{"id":"https://openalex.org/W6888574394","doi":"https://doi.org/10.21227/btq9-8846","title":"\"Adversarial Dataset for Image Forgery Localization\"","display_name":"\"Adversarial Dataset for Image Forgery Localization\"","publication_year":2025,"publication_date":"2025-06-18","ids":{"openalex":"https://openalex.org/W6888574394","doi":"https://doi.org/10.21227/btq9-8846"},"language":"en","primary_location":{"id":"doi:10.21227/btq9-8846","is_oa":true,"landing_page_url":"https://doi.org/10.21227/btq9-8846","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/btq9-8846","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Rongxuan Peng","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rongxuan Peng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Shunquan Tan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Xianbo Mo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Alex C. Kot","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alex C. Kot","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Jiwu Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8276000022888184},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8098999857902527},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5748000144958496},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.46000000834465027},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4302999973297119},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.3741999864578247},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.36500000953674316}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8276000022888184},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8098999857902527},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7120000123977661},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6933000087738037},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5896000266075134},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5748000144958496},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46000000834465027},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4302999973297119},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.3741999864578247},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.36500000953674316},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C2987933465","wikidata":"https://www.wikidata.org/wiki/Q141130","display_name":"Image manipulation","level":3,"score":0.3278999924659729},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3246999979019165},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26759999990463257},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26660001277923584},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.26100000739097595}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/btq9-8846","is_oa":true,"landing_page_url":"https://doi.org/10.21227/btq9-8846","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/btq9-8846","is_oa":true,"landing_page_url":"https://doi.org/10.21227/btq9-8846","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"score":0.5835732817649841,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"\"We":[0],"present":[1],"an":[2],"adversarial":[3,57],"dataset":[4,16,72],"tailored":[5],"for":[6],"evaluating":[7],"the":[8],"robustness":[9,79],"of":[10,76,90],"image":[11],"forgery":[12,26,36,68,77],"localization":[13,37,69,78],"models.":[14],"This":[15],"includes":[17],"adversarially":[18],"crafted":[19],"forged":[20],"images":[21,29,58],"and":[22,44,55,87],"their":[23],"corresponding":[24],"pixel-level":[25],"masks.":[27],"Adversarial":[28],"are":[30,59],"generated":[31],"by":[32],"attacking":[33],"four":[34,48],"state-of-the-art":[35],"models":[38],"\\u2014":[39,46],"including":[40],"MVSS-Net,":[41],"IF-OSN,":[42],"HDF-Net":[43],"CoDE":[45],"across":[47],"widely-used":[49],"datasets:":[50],"Casia":[51],"v1,":[52],"IMD20,":[53],"Columbia,":[54],"MISD.The":[56],"designed":[60],"to":[61],"preserve":[62],"perceptual":[63],"quality":[64],"while":[65],"significantly":[66],"degrading":[67],"performance.":[70],"&nbsp;This":[71],"enables":[73],"systematic":[74],"benchmarking":[75],"under":[80],"white-box":[81],"attacks,":[82],"supporting":[83],"both":[84],"academic":[85],"research":[86],"practical":[88],"evaluation":[89],"secure":[91],"forensic":[92],"models.&nbsp;\"":[93]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
