CASIA OpenIR

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2022, 卷号: 32, 期号: 6, 页码: 3880-3894
作者:  Li, Zhenbang;  Shi, Yaya;  Gao, Jin;  Wang, Shaoru;  Li, Bing;  Liang, Pengpeng;  Hu, Weiming
Adobe PDF(4397Kb)  |  收藏  |  浏览/下载:6/5  |  提交时间:2024/06/21
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:190/66  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:145/38  |  提交时间:2023/04/26
Research on Double Watermarking Algorithm Based on PDF Document Structure 会议论文
, Beijing, China, October 30-31, 2020
作者:  Weijuan Zhao;  Hu Guan;  Ying Huang;  Shuwu Zhang
Adobe PDF(436Kb)  |  收藏  |  浏览/下载:145/37  |  提交时间:2022/04/08
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:352/41  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
Image Forgery Detection Based on Semantic Image Understanding 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ye, Kui;  Dong, Jing;  Wang, Wei;  Xu, Jindong;  Tan, Tieniu
浏览  |  Adobe PDF(602Kb)  |  收藏  |  浏览/下载:444/158  |  提交时间:2017/09/20
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:615/192  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:681/267  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation  
Multiple-image encryption by compressive holography 期刊论文
APPLIED OPTICS, 2012, 卷号: 51, 期号: 7, 页码: 1000-1009
作者:  Di, Hong;  Zheng, Kangfeng;  Zhang, Xin;  Lam, Edmund Y.;  Kim, Taegeun;  Kim, You Seok;  Poon, Ting-Chung;  Zhou, Changhe;  Xin Zhang
浏览  |  Adobe PDF(2881Kb)  |  收藏  |  浏览/下载:336/91  |  提交时间:2015/09/18
Osh  
Image Fusion Based on the Delta(-1) - TV0 Energy Function 期刊论文
ENTROPY, 2014, 卷号: 16, 期号: 11, 页码: 6099-6115
作者:  Xie, Qiwei;  Ma, Chao;  Guo, Chunzhao;  John, Vijay;  Mita, Seiichi;  Long, Qian;  Chao Ma
Adobe PDF(3780Kb)  |  收藏  |  浏览/下载:347/78  |  提交时间:2015/08/12
Image Fusion  Inverse Transform Of The Laplace Operator (Delta(-1))  Sparse Norm  Total Variation