{"id":"https://openalex.org/W4410294865","doi":"https://doi.org/10.1109/tce.2025.3566783","title":"Protecting Consumer Electronics Human-Computer Interactive Verification Security via Anomaly-Aware Reconstruction-Guided Forgery Localization","display_name":"Protecting Consumer Electronics Human-Computer Interactive Verification Security via Anomaly-Aware Reconstruction-Guided Forgery Localization","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4410294865","doi":"https://doi.org/10.1109/tce.2025.3566783"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3566783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3566783","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021561320","display_name":"Zehui Jin","orcid":"https://orcid.org/0000-0001-6336-4205"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zehui Jin","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037235449","display_name":"Yangyan Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114190","display_name":"Shanghai Zhangjiang Laboratory","ror":"https://ror.org/0208qbg77","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114190"]},{"id":"https://openalex.org/I4210164862","display_name":"Artificial Intelligence in Medicine (Canada)","ror":"https://ror.org/05p590m36","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210164862"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Yangyan Zeng","raw_affiliation_strings":["Xiangjiang Laboratory, Basic Research Institute of New Generation Artificial Intelligence, Changsha, China","Xiangjiang Laboratory, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Xiangjiang Laboratory, Basic Research Institute of New Generation Artificial Intelligence, Changsha, China","institution_ids":["https://openalex.org/I4210164862"]},{"raw_affiliation_string":"Xiangjiang Laboratory, Changsha, China","institution_ids":["https://openalex.org/I4210114190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058543015","display_name":"T. -C. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tenghao Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104234491","display_name":"Xinyue Liu","orcid":"https://orcid.org/0009-0009-5513-5491"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyue Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074480499","display_name":"Biao Leng","orcid":"https://orcid.org/0000-0003-3588-5622"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Leng","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055675863","display_name":"Xiaokang Zhou","orcid":"https://orcid.org/0000-0003-3488-4679"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xiaokang Zhou","raw_affiliation_strings":["Faculty of Business Data Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Business Data Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021561320"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":1.5743,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81555662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"71","issue":"2","first_page":"6807","last_page":"6817"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6318731307983398},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.6040745973587036},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5261756181716919},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45512622594833374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3842880427837372},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.352035790681839},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.233649343252182},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20837169885635376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1708555817604065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6318731307983398},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.6040745973587036},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5261756181716919},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45512622594833374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3842880427837372},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.352035790681839},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.233649343252182},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20837169885635376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1708555817604065}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3566783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3566783","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7366324606","display_name":null,"funder_award_id":"72274058","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W1994743750","https://openalex.org/W2531409750","https://openalex.org/W2574852830","https://openalex.org/W2888338418","https://openalex.org/W2913225181","https://openalex.org/W2948407537","https://openalex.org/W2962770929","https://openalex.org/W2962858109","https://openalex.org/W2964146055","https://openalex.org/W3035061161","https://openalex.org/W3083906693","https://openalex.org/W3108281670","https://openalex.org/W3118971208","https://openalex.org/W3120795858","https://openalex.org/W3136675246","https://openalex.org/W3154575015","https://openalex.org/W3197106219","https://openalex.org/W4214694907","https://openalex.org/W4287080402","https://openalex.org/W4292828490","https://openalex.org/W4294770674","https://openalex.org/W4308234128","https://openalex.org/W4312772600","https://openalex.org/W4312967678","https://openalex.org/W4313142698","https://openalex.org/W4321021643","https://openalex.org/W4366250585","https://openalex.org/W4375869427","https://openalex.org/W4385466011","https://openalex.org/W4385801432","https://openalex.org/W4386065608","https://openalex.org/W4386071953","https://openalex.org/W4387682030","https://openalex.org/W4388756760","https://openalex.org/W4389104848","https://openalex.org/W4390871926","https://openalex.org/W4390873235","https://openalex.org/W4391952588","https://openalex.org/W4394597718","https://openalex.org/W4396506525","https://openalex.org/W4401070836","https://openalex.org/W4402715936","https://openalex.org/W4402716164"],"related_works":["https://openalex.org/W2105642232","https://openalex.org/W3207332793","https://openalex.org/W3197833032","https://openalex.org/W4386081464","https://openalex.org/W2499612753","https://openalex.org/W3113278055","https://openalex.org/W2750709484","https://openalex.org/W4296474495","https://openalex.org/W4388937474","https://openalex.org/W4408666830"],"abstract_inverted_index":{"With":[0],"the":[1,45,60,107,163,181],"popularity":[2],"of":[3,93,139,143],"computer":[4],"vision,":[5],"many":[6],"consumer":[7,94],"electronic":[8],"applications":[9],"now":[10],"require":[11],"users":[12],"to":[13,35,50,53,70,157],"interactively":[14],"authenticate":[15],"their":[16],"identities":[17],"through":[18],"cameras":[19],"while":[20],"handling":[21],"business.":[22],"However,":[23,97],"numerous":[24],"spoofing":[25],"technologies":[26],"were":[27],"proposed":[28,164],"in":[29,106,175,187],"recent":[30],"years,":[31],"which":[32],"enables":[33],"attackers":[34,49],"perform":[36],"manipulation":[37,88],"during":[38],"verification.":[39],"Such":[40],"manipulations":[41],"can":[42,64],"easily":[43],"bypass":[44],"human-computer-interaction":[46],"verification,":[47],"allowing":[48],"impersonate":[51],"others":[52],"commit":[54],"crimes":[55],"or":[56],"fraud.":[57],"Diffusion,":[58],"as":[59,150],"SOTA":[61],"generative":[62],"model,":[63],"flexibly":[65],"reprint":[66],"image":[67],"content":[68],"according":[69,156],"prompt":[71],"guidance,":[72],"evading":[73],"traditional":[74],"forgery":[75,104,124,190],"detection":[76],"techniques.":[77],"Therefore,":[78],"there":[79],"is":[80],"an":[81],"urgent":[82],"need":[83],"for":[84],"countermeasures":[85],"on":[86,113,180],"diffusion":[87,196],"and":[89,153,195],"protects":[90],"data":[91],"security":[92],"electronics":[95],"applications.":[96],"existing":[98],"studies":[99],"suffer":[100],"from":[101],"overfitting":[102,167],"specific":[103,168],"traces":[105,149],"training":[108],"dataset":[109],"with":[110],"limited":[111],"ability":[112],"unseen":[114,193],"diffusions.":[115],"In":[116,160],"this":[117,161],"paper,":[118],"we":[119,133],"propose":[120],"a":[121,135],"novel":[122],"diffusion-manipulated":[123],"localization":[125],"framework":[126],"leveraging":[127],"Anomaly-aware":[128],"Image":[129],"Reconstruction":[130],"Deviation(AIRD).":[131],"Specifically,":[132],"train":[134],"reconstruction":[136,158],"model":[137],"capable":[138],"recovering":[140],"detailed":[141],"texture":[142],"authentic":[144],"images,":[145],"regarding":[146],"various":[147],"spoof":[148],"uniform":[151],"anomalies":[152],"conducts":[154],"segmentation":[155],"deviation.":[159],"case,":[162],"method":[165],"avoids":[166],"generators,":[169],"thus":[170],"achieving":[171],"better":[172],"generalization":[173],"performance":[174],"cross-domain":[176],"scenarios.":[177],"Extensive":[178],"experiments":[179],"multiple":[182],"datasets":[183],"showcase":[184],"our":[185],"effectiveness":[186],"extracting":[188],"general":[189],"artifacts":[191],"facing":[192],"scenarios":[194],"models.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
