The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign ent...The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.展开更多
In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans...In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.展开更多
The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These con...The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.展开更多
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ...Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.展开更多
This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis...This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.展开更多
Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved percepti...Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry.展开更多
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
文摘The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.
文摘In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.
基金supported in part by NSFC under Grant Nos.62402379,U22A2029 and U24A20237.
文摘The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.
基金supported in part by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant 102.04-2021.57in part by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.
文摘This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.
文摘Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry.
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.