CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共11条,第1-10条 帮助

限定条件                            
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:39/13  |  提交时间:2024/06/21
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356
作者:  Weinan Guan;  Wei Wang;  Jing Dong;  Bo Peng
Adobe PDF(1989Kb)  |  收藏  |  浏览/下载:34/9  |  提交时间:2024/06/21
Deepfake detection  forgery texture patterns  
Learning pose-invariant 3D object reconstruction from single-view images 期刊论文
Neurocomputing, 2021, 卷号: 423, 页码: 407-418
作者:  Bo Peng;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(2589Kb)  |  收藏  |  浏览/下载:158/60  |  提交时间:2023/04/26
Learning 3D shape, Single view supervision, Domain confusion, Adversarial learning  
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:209/73  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:160/42  |  提交时间:2023/04/26
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:360/65  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 3, 页码: 1089-1102
作者:  Hu, Juan;  Liao, Xin;  Wang, Wei;  Qin, Zheng
收藏  |  浏览/下载:221/0  |  提交时间:2022/06/06
Videos  Information integrity  Feature extraction  Streaming media  Faces  Forensics  Social networking (online)  Video forensics  compressed Deepfake videos  frame-level stream  temporality-level stream  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:372/46  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:628/196  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:693/270  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation