• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Tq
  • Home
  • / ...
  • /Journals
  • /Tq

Call for Papers: Special Issue on AI Content Generation and Detection

Important dates 

  • Submission deadline: 30 April 2026
  • First-round decision notification: 20 July 2026
  • Revised manuscript due: 30 August 2026
  • Final decision notification: 20 October 2026

AI-generated contents have taken the world by storm. AI-generated contents now spans a wide range, including AI-generated videos, images, audios, and texts. Fueled by the accessibility of large-scale media datasets and the maturity of AI generation technologies, currently one may effortlessly create massive forgery images, videos, audios, and texts beyond human discernibility. These medias play important roles in filmmaking, electronic games, image editing, and education. It is thus not surprising that generative AI is redefining the video industry and many other industries. However, despite their positive widespread use, malicious actors can leverage advances in AI generation technologies for nefarious purposes. They may forge high-quality artifacts to perform scam, generate and propagate fake pornography, and challenge face recognition systems, to name a few. To alleviate the abuse of AI generation technologies, it is of paramount importance to develop sound detection and tracking approaches.

This special issue aims to bring together the cutting-edge advancements in AI content generation and detection, diving deeper into AI image generation, AI video generation, AI audio generation, AI text generation, and AI generated content detection tasks. We are interested in AI-Generated data covering a wide scope, from images, audios, texts, to videos. We expect the contributions focusing on innovative techniques for AI content generation and detection, including methodologies and algorithmic approaches to solve theoretical and practical problems. We also encourage the research on potentially impactful and related technologies.

The topics of interest for the Special Issue encompass, but are not limited to:

  • AI-Driven Content Generation
  • AI-Generated Content Detection
  • Face Forgery Detection and Localization
  • Cross-modal Content Generation 
  • Human Motion Synthesis
  • Explainability and Interpretability in AI Content Generation
  • Privacy Preservation Techniques in AI-Generated Content
  • Bias and Fairness in AI Generated Content
  • Detection of Sensitive Elements in AI-Generated Content
  • Content Verification and Authenticity Detection
  • Safety Guardrails for Generative AI Models
  • Synthesis Attribution and Reasoning
  • Content Filtering and Moderation in Social Media Platforms
  • AI-Generated Content Transmission Tracking
  • Regulatory Frameworks and Legal Implications for AI Content Generation
  • AI-Generated Content Watermarking
  • AI-Generated Content Fingerprinting
  • Adversarial Multimedia Forensics
  • Multimedia Manipulation Detection
  • AI-Generated Content Retrieval

Submission Guidelines:

For author information and guidelines on submission criteria, please visit the Author Information Page. Please submit papers through the IEEE Author Portal, and be sure to select the special-issue name. Manuscripts should be written in English and describe original research. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, The review process will comply with the standard review process of the IEEE Transactions on Dependable and Secure Computing journal. All submitted papers will be evaluated on the basis of relevance, significance of contribution, and technical quality.

In addition to submitting your paper to IEEE Transactions on Dependable and Secure Computing, you are also encouraged to upload the data related to your paper to IEEE DataPort. IEEE DataPort is IEEE's data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility. Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive. Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission. Thank you!


Questions?

Contact the guest editors at:

  • Yang Zhang (Lead Guest Editor), CISPA Helmholtz Center for Information Security, Germany
  • Lorenzo Cavallaro, University College London, United Kingdom
  • Zhongjie Ba, Zhejiang University, China
  • Zhenguang Liu, Zhejiang University, China
  • Roger Zimmermann, National University of Singapore, Singapore
LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter