{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:52:58Z","timestamp":1764550378353,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","funder":[{"name":"JSPS KAKENHI","award":["JP21H04907, JP24H00732"],"award-info":[{"award-number":["JP21H04907, JP24H00732"]}]},{"name":"JST CREST","award":["JPMJCR20D3 including AIP challenge program"],"award-info":[{"award-number":["JPMJCR20D3 including AIP challenge program"]}]},{"name":"JST AIP Acceleration","award":["JPMJCR24U3"],"award-info":[{"award-number":["JPMJCR24U3"]}]},{"name":"JST K Program","award":["JPMJKP24C2 Japan"],"award-info":[{"award-number":["JPMJKP24C2 Japan"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746265.3759666","type":"proceedings-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:29Z","timestamp":1759962029000},"page":"45-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["AnimeDL-2M: Million-Scale AI-Generated Anime Image Detection and Localization in Diffusion Era"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5219-1673","authenticated-orcid":false,"given":"Chenyang","family":"Zhu","sequence":"first","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan and National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1721-035X","authenticated-orcid":false,"given":"Xing","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7929-9003","authenticated-orcid":false,"given":"Yuyang","family":"Sun","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan and National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-4591","authenticated-orcid":false,"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-1860","authenticated-orcid":false,"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan and The University of Tokyo, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111914"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_1_3_1","volume-title":"Beyond the Brush: Fully-automated Crafting of Realistic Inpainted Images. In 2024 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1-6.","author":"Bertazzini Giulia","year":"2024","unstructured":"Giulia Bertazzini, Chiara Albisani, Daniele Baracchi, Dasara Shullani, and Alessandro Piva. 2024. Beyond the Brush: Fully-automated Crafting of Realistic Inpainted Images. In 2024 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1-6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01392"},{"key":"e_1_3_2_1_5_1","volume-title":"Leveraging Semantic Segmentation for Image Manipulation Detection and Localization. In 2024 IEEE 7th International Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 95-101","author":"Chen Yuwei","year":"2024","unstructured":"Yuwei Chen, Ming-Ching Chang, and Xin Li. 2024a. Leveraging Semantic Segmentation for Image Manipulation Detection and Localization. In 2024 IEEE 7th International Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 95-101."},{"key":"e_1_3_2_1_6_1","volume-title":"GIM: A Million-scale Benchmark for Generative Image Manipulation Detection and Localization. arXiv preprint arXiv:2406.16531","author":"Chen Yirui","year":"2024","unstructured":"Yirui Chen, Xudong Huang, Quan Zhang, Wei Li, Mingjian Zhu, Qiangyu Yan, Simiao Li, Hanting Chen, Hailin Hu, Jie Yang, et al., 2024b. GIM: A Million-scale Benchmark for Generative Image Manipulation Detection and Localization. arXiv preprint arXiv:2406.16531 (2024)."},{"key":"e_1_3_2_1_7_1","unstructured":"Zhe Chen Weiyun Wang Yue Cao Yangzhou Liu Zhangwei Gao Erfei Cui Jinguo Zhu Shenglong Ye Hao Tian Zhaoyang Liu et al. 2024c. Expanding performance boundaries of open-source multimodal models with model data and test-time scaling. arXiv preprint arXiv:2412.05271 (2024)."},{"key":"e_1_3_2_1_8_1","unstructured":"Civitai Community. 2025. Civitai. https:\/\/civitai.com\/ Accessed: 2025-04-11."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"e_1_3_2_1_11_1","unstructured":"DeepGHS. 2024. danbooru2024-sfw. https:\/\/huggingface.co\/datasets\/deepghs\/danbooru2024-sfw. Accessed: 2025-08-10."},{"key":"e_1_3_2_1_12_1","first-page":"422","article-title":"Casia image tampering detection evaluation database. In 2013 IEEE China summit and international conference on signal and information processing","author":"Dong Jing","year":"2013","unstructured":"Jing Dong, Wei Wang, and Tieniu Tan. 2013. Casia image tampering detection evaluation database. In 2013 IEEE China summit and international conference on signal and information processing. IEEE, 422-426.","journal-title":"IEEE"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00045"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446332"},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal of Computer Vision","author":"Guo Xiao","year":"2024","unstructured":"Xiao Guo, Xiaohong Liu, Iacopo Masi, and Xiaoming Liu. 2024a. Language-guided hierarchical fine-grained image forgery detection and localization. International Journal of Computer Vision (2024), 1-22."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00308"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 4822-4836","author":"Jeong Ha Anna Yoo","year":"2024","unstructured":"Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, and Ben Y Zhao. 2024. Organic or diffused: Can we distinguish human art from ai-generated images?. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 4822-4836."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111656"},{"key":"e_1_3_2_1_21_1","volume-title":"Rigid: A training-free and model-agnostic framework for robust ai-generated image detection. arXiv preprint arXiv:2405.20112","author":"He Zhiyuan","year":"2024","unstructured":"Zhiyuan He, Pin-Yu Chen, and Tsung-Yi Ho. 2024. Rigid: A training-free and model-agnostic framework for robust ai-generated image detection. arXiv preprint arXiv:2405.20112 (2024)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262447"},{"key":"e_1_3_2_1_23_1","volume-title":"SIDA: Social Media Image Deepfake Detection, Localization and Explanation with Large Multimodal Model. arXiv preprint arXiv:2412.04292","author":"Huang Zhenglin","year":"2024","unstructured":"Zhenglin Huang, Jinwei Hu, Xiangtai Li, Yiwei He, Xingyu Zhao, Bei Peng, Baoyuan Wu, Xiaowei Huang, and Guangliang Cheng. 2024. SIDA: Social Media Image Deepfake Detection, Localization and Explanation with Large Multimodal Model. arXiv preprint arXiv:2412.04292 (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00096"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125566"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00438"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 7482-7491","author":"Kendall Alex","year":"2018","unstructured":"Alex Kendall, Yarin Gal, and Roberto Cipolla. 2018. Multi-task learning using uncertainty to weigh losses for scene geometry and semantics. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7482-7491."},{"key":"e_1_3_2_1_28_1","volume-title":"The point where reality meets fantasy: Mixed adversarial generators for image splice detection. Advances in neural information processing systems","author":"Kniaz Vladimir V","year":"2019","unstructured":"Vladimir V Kniaz, Vladimir Knyaz, and Fabio Remondino. 2019. The point where reality meets fantasy: Mixed adversarial generators for image splice detection. Advances in neural information processing systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_29_1","volume-title":"SAFIRE: Segment Any Forged Image Region. arXiv preprint arXiv:2412.08197","author":"Kwon Myung-Joon","year":"2024","unstructured":"Myung-Joon Kwon, Wonjun Lee, Seung-Hun Nam, Minji Son, and Changick Kim. 2024. SAFIRE: Segment Any Forged Image Region. arXiv preprint arXiv:2412.08197 (2024)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01617-5"},{"key":"e_1_3_2_1_32_1","volume-title":"Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics. arXiv preprint arXiv:2408.17106","author":"Levecque Etienne","year":"2024","unstructured":"Etienne Levecque, Jan Butora, and Patrick Bas. 2024. Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics. arXiv preprint arXiv:2408.17106 (2024)."},{"key":"e_1_3_2_1_33_1","volume-title":"Noise-Assisted Prompt Learning for Image Forgery Detection and Localization. In European Conference on Computer Vision. Springer, 18-36","author":"Li Dong","year":"2024","unstructured":"Dong Li, Jiaying Zhu, Xueyang Fu, Xun Guo, Yidi Liu, Gang Yang, Jiawei Liu, and Zheng-Jun Zha. 2024c. Noise-Assisted Prompt Learning for Image Forgery Detection and Localization. In European Conference on Computer Vision. Springer, 18-36."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01190"},{"key":"e_1_3_2_1_35_1","volume-title":"European Conference on Computer Vision. Springer, 477-493","author":"Li Yuxi","year":"2024","unstructured":"Yuxi Li, Fuyuan Cheng, Wangbo Yu, Guangshuo Wang, Guibo Luo, and Yuesheng Zhu. 2024a. AdaIFL: Adaptive Image Forgery Localization via a Dynamic and Importance-Aware Transformer Network. In European Conference on Computer Vision. Springer, 477-493."},{"key":"e_1_3_2_1_36_1","volume-title":"A Large-scale Interpretable Multi-modality Benchmark for Facial Image Forgery Localization. arXiv preprint arXiv:2412.19685","author":"Lian Jingchun","year":"2024","unstructured":"Jingchun Lian, Lingyu Liu, Yaxiong Wang, Yujiao Wu, Li Zhu, and Zhedong Zheng. 2024. A Large-scale Interpretable Multi-modality Benchmark for Facial Image Forgery Localization. arXiv preprint arXiv:2412.19685 (2024)."},{"key":"e_1_3_2_1_37_1","first-page":"740","volume-title":"Switzerland","author":"Lin Tsung-Yi","year":"2014","unstructured":"Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Computer vision-ECCV 2014: 13th European conference, zurich, Switzerland, September 6-12, 2014, proceedings, part v 13. Springer, 740-755."},{"key":"e_1_3_2_1_38_1","volume-title":"2024 e. Forgerygpt: Multimodal large language model for explainable image forgery detection and localization. arXiv preprint arXiv:2410.10238","author":"Liu Jiawei","year":"2024","unstructured":"Jiawei Liu, Fanrui Zhang, Jiaying Zhu, Esther Sun, Qiang Zhang, and Zheng-Jun Zha. 2024 e. Forgerygpt: Multimodal large language model for explainable image forgery detection and localization. arXiv preprint arXiv:2410.10238 (2024)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110658"},{"key":"e_1_3_2_1_40_1","volume-title":"Forgeryttt: Zero-shot image manipulation localization with test-time training. arXiv preprint arXiv:2410.04032","author":"Liu Weihuang","year":"2024","unstructured":"Weihuang Liu, Xi Shen, Chi-Man Pun, and Xiaodong Cun. 2024b. Forgeryttt: Zero-shot image manipulation localization with test-time training. arXiv preprint arXiv:2410.04032 (2024)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3424987"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3189545"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681137"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"e_1_3_2_1_45_1","volume-title":"Image Forgery Localization with State Space Models. arXiv preprint arXiv:2412.11214","author":"Lou Zijie","year":"2024","unstructured":"Zijie Lou, Gang Cao, Kun Guo, Shaowei Weng, and Lifang Yu. 2024. Image Forgery Localization with State Space Models. arXiv preprint arXiv:2412.11214 (2024)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3541957"},{"key":"e_1_3_2_1_47_1","volume-title":"Ahmed Y Al Hammadi, and Jizhe Zhou","author":"Ma Xiaochen","year":"2023","unstructured":"Xiaochen Ma, Bo Du, Zhuohang Jiang, Ahmed Y Al Hammadi, and Jizhe Zhou. 2023. IML-ViT: Benchmarking Image Manipulation Localization by Vision Transformer. arXiv preprint arXiv:2307.14863 (2023)."},{"key":"e_1_3_2_1_48_1","first-page":"134591","article-title":"Imdl-benco: A comprehensive benchmark and codebase for image manipulation detection & localization","volume":"37","author":"Ma Xiaochen","year":"2024","unstructured":"Xiaochen Ma, Xuekang Zhu, Lei Su, Bo Du, Zhuohang Jiang, Bingkui Tong, Zeyu Lei, Xinyu Yang, Chi-Man Pun, Jiancheng Lv, et al., 2024. Imdl-benco: A comprehensive benchmark and codebase for image manipulation detection & localization. Advances in Neural Information Processing Systems, Vol. 37 (2024), 134591-134613.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS61860.2024.10810690"},{"key":"e_1_3_2_1_51_1","unstructured":"Nikkei Asia. 2024a. AI Anime Flood. https:\/\/asia.nikkei.com\/static\/vdata\/infographics\/ai-anime\/ Accessed: 2025-04-11."},{"key":"e_1_3_2_1_52_1","unstructured":"Nikkei Asia. 2024b. NIKKEI Film: Japanese anime vs. generative AI. https:\/\/asia.nikkei.com\/Business\/Technology\/NIKKEI-Film-Japanese-anime-vs.-generative-AI Accessed: 2025-04-12."},{"key":"e_1_3_2_1_53_1","volume-title":"Image Forgery Localization via Guided Noise and Multi-Scale Feature Aggregation. arXiv preprint arXiv:2412.01622","author":"Niu Yakun","year":"2024","unstructured":"Yakun Niu, Pei Chen, Lei Zhang, Lei Tan, and Yingjian Chen. 2024. Image Forgery Localization via Guided Noise and Multi-Scale Feature Aggregation. arXiv preprint arXiv:2412.01622 (2024)."},{"key":"e_1_3_2_1_54_1","volume-title":"IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops. 71-80","author":"Novozamsky Adam","year":"2020","unstructured":"Adam Novozamsky, Babak Mahdian, and Stanislav Saic. 2020. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops. 71-80."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112545"},{"key":"e_1_3_2_1_56_1","volume-title":"Omni-IML: Towards Unified Image Manipulation Localization. arXiv preprint arXiv:2411.14823","author":"Qu Chenfan","year":"2024","unstructured":"Chenfan Qu, Yiwu Zhong, Fengjun Guo, and Lianwen Jin. 2024a. Omni-IML: Towards Unified Image Manipulation Localization. arXiv preprint arXiv:2411.14823 (2024)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01025"},{"key":"e_1_3_2_1_58_1","volume-title":"International conference on machine learning. PmLR, 8748-8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al., 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PmLR, 8748-8763."},{"key":"e_1_3_2_1_59_1","unstructured":"Tianhe Ren Shilong Liu Ailing Zeng Jing Lin Kunchang Li He Cao Jiayu Chen Xinyu Huang Yukang Chen Feng Yan et al. 2024. Grounded sam: Assembling open-world models for diverse visual tasks. arXiv preprint arXiv:2401.14159 (2024)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3367749"},{"key":"e_1_3_2_1_62_1","volume-title":"SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints. arXiv preprint arXiv:2412.09981","author":"Sheng Ziqi","year":"2024","unstructured":"Ziqi Sheng, Wei Lu, Xiangyang Luo, Jiantao Zhou, and Xiaochun Cao. 2024. SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints. arXiv preprint arXiv:2412.09981 (2024)."},{"key":"e_1_3_2_1_63_1","volume-title":"Parameter-Efficient Image Manipulation Localization Through Spare-Coding Transformer. arXiv preprint arXiv:2412.14598","author":"Su Lei","year":"2024","unstructured":"Lei Su, Xiaochen Ma, Xuekang Zhu, Chaoqun Niu, Zeyu Lei, and Ji-Zhe Zhou. 2024a. Can We Get Rid of Handcrafted Feature Extractors? SparseViT: Nonsemantics-Centered, Parameter-Efficient Image Manipulation Localization Through Spare-Coding Transformer. arXiv preprint arXiv:2412.14598 (2024)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659639"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681445"},{"key":"e_1_3_2_1_66_1","volume-title":"ForgerySleuth: Empowering Multimodal Large Language Models for Image Manipulation Detection. arXiv preprint arXiv:2411.19466","author":"Sun Zhihao","year":"2024","unstructured":"Zhihao Sun, Haoran Jiang, Haoran Chen, Yixin Cao, Xipeng Qiu, Zuxuan Wu, and Yu-Gang Jiang. 2024b. ForgerySleuth: Empowering Multimodal Large Language Models for Image Manipulation Detection. arXiv preprint arXiv:2411.19466 (2024)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02657"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-53311-2_15"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00240"},{"key":"e_1_3_2_1_70_1","volume-title":"HRGR: Enhancing Image Manipulation Detection via Hierarchical Region-aware Graph Reasoning. arXiv preprint arXiv:2410.21861","author":"Wang Xudong","year":"2024","unstructured":"Xudong Wang, Yuezun Li, Huiyu Zhou, Jiaran Zhou, and Junyu Dong. 2024. HRGR: Enhancing Image Manipulation Detection via Hierarchical Region-aware Graph Reasoning. arXiv preprint arXiv:2410.21861 (2024)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680631"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"e_1_3_2_1_73_1","volume-title":"SegFormer: Simple and efficient design for semantic segmentation with transformers. Advances in neural information processing systems","author":"Xie Enze","year":"2021","unstructured":"Enze Xie, Wenhai Wang, Zhiding Yu, Anima Anandkumar, Jose M Alvarez, and Ping Luo. 2021. SegFormer: Simple and efficient design for semantic segmentation with transformers. Advances in neural information processing systems, Vol. 34 (2021), 12077-12090."},{"key":"e_1_3_2_1_74_1","volume-title":"Fakeshield: Explainable image forgery detection and localization via multi-modal large language models. arXiv preprint arXiv:2410.02761","author":"Xu Zhipei","year":"2024","unstructured":"Zhipei Xu, Xuanyu Zhang, Runyi Li, Zecheng Tang, Qing Huang, and Jian Zhang. 2024. Fakeshield: Explainable image forgery detection and localization via multi-modal large language models. arXiv preprint arXiv:2410.02761 (2024)."},{"key":"e_1_3_2_1_75_1","volume-title":"A sanity check for ai-generated image detection. arXiv preprint arXiv:2406.19435","author":"Yan Shilin","year":"2024","unstructured":"Shilin Yan, Ouxiang Li, Jiayin Cai, Yanbin Hao, Xiaolong Jiang, Yao Hu, and Weidi Xie. 2024. A sanity check for ai-generated image detection. arXiv preprint arXiv:2406.19435 (2024)."},{"key":"e_1_3_2_1_76_1","volume-title":"Model Synthesis for Zero-Shot Model Attribution. arXiv preprint arXiv:2307.15977","author":"Yang Tianyun","year":"2023","unstructured":"Tianyun Yang, Juan Cao, Danding Wang, and Chang Xu. 2023. Model Synthesis for Zero-Shot Model Attribution. arXiv preprint arXiv:2307.15977 (2023)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3531103"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01213"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28520"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00766"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28571"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28571"},{"key":"e_1_3_2_1_84_1","volume-title":"Image Manipulation Detection with Implicit Neural Representation and Limited Supervision. In European Conference on Computer Vision. Springer, 255-273","author":"Zhang Zhenfei","year":"2024","unstructured":"Zhenfei Zhang, Mingyang Li, Xin Li, Ming-Ching Chang, and Jun-Wei Hsieh. 2024c. Image Manipulation Detection with Implicit Neural Representation and Limited Supervision. In European Conference on Computer Vision. Springer, 255-273."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02042"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28608"},{"key":"e_1_3_2_1_87_1","volume-title":"Mesoscopic Insights: Orchestrating Multi-scale & Hybrid Architecture for Image Manipulation Localization. arXiv preprint arXiv:2412.13753","author":"Zhu Xuekang","year":"2024","unstructured":"Xuekang Zhu, Xiaochen Ma, Lei Su, Zhuohang Jiang, Bo Du, Xiwen Wang, Zeyu Lei, Wentao Feng, Chi-Man Pun, and Jizhe Zhou. 2024b. Mesoscopic Insights: Orchestrating Multi-scale & Hybrid Architecture for Image Manipulation Localization. arXiv preprint arXiv:2412.13753 (2024)."}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 1st on Deepfake Forensics Workshop: Detection, Attribution, Recognition, and Adversarial Challenges in the Era of AI-Generated Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746265.3759666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:51:44Z","timestamp":1764550304000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746265.3759666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":87,"alternative-id":["10.1145\/3746265.3759666","10.1145\/3746265"],"URL":"https:\/\/doi.org\/10.1145\/3746265.3759666","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}