CASIA OpenIR

浏览/检索结果: 共17条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Learning to Adapt Across Dual Discrepancy for Cross-Domain Person Re-Identification 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 2, 页码: 1963-1980
作者:  Luo, Chuanchen;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(2539Kb)  |  收藏  |  浏览/下载:224/67  |  提交时间:2023/03/20
Person re-identification  domain adaptation  cross-domain mixup  camera-aware learning  self-paced learning  
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:314/56  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Combining 2D texture and 3D geometry features for Reliable iris presentation attack detection using light field focal stack 期刊论文
IET BIOMETRICS, 2022, 页码: 10
作者:  Luo, Zhengquan;  Wang, Yunlong;  Liu, Nianfeng;  Wang, Zilei
Adobe PDF(1236Kb)  |  收藏  |  浏览/下载:234/34  |  提交时间:2022/11/14
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:263/50  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
Memory-Modulated Transformer Network for Heterogeneous Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2095-2109
作者:  Luo, Mandi;  Wu, Haoxue;  Huang, Huaibo;  He, Weizan;  He, Ran
Adobe PDF(4712Kb)  |  收藏  |  浏览/下载:353/125  |  提交时间:2022/07/25
Face recognition  Task analysis  Transformers  Encoding  Feature extraction  Image recognition  Memory modules  Heterogeneous face recognition  style transformer  memory network  
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 1513-1527
作者:  Sun, Muyi;  Wang, Jian;  Liu, Jian;  Li, Jianshu;  Chen, Tao;  Sun, Zhenan
收藏  |  浏览/下载:242/0  |  提交时间:2022/06/10
Semantics  Faces  Face recognition  Training  Noise measurement  Layout  Image synthesis  Biphasic facial age translation  noisy semantic injection  generative adversarial network  attention mechanism  feature disentanglement  
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 3, 页码: 1089-1102
作者:  Hu, Juan;  Liao, Xin;  Wang, Wei;  Qin, Zheng
收藏  |  浏览/下载:204/0  |  提交时间:2022/06/06
Videos  Information integrity  Feature extraction  Streaming media  Faces  Forensics  Social networking (online)  Video forensics  compressed Deepfake videos  frame-level stream  temporality-level stream  
Theme-Aware Aesthetic Distribution Prediction With Full-Resolution Photographs 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 15
作者:  Jia, Gengyun;  Li, Peipei;  He, Ran
Adobe PDF(10845Kb)  |  收藏  |  浏览/下载:253/37  |  提交时间:2022/06/06
Aesthetic quality assessment (AQA)  full resolution  region of image (RoM) pooling  theme  
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:277/57  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:338/39  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer