{"id":"https://openalex.org/W4414169800","doi":"https://doi.org/10.1109/iwqos65803.2025.11143481","title":"Detecting and Tracing Dataset Misuse in Fine-Tuning Text-to-Image Models","display_name":"Detecting and Tracing Dataset Misuse in Fine-Tuning Text-to-Image Models","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4414169800","doi":"https://doi.org/10.1109/iwqos65803.2025.11143481"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos65803.2025.11143481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037830090","display_name":"Songrui Wang","orcid":"https://orcid.org/0009-0005-8491-8314"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Songrui Wang","raw_affiliation_strings":["Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110958027","display_name":"Yubo Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yubo Zhu","raw_affiliation_strings":["Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021538603","display_name":"Wei Tong","orcid":"https://orcid.org/0000-0002-8427-6068"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Tong","raw_affiliation_strings":["Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037830090"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23201064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7620999813079834},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.7196000218391418},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.5946000218391418},{"id":"https://openalex.org/keywords/stylized-fact","display_name":"Stylized fact","score":0.5827000141143799},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4943000078201294},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.3815000057220459},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.3668999969959259}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8062000274658203},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7620999813079834},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.7196000218391418},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.5946000218391418},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5870000123977661},{"id":"https://openalex.org/C38935604","wikidata":"https://www.wikidata.org/wiki/Q4330363","display_name":"Stylized fact","level":2,"score":0.5827000141143799},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4943000078201294},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38260000944137573},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3815000057220459},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3747999966144562},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.3668999969959259},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3668999969959259},{"id":"https://openalex.org/C2781170535","wikidata":"https://www.wikidata.org/wiki/Q30587856","display_name":"Noisy data","level":2,"score":0.3625999987125397},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.35519999265670776},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.32690000534057617},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3255000114440918},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.27630001306533813}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos65803.2025.11143481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4200214532","display_name":null,"funder_award_id":"62372226,62272215,62002159","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1861492603","https://openalex.org/W2164678342","https://openalex.org/W2350778671","https://openalex.org/W2964332173","https://openalex.org/W3168867926","https://openalex.org/W4320342667","https://openalex.org/W4380135882","https://openalex.org/W4387389685"],"related_works":[],"abstract_inverted_index":{"Text-to-image":[0],"synthesis":[1],"has":[2],"become":[3],"highly":[4],"popular":[5],"for":[6,20,56,94],"generating":[7],"realistic":[8],"and":[9,32,71,98,110],"stylized":[10],"images,":[11],"often":[12],"requiring":[13],"fine-tuning":[14,50],"generative":[15],"models":[16,55],"with":[17],"domain-specific":[18],"datasets":[19,26],"specialized":[21],"tasks.":[22],"However,":[23],"these":[24],"valuable":[25],"face":[27],"risks":[28],"of":[29,38,45,51,87,112],"unauthorized":[30,69],"usage":[31,70],"unapproved":[33],"sharing,":[34],"compromising":[35],"the":[36,39,43,49,77,83,88,108,113],"rights":[37],"owners.":[40],"We":[41,60],"address":[42],"issue":[44],"dataset":[46,63,84,121],"abuse":[47],"during":[48],"Stable":[52],"Diffusion":[53],"(SD)":[54],"text-to-image":[57],"(T2I)":[58],"synthesis.":[59],"present":[61],"a":[62],"watermarking":[64],"framework":[65],"designed":[66],"to":[67,91,100],"detect":[68],"trace":[72,101],"data":[73,89,102],"leaks.":[74,103],"Experiments":[75],"demonstrate":[76],"framework's":[78],"effectiveness,":[79],"minimal":[80],"impact":[81],"on":[82],"(only":[85],"2%":[86],"required":[90],"be":[92],"modified":[93],"high":[95],"detection":[96],"accuracy),":[97],"ability":[99],"Our":[104],"results":[105],"also":[106],"highlight":[107],"transferability":[109],"robustness":[111],"framework,":[114],"proving":[115],"its":[116],"practical":[117],"applicability":[118],"in":[119],"detecting":[120],"abuse.":[122],"The":[123],"code":[124],"is":[125],"available:":[126],"https://github.com/inmbzpmdqv/treidzxyq.git":[127]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
