{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:23:03Z","timestamp":1777890183013,"version":"3.51.4"},"reference-count":109,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The advancement of artificial intelligence (AI) technologies, including generative pre-trained transformers (GPTs) and generative models for text, image, audio, and video creation, has revolutionized content generation, creating unprecedented opportunities and critical challenges. This paper systematically examines the characteristics, methodologies, and challenges associated with detecting the synthetic content across multiple modalities, to safeguard digital authenticity and integrity. Key detection approaches reviewed include stylometric analysis, watermarking, pixel prediction techniques, dual-stream networks, machine learning models, blockchain, and hybrid approaches, highlighting their strengths and limitations, as well as their detection accuracy, independent accuracy of 80% for stylometric analysis and up to 92% using multiple modalities in hybrid approaches. The effectiveness of these techniques is explored in diverse contexts, from identifying deepfakes and synthetic media to detecting AI-generated scientific texts. Ethical concerns, such as privacy violations, algorithmic bias, false positives, and overreliance on automated systems, are also critically discussed. Furthermore, the paper addresses legal and regulatory frameworks, including intellectual property challenges and emerging legislation, emphasizing the need for robust governance to mitigate misuse. Real-world examples of detection systems are analyzed to provide practical insights into implementation challenges. Future directions include developing generalizable and adaptive detection models, hybrid approaches, fostering collaboration between stakeholders, and integrating ethical safeguards. By presenting a comprehensive overview of AIGC detection, this paper aims to inform stakeholders, researchers, policymakers, and practitioners on addressing the dual-edged implications of AI-driven content creation.<\/jats:p>","DOI":"10.3390\/computers14010001","type":"journal-article","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T09:00:57Z","timestamp":1735030857000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Distinguishing Reality from AI: Approaches for Detecting Synthetic Content"],"prefix":"10.3390","volume":"14","author":[{"given":"David","family":"Ghiur\u0103u","sequence":"first","affiliation":[{"name":"Department of Computers and Information Technology, Politehnica University of Timisoara, 2 V. Parvan Blvd, 300223 Timisoara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7804-5178","authenticated-orcid":false,"given":"Daniela Elena","family":"Popescu","sequence":"additional","affiliation":[{"name":"Department of Computers and Information Technology, Faculty of Electrical Engineering and Information Technology, University of Oradea, 410087 Oradea, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.artint.2006.10.009","article-title":"Evolution of Artificial Intelligence","volume":"170","author":"Spector","year":"2006","journal-title":"Artif. Intell."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s10462-021-10039-7","article-title":"Artificial Intelligence in the Creative Industries: A Review","volume":"55","author":"Anantrasirichai","year":"2021","journal-title":"Artif. Intell. Rev."},{"key":"ref_3","unstructured":"Wu, J., Gan, W., Chen, Z., Wan, S., and Lin, H. (2023). AI-Generated Content (AIGC): A Survey. arXiv."},{"key":"ref_4","unstructured":"Chen, C., Fu, J., and Lyu, L. (2023, January 19\u201325). A Pathway Towards Responsible AI Generated Content. Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, Macao, China."},{"key":"ref_5","first-page":"773","article-title":"Auditing and Generating Synthetic Data with Controllable Trust Trade-Offs","volume":"14","author":"Belgodere","year":"2024","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."},{"key":"ref_6","unstructured":"Georgiev, G. (2024, June 03). Has Interest in Data Science Peaked Already?|by Georgi Georgiev|Towards Data Science. Available online: https:\/\/towardsdatascience.com\/has-interest-in-data-science-peaked-already-437648d7f408."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"50851","DOI":"10.1109\/ACCESS.2023.3276480","article-title":"TIMIT-TTS: A Text-to-Speech Dataset for Multimodal Synthetic Media Detection","volume":"11","author":"Salvi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"691","DOI":"10.17762\/ijritcc.v11i9.8861","article-title":"A Multimodal Approach for Detecting AI Generated Content Using BERT and CNN","volume":"11","author":"Vora","year":"2023","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"ref_9","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., and Ferrer, C.C. (2020). The DeepFake Detection Challenge (DFDC) Dataset. arXiv."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103525","DOI":"10.1016\/j.cviu.2022.103525","article-title":"Deep Learning for Deepfakes Creation and Detection: A Survey","volume":"223","author":"Nguyen","year":"2022","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_11","unstructured":"Agarwal, S., and Varshney, L.R. (2019). Limits of Deepfake Detection: A Robust Estimation Viewpoint. arXiv."},{"key":"ref_12","first-page":"1043","article-title":"Detecting and Unmasking AI-Generated Texts Through Explainable Artificial Intelligence Using Stylistic Features","volume":"14","author":"Shah","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_13","unstructured":"Sadasivan, V.S., Kumar, A., Balasubramanian, S., Wang, W., and Feizi, S. (2023). Can AI-Generated Text Be Reliably Detected?. arXiv."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rodriguez, J.D., Hay, T., Gros, D., Shamsi, Z., and Srinivasan, R. (2022, January 10\u201315). Cross-Domain Detection of GPT-2-Generated Technical Text. Proceedings of the NAACL 2022\u20142022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Seattle, WA, USA.","DOI":"10.18653\/v1\/2022.naacl-main.88"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Epstein, D.C., Jain, I., Wang, O., and Zhang, R. (2023, January 2\u20136). Online Detection of AI-Generated Images. Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision Workshops, ICCVW 2023, Paris, France.","DOI":"10.1109\/ICCVW60793.2023.00045"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Corvi, R., Cozzolino, D., Zingarini, G., Poggi, G., Nagano, K., and Verdoliva, L. (2023, January 4\u201310). On The Detection of Synthetic Images Generated by Diffusion Models. Proceedings of the ICASSP 2023\u20142023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece.","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"ref_17","unstructured":"Krishna, K., Song, Y., Karpinska, M., Wieting, J., and Iyyer, M. (2023, January 10\u201316). Paraphrasing Evades Detectors of AI-Generated Text, but Retrieval Is an Effective Defense. Proceedings of the Advances in Neural Information Processing Systems 36 (NeurIPS 2023), New Orleans, LA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Alamleh, H., Alqahtani, A.A.S., and Elsaid, A. (2023, January 27\u201328). Distinguishing Human-Written and ChatGPT-Generated Text Using Machine Learning. Proceedings of the 2023 Systems and Information Engineering Design Symposium, SIEDS 2023, Charlottesville, VA, USA.","DOI":"10.1109\/SIEDS58326.2023.10137767"},{"key":"ref_19","first-page":"10","article-title":"AI Generated Music","volume":"4","author":"Kumar","year":"2024","journal-title":"Int. J. Res. Sci. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"169187","DOI":"10.4108\/eai.14-4-2021.169187","article-title":"A Survey of Audio Synthesis and Lip-Syncing for Synthetic Video Generation","volume":"8","author":"Kadam","year":"2021","journal-title":"EAI Endorsed Trans. Creat. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Galbally, J., and Marcel, S. (2014, January 24\u201328). Face Anti-Spoofing Based on General Image Quality Assessment. Proceedings of the 2014 22nd International Conference on Pattern Recognition (ICPR), Stockholm, Sweden.","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref_22","unstructured":"Hu, T., Qi, H., Huang, Q., and Lu, Y. (2019). See Better Before Looking Closer: Weakly Supervised Data Augmentation Network for Fine-Grained Visual Classification. arXiv."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020, January 13\u201319). Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.patter.2022.100509","article-title":"DeepFakes: A New Threat to image fabrication in scientific publications","volume":"3","author":"Wang","year":"2022","journal-title":"Patterns"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Giudice, O., Guarnera, L., and Battiato, S. (2021). Fighting Deepfakes by Detecting Gan Dct Anomalies. J. Imaging, 7.","DOI":"10.3390\/jimaging7080128"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media Forensics and DeepFakes: An Overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"108832","DOI":"10.1016\/j.patcog.2022.108832","article-title":"Learning a Deep Dual-Level Network for Robust DeepFake Detection","volume":"130","author":"Pu","year":"2022","journal-title":"Pattern Recognit."},{"key":"ref_28","unstructured":"Hong, S., Seo, J., Shin, H., Hong, S., and Kim, S. (2023). DirecT2V: Large Language Models Are Frame-Level Directors for Zero-Shot Text-to-Video Generation. arXiv."},{"key":"ref_29","unstructured":"Korshunov, P., and Marcel, S. (2018). DeepFakes: A New Threat to Face Recognition? Assessment and Detection. arXiv."},{"key":"ref_30","unstructured":"Jonathan, B. (2024, June 11). Additional Challenges to Detecting AI Writing\u2014Plagiarism Today. Available online: https:\/\/www.plagiarismtoday.com\/2023\/07\/31\/additional-challenges-to-detecting-ai-writing\/."},{"key":"ref_31","unstructured":"Gillham, J. (2024, June 08). AI Content Detector Accuracy Review + Open Source Dataset and Research Tool\u2014Originality.AI. Available online: https:\/\/originality.ai\/blog\/ai-content-detection-accuracy."},{"key":"ref_32","unstructured":"Barshay, J. (2024, June 11). Proof Points: It\u2019s Easy to Fool ChatGPT Detectors. Available online: https:\/\/hechingerreport.org\/proof-points-its-easy-to-fool-chatgpt-detectors\/."},{"key":"ref_33","unstructured":"(2024, June 17). Pop! Automation. ChatGPT and AI Detectors. Available online: https:\/\/www.popautomation.com\/post\/chatgpt-and-ai-detectors."},{"key":"ref_34","unstructured":"Juhasz, B. (2024, July 10). How to Avoid Being Flagged by GPT Detectors! The Expert Strategies for Content Writers\u2014Service Lifter. Available online: https:\/\/servicelifter.com\/guides\/how-to-avoid-being-flagged-by-gpt-detectors-the-expert-strategies-for-content-writers\/."},{"key":"ref_35","unstructured":"Christian, P. (2024, July 14). How to Detect ChatGPT: Tools and Tips for Detection. Available online: https:\/\/undetectable.ai\/blog\/how-to-detect-chatgpt\/."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1021\/ac902636q","article-title":"Computational Neural Networks Driving Complex Analytical Problem Solving","volume":"82","author":"Hanrahan","year":"2010","journal-title":"Anal. Chem."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ranade, P., Piplai, A., Mittal, S., Joshi, A., and Finin, T. (2021, January 18\u201322). Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China.","DOI":"10.1109\/IJCNN52387.2021.9534192"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"23103","DOI":"10.1007\/s00521-023-08957-4","article-title":"Deep Learning: Systematic Review, Models, Challenges, and Research Directions","volume":"35","author":"Kaabouch","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"ref_39","unstructured":"Park, S., Moon, S., and Kim, J. (2022). Ensuring Visual Commonsense Morality for Text-to-Image Generation. arXiv."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Welsh, A.P., and Edwards, M. (2023). Text Generation for Dataset Augmentation in Security Classification Tasks. arXiv.","DOI":"10.2139\/ssrn.4616394"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Orenstrakh, M.S., Karnalim, O., Suarez, C.A., and Liut, M. (2024, January 2\u20134). Detecting LLM-Generated Text in Computing Education: A Comparative Study for ChatGPT Cases. Proceedings of the 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), Osaka, Japan.","DOI":"10.1109\/COMPSAC61105.2024.00027"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Xi, Z., Huang, W., Wei, K., Luo, W., and Zheng, P. (November, January 31). AI-Generated Image Detection Using a Cross-Attention Enhanced Dual-Stream Network. Proceedings of the 2023 Asia Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2023, Taipei, Taiwan.","DOI":"10.1109\/APSIPAASC58517.2023.10317126"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 22\u201326). Towards Evaluating the Robustness of Neural Networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Marra, F., Saltori, C., Boato, G., and Verdoliva, L. (2019, January 9\u201312). Incremental Learning for the Detection and Classification of GAN-Generated Images. Proceedings of the 2019 IEEE International Workshop on Information Forensics and Security, WIFS 2019, Delft, The Netherlands.","DOI":"10.1109\/WIFS47025.2019.9035099"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3132039","article-title":"Surveying Stylometry Techniques and Applications","volume":"50","author":"Neal","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2382448.2382450","article-title":"Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity","volume":"15","author":"Brennan","year":"2012","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"107","DOI":"10.32614\/RJ-2016-007","article-title":"Stylometry with R: A Package for Computational Text Analysis","volume":"8","author":"Eder","year":"2016","journal-title":"R J."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Potthast, M., Kiesel, J., Reinartz, K., Bevendorff, J., and Stein, B. (2018, January 15\u201320). A Stylometric Inquiry into Hyperpartisan and Fake News. Proceedings of the ACL 2018\u201456th Annual Meeting of the Association for Computational Linguistics, Melbourne, Australia.","DOI":"10.18653\/v1\/P18-1022"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Michailidis, P.D. (2022). A Scientometric Study of the Stylometric Research Field. Informatics, 9.","DOI":"10.3390\/informatics9030060"},{"key":"ref_50","first-page":"1","article-title":"Writeprints: A Stylometric Approach to Identity-Level Identification and Similarity Detection in Cyberspace","volume":"26","author":"Abbasi","year":"2008","journal-title":"ACM Trans. Inf. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Quiring, E., Arp, D., and Rieck, K. (2017). Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking. arXiv.","DOI":"10.1109\/EuroSP.2018.00041"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Boujerfaoui, S., Riad, R., Douzi, H., Ros, F., and Harba, R. (2023). Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review. Electronics, 12.","DOI":"10.3390\/electronics12010074"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Zhang, J., and Gong, N.Z. (2023, January 26\u201330). Evading Watermark Based Detection of AI-Generated Content. Proceedings of the CCS 2023\u2014Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark.","DOI":"10.1145\/3576915.3623189"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"012118","DOI":"10.1088\/1742-6596\/1999\/1\/012118","article-title":"Digital Watermark Technique: A Review","volume":"1999","author":"Makhrib","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_55","first-page":"17061","article-title":"A Watermark for Large Language Models","volume":"202","author":"Kirchenbauer","year":"2023","journal-title":"Proc. Mach. Learn. Res."},{"key":"ref_56","unstructured":"Wen, Y., Kirchenbauer, J., Geiping, J., and Goldstein, T. (2023). Tree-Ring Watermarks: Fingerprints for Diffusion Images That Are Invisible and Robust. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Frattolillo, F. (2020). A Watermarking Protocol Based on Blockchain. Appl. Sci., 10.","DOI":"10.3390\/app10217746"},{"key":"ref_58","first-page":"246","article-title":"A Multiparty Watermarking Protocol for Cloud Environments","volume":"47","author":"Frattolillo","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_59","first-page":"154","article-title":"Implementation of Image Authentication Using Digital Watermarking with Biometric","volume":"7","author":"Harika","year":"2023","journal-title":"Int. J. Eng. Technol. Manag. Sci."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Kelkoul, H., Zaz, Y., and Mantoro, T. (2021, January 5\u20136). Countering Audiovisual Content Piracy: A Hybrid Watermarking and Fingerprinting Technology. Proceedings of the 7th International Conference on Computing, Engineering and Design, ICCED 2021, Sukabumi, Indonesia.","DOI":"10.1109\/ICCED53389.2021.9664855"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s41651-023-00162-0","article-title":"A Multilevel Digital Watermarking Protocol for Vector Geographic Data Based on Blockchain","volume":"7","author":"Ren","year":"2023","journal-title":"J. Geovisualization Spat. Anal."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"9157","DOI":"10.1007\/s11042-014-2073-4","article-title":"A Novel Robust Video Fingerprinting-Watermarking Hybrid Scheme Based on Visual Secret Sharing","volume":"74","author":"Liu","year":"2015","journal-title":"Multimedia Tools Appl."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Wang, C., Gerdes, R.M., Guan, Y., and Kasera, S.K. (2016). Digital Fingerprinting, Springer.","DOI":"10.1007\/978-1-4939-6601-1"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Yu, P.L., Sadler, B.M., Verma, G., and Baras, J.S. (2016). Fingerprinting by Design: Embedding and Authentication. Digital Fingerprinting, Springer.","DOI":"10.1007\/978-1-4939-6601-1_5"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1451","DOI":"10.1007\/s40031-024-01066-3","article-title":"Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks","volume":"105","author":"Ametefe","year":"2024","journal-title":"J. Inst. Eng. (India) Ser. B"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","article-title":"Adversarial Attacks and Defenses in Deep Learning","volume":"6","author":"Ren","year":"2020","journal-title":"Engineering"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Bai, T., Luo, J., Zhao, J., Wen, B., and Wang, Q. (2021, January 19\u201327). Recent Advances in Adversarial Training for Adversarial Robustness. Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, Montreal, QC, Canada.","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"61152","DOI":"10.1109\/ACCESS.2024.3392391","article-title":"A Robust Defense against Adversarial Attacks on Deep Learning-Based Malware Detectors via (De)Randomized Smoothing","volume":"12","author":"Gibert","year":"2024","journal-title":"IEEE Access"},{"key":"ref_69","unstructured":"Goodfellow, I., Shlens, J., and Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. Machine Learning."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"4907754","DOI":"10.1155\/2021\/4907754","article-title":"A Survey on Adversarial Attack in the Age of Artificial Intelligence","volume":"2021","author":"Kong","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Salehin, I., and Kang, D.K. (2023). A Review on Dropout Regularization Approaches for Deep Neural Networks within the Scholarly Domain. Electronics, 12.","DOI":"10.3390\/electronics12143106"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"103988","DOI":"10.1016\/j.cose.2024.103988","article-title":"Adversarial Machine Learning in Industry: A Systematic Literature Review","volume":"145","author":"Jedrzejewski","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_73","first-page":"121","article-title":"A Framework for Detecting AI-Generated Text in Research Publications","volume":"11","author":"Sarzaeim","year":"2023","journal-title":"Int. Conf. Adv. Technol."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"102177","DOI":"10.1016\/j.cose.2021.102177","article-title":"Intrusion Detection Methods Based on Integrated Deep Learning Model","volume":"103","author":"Wang","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_75","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R.R. (2012). Improving Neural Networks by Preventing Co-Adaptation of Feature Detectors. arXiv."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Meroni, G., Comuzzi, M., and K\u00f6pke, J. (2023). Editorial: Blockchain for Trusted Information Systems. Front. Blockchain, 6.","DOI":"10.3389\/fbloc.2023.1235704"},{"key":"ref_77","first-page":"211","article-title":"BlockChain Based Certificate Verification Platform","volume":"339","author":"Curmi","year":"2019","journal-title":"Lect. Notes Bus. Inf. Process."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Malik, G., Parasrampuria, K., Reddy, S.P., and Shah, S. (2019, January 30\u201331). Blockchain Based Identity Verification Model. Proceedings of the International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN 2019, Vellore, India.","DOI":"10.1109\/ViTECoN.2019.8899569"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"100139","DOI":"10.1016\/j.array.2022.100139","article-title":"Blockchain in Healthcare and IoT: A Systematic Literature Review","volume":"14","author":"Adere","year":"2022","journal-title":"Array"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Morar, C.D., and Popescu, D.E. (2024). A Survey of Blockchain Applicability, Challenges, and Key Threats. Computers, 13.","DOI":"10.3390\/computers13090223"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Zheng, X., Zhang, C., and Woodland, P.C. (2021, January 13\u201317). Adapting GPT, GPT-2 and BERT Language Models for Speech Recognition. Proceedings of the 2021 IEEE Automatic Speech Recognition and Understanding Workshop, ASRU 2021, Cartagena, Colombia.","DOI":"10.1109\/ASRU51503.2021.9688232"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Hang, C.N., Yu, P.D., Morabito, R., and Tan, C.W. (2024). Large Language Models Meet Next-Generation Networking Technologies: A Review. Future Internet, 16.","DOI":"10.3390\/fi16100365"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"195","DOI":"10.54097\/hset.v57i.10001","article-title":"The Advance of GPTs and Language Model in Cyber Security","volume":"57","author":"Gao","year":"2023","journal-title":"Highlights Sci. Eng. Technol."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Rehana, H., \u00c7am, N.B., Basmaci, M., Zheng, J., Jemiyo, C., He, Y., \u00d6zg\u00fcr, A., and Hur, J. (2023). Evaluation of GPT and BERT-Based Models on Identifying Protein-Protein Interactions in Biomedical Text. arXiv.","DOI":"10.1093\/bioadv\/vbae133"},{"key":"ref_85","unstructured":"Grishina, A., and Kyrychenko, R. (2024, November 11). GPT-3 vs. BERT\u2014Which Is Best? This Article Compares Both in Depth. Available online: https:\/\/softteco.com\/blog\/bert-vs-chatgpt?WPACRandom=1734803436768."},{"key":"ref_86","unstructured":"Clark, K., Luong, M.T., Le, Q.V., and Manning, C.D. (2020, January 26\u201330). ELECTRA: Pre-Training Text Encoders as Discriminators Rather than Generators. Proceedings of the 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S., and Hoi, S.C.H. (2021, January 7\u201311). CodeT5: Identifier-Aware Unified Pre-Trained Encoder-Decoder Models for Code Understanding and Generation. Proceedings of the EMNLP 2021\u20142021 Conference on Empirical Methods in Natural Language Processing, Virtual.","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Desai, S., and Durrett, G. (2020, January 16\u201320). Calibration of Pre-Trained Transformers. Proceedings of the EMNLP 2020\u20142020 Conference on Empirical Methods in Natural Language Processing, Online.","DOI":"10.18653\/v1\/2020.emnlp-main.21"},{"key":"ref_89","unstructured":"Devlin, J., Chang, M., and Toutanova, K. (2019, January 2\u20137). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. Computation and Language. Proceedings of the NAACL-HLT 2019, Minneapolis, MN, USA."},{"key":"ref_90","first-page":"151","article-title":"GPT4MIA: Utilizing Generative Pre-Trained Transformer (GPT-3) as A Plug-and-Play Transductive Model for Medical Image Analysis","volume":"Volume 14393","author":"Zhang","year":"2023","journal-title":"Medical Image Computing and Computer Assisted Intervention\u2013MICCAI 2023 Workshops"},{"key":"ref_91","unstructured":"Mohseni, S., and Ragan, E. (2018). Combating Fake News with Interpretable News Feed Algorithms. arXiv."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"62097","DOI":"10.1109\/ACCESS.2022.3181184","article-title":"A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media","volume":"10","author":"Seddari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1609\/icwsm.v16i1.19283","article-title":"Do Explanations Increase the Effectiveness of AI-Crowd Generated Fake News Warnings?","volume":"16","author":"Epstein","year":"2022","journal-title":"Proc. Int. AAAI Conf. Web Soc. Media"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Lockey, S., Gillespie, N., Holm, D., and Someh, I.A. (2021, January 5). A Review of Trust in Artificial Intelligence: Challenges, Vulnerabilities and Future Directions. Proceedings of the 54th Annual Hawaii International Conference on System Sciences, Kauai, HI, USA.","DOI":"10.24251\/HICSS.2021.664"},{"key":"ref_95","first-page":"1753","article-title":"Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security","volume":"107","author":"Citron","year":"2019","journal-title":"Calif. L. Rev."},{"key":"ref_96","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., and Ferrer, C.C. (2019). The Deepfake Detection Challenge (DFDC) Preview Dataset. arXiv."},{"key":"ref_97","first-page":"20220158","article-title":"The Effectiveness of Software Designed to Detect AI-Generated Writing: A Comparison of 16 AI Text Detectors","volume":"7","author":"Walters","year":"2023","journal-title":"Open Inf. Sci."},{"key":"ref_98","unstructured":"Wang, J., Yuan, Y., and Yu, G. (2017). Face Attention Network: An Effective Face Detector for the Occluded Faces. arXiv."},{"key":"ref_99","unstructured":"Trigueros, D.S., Meng, L., and Hartnett, M. (2018). Face Recognition: From Traditional to Deep Learning Methods. arXiv."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.17485\/ijst\/2020\/v013i09\/149298","article-title":"Face Detection and Recognition System for Enhancing Security Measures Using Artificial Intelligence System","volume":"13","author":"Siddiqui","year":"2020","journal-title":"Indian J. Sci. Technol."},{"key":"ref_101","first-page":"1687","article-title":"Privacy\u2019s Constitutional Moment and the Limits of Data Protection","volume":"61","author":"Hartzog","year":"2020","journal-title":"Boston Coll. Law Rev."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Koulu, R., Hirvonen, H., Sankari, S., and Heikkinen, T. (2023). Artificial Intelligence and the Law: Can and Should We Regulate AI Systems?. SSRN Electron. J.","DOI":"10.2139\/ssrn.4256539"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Kunda, I., and Kunda, I. (2023). Regulating the Use of Generative AI in Academic Research and Publications. PUBMET.","DOI":"10.15291\/pubmet.4274"},{"key":"ref_104","unstructured":"(2024, December 01). General Data Protection Regulation (GDPR)\u2014Legal Text. Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"88","DOI":"10.4103\/2231-4040.82952","article-title":"Intellectual Property Rights: An Overview and Implications in Pharmaceutical Industry","volume":"2","author":"Bhattacharya","year":"2011","journal-title":"J. Adv. Pharm. Technol. Res."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Yang, X., Pan, L., Zhao, X., Chen, H., Petzold, L., Wang, W.Y., and Cheng, W. (2023). A Survey on Detection of LLMs-Generated Content. arXiv.","DOI":"10.18653\/v1\/2024.findings-emnlp.572"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"45527","DOI":"10.1109\/ACCESS.2022.3228535","article-title":"A Survey on Cross-Chain Technology: Challenges, Development, and Prospect","volume":"11","author":"Mao","year":"2023","journal-title":"IEEE Access"},{"key":"ref_108","unstructured":"(2024, December 02). The 2022 Code of Practice on Disinformation|Shaping Europe\u2019s Digital Future. Available online: https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/code-practice-disinformation."},{"key":"ref_109","unstructured":"(2024, December 01). The Digital Services Act Package|Shaping Europe\u2019s Digital Future. Available online: https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/digital-services-act-package."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:59:07Z","timestamp":1760115547000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"references-count":109,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["computers14010001"],"URL":"https:\/\/doi.org\/10.3390\/computers14010001","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,24]]}}}