CASIA OpenIR

浏览/检索结果: 共11条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts 会议论文
, Niagara Falls, Canada, 2024-6
作者:  Li, Yang;  Yang, Songlin;  Wang, Wei;  He, Ziwen;  Peng, Bo;  Dong, Jing
Adobe PDF(7605Kb)  |  收藏  |  浏览/下载:30/9  |  提交时间:2024/06/24
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356
作者:  Weinan Guan;  Wei Wang;  Jing Dong;  Bo Peng
Adobe PDF(1989Kb)  |  收藏  |  浏览/下载:43/14  |  提交时间:2024/06/21
Deepfake detection  forgery texture patterns  
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:216/75  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:164/43  |  提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:378/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
High Capacity Reversible Data Hiding with Contrast Enhancement 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
Adobe PDF(1752Kb)  |  收藏  |  浏览/下载:393/119  |  提交时间:2017/09/20
Adaptive Histogram Shifting Based Reversible Data Hiding 会议论文
, Matsue, Shimane, Japan, August 12-15, 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
Adobe PDF(13654Kb)  |  收藏  |  浏览/下载:410/50  |  提交时间:2017/09/20
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:634/198  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:696/271  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation  
UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS 会议论文
International Conference on Image Processing (ICIP), Orando, USA, 2012
作者:  Xu, Xikai;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(341Kb)  |  收藏  |  浏览/下载:307/76  |  提交时间:2015/08/19