{"id":"https://openalex.org/W4415976123","doi":"https://doi.org/10.48550/arxiv.2504.02898","title":"A Practical Synthesis of Detecting AI-Generated Textual, Visual, and Audio Content","display_name":"A Practical Synthesis of Detecting AI-Generated Textual, Visual, and Audio Content","publication_year":2025,"publication_date":"2025-04-02","ids":{"openalex":"https://openalex.org/W4415976123","doi":"https://doi.org/10.48550/arxiv.2504.02898"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2504.02898","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2504.02898","pdf_url":"https://arxiv.org/pdf/2504.02898","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2504.02898","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090184412","display_name":"Lele Cao","orcid":"https://orcid.org/0000-0002-5680-9031"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cao, Lele","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5090184412"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.2964000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.2964000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.1251000016927719,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.10859999805688858,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6686999797821045},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.4636000096797943},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.45509999990463257},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.45320001244544983},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.44999998807907104},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4052000045776367},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.34200000762939453}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6686999797821045},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6460000276565552},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.4636000096797943},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.45509999990463257},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.45320001244544983},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.44999998807907104},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.40959998965263367},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4052000045776367},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.32710000872612},{"id":"https://openalex.org/C512654426","wikidata":"https://www.wikidata.org/wiki/Q19652","display_name":"Public domain","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.30709999799728394},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2815000116825104},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C2986663376","wikidata":"https://www.wikidata.org/wiki/Q9465","display_name":"Ethical issues","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.263700008392334},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.258899986743927}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2504.02898","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2504.02898","pdf_url":"https://arxiv.org/pdf/2504.02898","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2504.02898","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2504.02898","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2504.02898","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2504.02898","pdf_url":"https://arxiv.org/pdf/2504.02898","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Advances":[0],"in":[1,129,173],"AI-generated":[2,53,179],"content":[3,70,171],"have":[4],"led":[5],"to":[6,49,109,139,169],"wide":[7],"adoption":[8],"of":[9,35,46,118,176],"large":[10],"language":[11],"models,":[12],"diffusion-based":[13],"visual":[14],"generators,":[15],"and":[16,32,51,56,64,75,87,93,114,125,133,143,156,167],"synthetic":[17],"audio":[18,57],"tools.":[19],"However,":[20],"these":[21],"developments":[22],"raise":[23],"critical":[24,116],"concerns":[25],"about":[26],"misinformation,":[27],"copyright":[28],"infringement,":[29],"security":[30],"threats,":[31],"the":[33,115,174],"erosion":[34],"public":[36],"trust.":[37],"In":[38],"this":[39,136],"paper,":[40],"we":[41],"explore":[42],"an":[43],"extensive":[44],"range":[45],"methods":[47],"designed":[48],"detect":[50],"mitigate":[52],"textual,":[54],"visual,":[55],"content.":[58],"We":[59,78,101,145],"begin":[60],"by":[61,147],"discussing":[62,148],"motivations":[63],"potential":[65],"impacts":[66],"associated":[67],"with":[68],"AI-based":[69],"generation,":[71],"including":[72,151],"real-world":[73],"risks":[74],"ethical":[76,157],"dilemmas.":[77],"then":[79],"outline":[80],"detection":[81],"techniques":[82],"spanning":[83],"observation-based":[84],"strategies,":[85],"linguistic":[86],"statistical":[88],"analysis,":[89],"model-based":[90],"pipelines,":[91],"watermarking":[92],"fingerprinting,":[94],"as":[95,97],"well":[96],"emergent":[98],"ensemble":[99],"approaches.":[100],"also":[102],"present":[103],"new":[104],"perspectives":[105],"on":[106],"robustness,":[107],"adaptation":[108],"rapidly":[110],"improving":[111],"generative":[112],"architectures,":[113],"role":[117],"human-in-the-loop":[119],"verification.":[120],"By":[121],"surveying":[122],"state-of-the-art":[123],"research":[124],"highlighting":[126],"case":[127],"studies":[128],"academic,":[130],"journalistic,":[131],"legal,":[132],"industrial":[134],"contexts,":[135],"paper":[137],"aims":[138],"inform":[140],"robust":[141],"solutions":[142],"policymaking.":[144],"conclude":[146],"open":[149],"challenges,":[150],"adversarial":[152],"transformations,":[153],"domain":[154],"generalization,":[155],"concerns,":[158],"thereby":[159],"offering":[160],"a":[161],"holistic":[162],"guide":[163],"for":[164],"researchers,":[165],"practitioners,":[166],"regulators":[168],"preserve":[170],"authenticity":[172],"face":[175],"increasingly":[177],"sophisticated":[178],"media.":[180]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
