CASIA OpenIR

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                        
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:48/16  |  提交时间:2024/06/21
Semi-supervised Temporal Action Proposal Generation via Exploiting 2-d Proposal Map 期刊论文
IEEE Transactions on Multimedia, 2021, 页码: 3624 - 3635
作者:  Wang, Weining;  Lin, Tianwei;  He, Dongliang;  Li, Fu;  Wen, Shilei;  Wang, Liang;  Liu, Jing
Adobe PDF(4851Kb)  |  收藏  |  浏览/下载:165/27  |  提交时间:2023/05/03
Semi-supervised learning  proposal map oriented mean-teacher  pseudo label  
Learning pose-invariant 3D object reconstruction from single-view images 期刊论文
Neurocomputing, 2021, 卷号: 423, 页码: 407-418
作者:  Bo Peng;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(2589Kb)  |  收藏  |  浏览/下载:170/64  |  提交时间:2023/04/26
Learning 3D shape, Single view supervision, Domain confusion, Adversarial learning  
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:170/44  |  提交时间:2023/04/26
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:322/65  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:382/48  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
Richly Activated Graph Convolutional Network for Robust Skeleton-Based Action Recognition 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 5, 页码: 1915-1925
作者:  Song, Yi-Fan;  Zhang, Zhang;  Shan, Caifeng;  Wang, Liang
Adobe PDF(3381Kb)  |  收藏  |  浏览/下载:422/68  |  提交时间:2021/06/15
Skeleton  Robustness  Noise measurement  Three-dimensional displays  Degradation  Standards  Feature extraction  Action recognition  skeleton  activation map  graph convolutional network  occlusion  jittering  
Controllable Multi-Attribute Editing of High-Resolution Face Images 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 期号: 0, 页码: 1410-1423
作者:  Deng, Qiyao;  Li, Qi;  Cao, Jie;  Liu, Yunfan;  Sun, Zhenan
Adobe PDF(8442Kb)  |  收藏  |  浏览/下载:321/46  |  提交时间:2021/03/02
Faces  Image resolution  Face recognition  Wavelet transforms  Generative adversarial networks  Computational modeling  Face attribute editing  Face synthesis  Generative adversarial network