CASIA OpenIR

浏览/检索结果: 共27条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Boosting end-to-end multi-object tracking and person search via knowledge distillation 会议论文
, China, 2021-10
作者:  Zhang, Wei;  He, Lingxiao;  Chen, Peng;  Liao, Xingyu;  Liu, Wu;  Li, Qi;  Sun, Zhenan
Adobe PDF(3267Kb)  |  收藏  |  浏览/下载:132/47  |  提交时间:2024/02/23
Multi-caption text-to-face synthesis: Dataset and algorithm 会议论文
, China, 2021-10
作者:  Sun, Jianxin;  Li, Qi;  Wang, Weining;  Zhao, Jian;  Sun, Zhenan
Adobe PDF(3208Kb)  |  收藏  |  浏览/下载:108/25  |  提交时间:2024/02/23
Bita-net: Bi-temporal attention network for facial video forgery detection 会议论文
, China, 2021-08
作者:  Ru, Yiwei;  Zhou, Wanting;  Liu, Yunfan;  Sun, Jianxin;  Li, Qi
Adobe PDF(1728Kb)  |  收藏  |  浏览/下载:101/14  |  提交时间:2024/02/23
DFGC 2021: A deepfake game competition 会议论文
, China, 2021
作者:  Peng, Bo;  Fan, Hongxing;  Wang, Wei;  Dong, Jing;  Li, Yuezun;  Lyu, Siwei;  Li, Qi;  Sun, Zhenan
Adobe PDF(2001Kb)  |  收藏  |  浏览/下载:92/12  |  提交时间:2024/02/23
One shot face swapping on megapixels 会议论文
, USA, 2021
作者:  Zhu, Yuhao;  Li, Qi;  Wang, Jian;  Xu, Chengzhong;  Sun, Zhenan
Adobe PDF(7327Kb)  |  收藏  |  浏览/下载:87/32  |  提交时间:2024/02/23
A3GAN: An Attribute-Aware Attentive Generative Adversarial Network for Face Aging 期刊论文
IEEE Transactions on Information Forensics and Security, 2021, 卷号: 16, 页码: 2776-2790
作者:  Yunfan Liu;  Qi Li;  Zhenan Sun;  Tieniu Tan
Adobe PDF(4213Kb)  |  收藏  |  浏览/下载:80/20  |  提交时间:2023/06/20
DVG-Face: Dual Variational Generation for Heterogeneous Face Recognition 期刊论文
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 卷号: 44, 期号: 6, 页码: 2938-2952
作者:  Fu, Chaoyou;  Wu, Xiang;  Hu, Yibo;  Huang, Huaibo;  He, Ran
Adobe PDF(2900Kb)  |  收藏  |  浏览/下载:259/93  |  提交时间:2022/06/14
An Empirical Study of Graph Contrastive Learning 会议论文
, Online, 2021-12
作者:  Zhu, Yanqiao;  Xu, Yichen;  Liu, Qiang;  Wu, Shu
Adobe PDF(475Kb)  |  收藏  |  浏览/下载:249/66  |  提交时间:2022/06/13
Graph Contrastive Learning with Adaptive Augmentation 会议论文
, Online, 2021-4
作者:  Zhu, Yanqiao;  Xu, Yichen;  Yu, Feng;  Liu, Qiang;  Wu, Shu;  Wang, Liang
Adobe PDF(2989Kb)  |  收藏  |  浏览/下载:177/15  |  提交时间:2022/06/13
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:367/45  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer