CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                            
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:39/13  |  提交时间:2024/06/21
MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation 会议论文
, 线上会议, 6.19-6.25
作者:  Tianxiang Ma;  Bo Peng;  Wei Wang;  Jing Dong
Adobe PDF(3431Kb)  |  收藏  |  浏览/下载:19/6  |  提交时间:2024/05/29
SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer 会议论文
, Cheng du, China, 2021-10
作者:  Yueming Lyu;  Jing Dong;  Bo Peng;  Wei Wang;  Tieniu Tan
Adobe PDF(2943Kb)  |  收藏  |  浏览/下载:34/9  |  提交时间:2024/05/28
DFGC 2021: A deepfake game competition 会议论文
, China, 2021
作者:  Peng, Bo;  Fan, Hongxing;  Wang, Wei;  Dong, Jing;  Li, Yuezun;  Lyu, Siwei;  Li, Qi;  Sun, Zhenan
Adobe PDF(2001Kb)  |  收藏  |  浏览/下载:98/13  |  提交时间:2024/02/23
Learning pose-invariant 3D object reconstruction from single-view images 期刊论文
Neurocomputing, 2021, 卷号: 423, 页码: 407-418
作者:  Bo Peng;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(2589Kb)  |  收藏  |  浏览/下载:158/60  |  提交时间:2023/04/26
Learning 3D shape, Single view supervision, Domain confusion, Adversarial learning  
Exploring adversarial fake images on face manifold 会议论文
, Nashville, TN, USA, 20-25 June 2021
作者:  Li Dongze;  Wang Wei;  Fan Hongxing;  Dong Jing
Adobe PDF(4424Kb)  |  收藏  |  浏览/下载:154/43  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:160/42  |  提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:372/46  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer