{"id":"https://openalex.org/W7147003777","doi":"https://doi.org/10.1109/cnml68938.2026.11452494","title":"Image Forgery Localization via Hierarchical Soft Clustering","display_name":"Image Forgery Localization via Hierarchical Soft Clustering","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147003777","doi":"https://doi.org/10.1109/cnml68938.2026.11452494"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11452494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132585875","display_name":"Zhiwei Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwei Zhao","raw_affiliation_strings":["Shenzhen University,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University,Shenzhen,China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132599440","display_name":"Xia Li","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xia Li","raw_affiliation_strings":["Shenzhen University,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University,Shenzhen,China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069593314","display_name":"Yong Li","orcid":"https://orcid.org/0000-0003-4038-0493"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanman Li","raw_affiliation_strings":["Shenzhen University,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Shenzhen University,Shenzhen,China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5132585875"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.89871841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"877","last_page":"881"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.00559999980032444,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7014999985694885},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6276000142097473},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6238999962806702},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5676000118255615},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5241000056266785},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5134000182151794},{"id":"https://openalex.org/keywords/hierarchical-clustering","display_name":"Hierarchical clustering","score":0.48969998955726624},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4004000127315521}],"concepts":[{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7530999779701233},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7014999985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6574000120162964},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6276000142097473},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6238999962806702},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5676000118255615},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5241000056266785},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C92835128","wikidata":"https://www.wikidata.org/wiki/Q1277447","display_name":"Hierarchical clustering","level":3,"score":0.48969998955726624},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4004000127315521},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3797000050544739},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3702999949455261},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.3580999970436096},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.2913999855518341},{"id":"https://openalex.org/C144986985","wikidata":"https://www.wikidata.org/wiki/Q871236","display_name":"Hierarchical database model","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C124504099","wikidata":"https://www.wikidata.org/wiki/Q56933","display_name":"Image segmentation","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2621000111103058}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11452494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.695559024810791,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2104116677","https://openalex.org/W2149073238","https://openalex.org/W2169439181","https://openalex.org/W2518397542","https://openalex.org/W2560026874","https://openalex.org/W2897180259","https://openalex.org/W3118971208","https://openalex.org/W4312981036","https://openalex.org/W4386075803","https://openalex.org/W4403758830","https://openalex.org/W4407466200","https://openalex.org/W4409363232","https://openalex.org/W4409365647","https://openalex.org/W4411639777","https://openalex.org/W4415800688"],"related_works":[],"abstract_inverted_index":{"Image":[0],"forgery":[1,19,62,85,100],"detection":[2],"is":[3],"a":[4,35,56,103,109,115,127],"key":[5],"problem":[6],"in":[7,102],"image":[8,32],"forensics.":[9],"Most":[10],"existing":[11],"methods":[12,151],"use":[13,90],"supervised":[14],"classification":[15],"and":[16,31,45,84,89,134,155],"learn":[17],"common":[18],"cues":[20],"from":[21],"many":[22,29],"labeled":[23],"samples.":[24],"However,":[25],"real":[26],"forgeries":[27],"have":[28],"forms":[30],"distributions":[33],"vary":[34],"lot,":[36],"so":[37],"these":[38],"models":[39],"often":[40],"overfit":[41],"the":[42],"training":[43],"data":[44],"generalize":[46],"poorly":[47],"across":[48],"scenes.":[49],"To":[50],"address":[51],"this":[52],"issue,":[53],"we":[54,73,107,125],"propose":[55],"deep":[57],"clustering":[58,93],"based":[59],"framework":[60],"for":[61],"localization,":[63],"HSC":[64,148],"(Image":[65],"Forgery":[66],"Localization":[67],"via":[68],"Hierarchical":[69],"Soft":[70],"Clustering).":[71],"First,":[72],"build":[74],"an":[75],"asymmetric":[76],"feature":[77],"space":[78],"where":[79],"background":[80,111],"features":[81,86],"are":[82,87],"compact":[83],"scattered,":[88],"hierarchical":[91],"soft":[92],"with":[94,114,131],"EM":[95],"iterations":[96],"to":[97,118,121],"model":[98],"different":[99],"patterns":[101],"probabilistic":[104],"way.":[105],"Second,":[106],"introduce":[108],"robust":[110],"estimation":[112],"method":[113],"border":[116],"prior":[117,150],"reduce":[119],"sensitivity":[120],"cluster":[122],"size.":[123],"Finally,":[124],"design":[126],"two-layer":[128],"attention":[129],"decoder":[130],"cluster-to-pixel":[132],"cross-attention":[133],"cluster-to-cluster":[135],"self-attention,":[136],"turning":[137],"rule-based":[138],"decisions":[139],"into":[140],"learnable":[141],"end-to-end":[142],"inference.":[143],"Extensive":[144],"experiments":[145],"show":[146],"that":[147],"outperforms":[149],"on":[152],"multiple":[153],"datasets":[154],"cross-scene":[156],"settings.":[157]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
