CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共9条,第1-9条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:181/64  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:139/38  |  提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:338/39  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
Image Forgery Detection Based on Semantic Image Understanding 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ye, Kui;  Dong, Jing;  Wang, Wei;  Xu, Jindong;  Tan, Tieniu
浏览  |  Adobe PDF(602Kb)  |  收藏  |  浏览/下载:432/155  |  提交时间:2017/09/20
High Capacity Reversible Data Hiding with Contrast Enhancement 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
浏览  |  Adobe PDF(1752Kb)  |  收藏  |  浏览/下载:371/112  |  提交时间:2017/09/20
Adaptive Histogram Shifting Based Reversible Data Hiding 会议论文
, Matsue, Shimane, Japan, August 12-15, 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
浏览  |  Adobe PDF(13654Kb)  |  收藏  |  浏览/下载:392/50  |  提交时间:2017/09/20
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:605/191  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:669/265  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation  
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 10, 页码: 1653-1666
作者:  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6342Kb)  |  收藏  |  浏览/下载:450/133  |  提交时间:2015/08/12
Image Forensics  Local Tampering Detection  Double Quantization  Graph Cut