AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning f...AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning for model training and the generation and correction of AI-generated images according to an AI users’instructions to the AI prompt and their parameter settings,the paper analyzes the initial legal viewpoint that as AI-generated images do not have a human creator,they cannot apply for copyright.It goes on to examine the rapid development of AI-generated image technology and the gradual adoption of more open attitudes towards the copyrightability of AI-generated images due to the influence of the promoting technological advancement approach.On the basis of this,the paper further analyzes the criteria for assessing the copyrightability of AI-generated images,by using measures such as originality,human authorship,and intellectual achievements,aiming to clarify the legal basis for the copyrightability of AI-generated images and enhancing the copyright protection system.展开更多
The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign ent...The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.展开更多
In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans...In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t...1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.展开更多
The authors regret for the missing of copyright attributions in the captions of Fig.1(d)and Fig.7 in the original publication.Please note the corrections do not affect the experimental results and conclusions.In the o...The authors regret for the missing of copyright attributions in the captions of Fig.1(d)and Fig.7 in the original publication.Please note the corrections do not affect the experimental results and conclusions.In the originally published article,Fig.1(d)and Fig.7 were adapted from previously published figures in the cited literature.展开更多
The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These con...The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.展开更多
Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,t...Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.展开更多
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ...Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.展开更多
This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis...This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.展开更多
Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved percepti...Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry.展开更多
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
文摘AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning for model training and the generation and correction of AI-generated images according to an AI users’instructions to the AI prompt and their parameter settings,the paper analyzes the initial legal viewpoint that as AI-generated images do not have a human creator,they cannot apply for copyright.It goes on to examine the rapid development of AI-generated image technology and the gradual adoption of more open attitudes towards the copyrightability of AI-generated images due to the influence of the promoting technological advancement approach.On the basis of this,the paper further analyzes the criteria for assessing the copyrightability of AI-generated images,by using measures such as originality,human authorship,and intellectual achievements,aiming to clarify the legal basis for the copyrightability of AI-generated images and enhancing the copyright protection system.
文摘The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.
文摘In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors.
文摘The authors regret for the missing of copyright attributions in the captions of Fig.1(d)and Fig.7 in the original publication.Please note the corrections do not affect the experimental results and conclusions.In the originally published article,Fig.1(d)and Fig.7 were adapted from previously published figures in the cited literature.
基金supported in part by NSFC under Grant Nos.62402379,U22A2029 and U24A20237.
文摘The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.
基金supported by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.
基金supported in part by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant 102.04-2021.57in part by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.
文摘This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.
文摘Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry.
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.