family":"Yin","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6091-6609","authenticated-orcid":false,"given":"Zichong","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2676-3731","authenticated-orcid":false,"given":"Avash","family":"Palikhe","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3024-5415","authenticated-orcid":false,"given":"Wenbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACM SIGKDD Explorations Newsletter","author":"Archer Amon","year":"2025","unstructured":"Archer Amon et al. ''Uncertain boundaries: Multidisciplinary approaches to copyright issues in generative ai''. In: ACM SIGKDD Explorations Newsletter (2025)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1018-1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21276\/ijircst.2021.9.3.7"},{"key":"e_1_3_2_1_4_1","volume-title":"CopyBench: Measuring Literal and Non-Literal Reproduction of Copyright-Protected Text in Language Model Generation''. In","author":"Tong Chen","year":"2024","unstructured":"Tong Chen et al. ''CopyBench: Measuring Literal and Non-Literal Reproduction of Copyright-Protected Text in Language Model Generation''. In: (2024)."},{"key":"e_1_3_2_1_5_1","volume-title":"Policy and Society","author":"Chesterman Simon","year":"2024","unstructured":"Simon Chesterman. ''Good models borrow, great models steal: intellectual property rights and generative AI''. In: Policy and Society (2024), puae006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703363"},{"key":"e_1_3_2_1_7_1","volume-title":"How to Protect Copyright Data in Optimization of Large Language Models?","author":"Chu Timothy","year":"2023","unstructured":"Timothy Chu, Zhao Song, and Chiwun Yang. How to Protect Copyright Data in Optimization of Large Language Models? 2023. arXiv: 2308.12247 [cs.LG]."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings 2023 Network and Distributed System Security Symposium. NDSS 2023. Internet Society","author":"Tian","year":"2023","unstructured":"Tian Dong et al. ''RAI2: Responsible Identity Audit Governing the Artificial Intelligence''. In: Proceedings 2023 Network and Distributed System Security Symposium. NDSS 2023. Internet Society, 2023."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-023-00140-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948086"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105925"},{"key":"e_1_3_2_1_13_1","volume-title":"RU-AI: A Large Multimodal Dataset for Machine Generated Content Detection","author":"Liting Huang","year":"2024","unstructured":"Liting Huang et al. RU-AI: A Large Multimodal Dataset for Machine Generated Content Detection. 2024. arXiv: 2406.04906 [cs.CV]."},{"key":"e_1_3_2_1_14_1","first-page":"616","volume-title":"2020 International Conference on Culture-oriented Science & Technology (ICCST).","author":"Tao","year":"2020","unstructured":"Tao Jiang et al. ''Research on the Application of Blockchain in Copyright Protection''. In: 2020 International Conference on Culture-oriented Science & Technology (ICCST). 2020, pp. 616--621."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3614407.3643696"},{"key":"e_1_3_2_1_16_1","volume-title":"Deduplicating Training Data Makes Language Models Better","author":"Katherine Lee","year":"2022","unstructured":"Katherine Lee et al. Deduplicating Training Data Makes Language Models Better. 2022. arXiv: 2107.06499 [cs.CL]."},{"key":"e_1_3_2_1_17_1","volume-title":"Protect-Your-IP: Scalable Source-Tracing and Attribution against Personalized Generation","author":"Runyi Li","year":"2024","unstructured":"Runyi Li et al. Protect-Your-IP: Scalable Source-Tracing and Attribution against Personalized Generation. 2024. arXiv: 2405.16596 [cs.CV]."},{"key":"e_1_3_2_1_18_1","volume-title":"Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples''. In","author":"Chumeng Liang","year":"2023","unstructured":"Chumeng Liang et al. ''Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples''. In: (2023)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/17579961.2024.2392928"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers9020026"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_2_1_22_1","volume-title":"Midjourney Terms of Service","year":"2023","unstructured":"Midjourney. Midjourney Terms of Service. Feb. 2023. url: https:\/\/docs.midjourney.com\/docs\/terms-of-service."},{"key":"e_1_3_2_1_23_1","volume-title":"Copyright Office Fair Use Index","author":"Copyright Office U.S.","year":"2022","unstructured":"U.S. Copyright Office. U.S. Copyright Office Fair Use Index. Aug. 2022."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4679299"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"},{"key":"e_1_3_2_1_26_1","article-title":"Balancing Fair Use through Standardization and Transparency","author":"Maffioli Daniel Rodriguez","year":"2023","unstructured":"Daniel Rodriguez Maffioli. ''Copyright in Generative AI training: Balancing Fair Use through Standardization and Transparency''. In: SSRN Electronic Journal (2023).","journal-title":"SSRN Electronic Journal ("},{"key":"e_1_3_2_1_27_1","first-page":"4531912","article-title":"Implications of the Use of Generative AI","author":"Sandiumenge Isaac","year":"2023","unstructured":"Isaac Sandiumenge. ''Copyright Implications of the Use of Generative AI''. In: Available at SSRN 4531912 (2023).","journal-title":"Available at SSRN"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12178724"},{"key":"e_1_3_2_1_29_1","volume-title":"1st Conference on Lifelong Learning Agents (CoLLAs 2022","author":"Sarfraz Fahad","year":"2022","unstructured":"Fahad Sarfraz, Elahe Arani, and Bahram Zonooz. ''SYNERgy between SYNaptic consolidation and Experience Replay for general continual learning''. In: 1st Conference on Lifelong Learning Agents (CoLLAs 2022). 2022. arXiv: 2206.04016."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"Shawn","year":"2023","unstructured":"Shawn Shan et al. ''Glaze: protecting artists from style mimicry by text-to-image models''. In: Proceedings of the 32nd USENIX Conference on Security Symposium. Anaheim, CA, USA: USENIX Association, 2023."},{"key":"e_1_3_2_1_31_1","volume-title":"UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI","author":"Ilia Shumailov","year":"2024","unstructured":"Ilia Shumailov et al. UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI. 2024."},{"key":"e_1_3_2_1_32_1","volume-title":"Microsoft for infringing copyrighted works.","author":"Stempel Jonathan","year":"2023","unstructured":"Jonathan Stempel. NY Times sues openai, Microsoft for infringing copyrighted works. Dec. 2023."},{"key":"e_1_3_2_1_33_1","volume-title":"to Create the Joker. It Generated a Copyrighted Image.'' In: The New York Times (Jan","author":"Thompson Stuart A.","year":"2024","unstructured":"Stuart A. Thompson. ''We Asked A.I. to Create the Joker. It Generated a Copyrighted Image.'' In: The New York Times (Jan. 2024)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/jwip.12301"},{"key":"e_1_3_2_1_35_1","volume-title":"Copyright Office","author":"Copyright Office U.S.","year":"2025","unstructured":"U.S. Copyright Office. Copyright and Artificial Intelligence, Part 2: Copyrightability. Report Part 2. Accessed: 2025-08--13. U.S. Copyright Office, Jan. 2025. url: https:\/\/www.copyright.gov\/ai\/Copyright-and-Artificial-Intelligence- Part-2-Copyrightability-Report.pdf."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the IEEE\/ACM 3rd International Conference on AI Engineering - Software Engineering for AI.","volume":"75","author":"Dawen","year":"2024","unstructured":"Dawen Zhang et al. ''Privacy and Copyright Protection in Generative AI: A Lifecycle Perspective''. In: Proceedings of the IEEE\/ACM 3rd International Conference on AI Engineering - Software Engineering for AI. Vol. 75. ACM, 2024."},{"key":"e_1_3_2_1_37_1","first-page":"1","volume-title":"Security and Communication Networks 2021 (Dec.","author":"Jingjing Zheng","year":"2021","unstructured":"Jingjing Zheng et al. ''A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking''. In: Security and Communication Networks 2021 (Dec. 2021). Ed. by Honghao Gao, pp. 1--16."}],"event":{"name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","location":"Seoul Republic of Korea","acronym":"CIKM '25","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3746252.3761450","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T23:59:48Z","timestamp":1765497588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3761450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":37,"alternative-id":["10.1145\/3746252.3761450","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3761450","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}