CASIA OpenIR

浏览/检索结果: 共19条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2024, 页码: 13
作者:  Yueming Lyu;  Yue Jiang;  Bo Peng;  Jing Dong
Adobe PDF(6334Kb)  |  收藏  |  浏览/下载:3/0  |  提交时间:2024/05/28
面向轻量级深度伪造检测的无数据模型压缩 期刊论文
中国图象图形学报, 2023, 卷号: 28, 期号: 3, 页码: 820-835
作者:  卓文琦;  李东泽;  王伟;  董晶
Adobe PDF(12898Kb)  |  收藏  |  浏览/下载:159/43  |  提交时间:2023/05/31
深度伪造检测  虚假人脸  模型压缩  低位宽表示  无数据蒸馏  轻量级模型  
MonoPoly: A practical monocular 3D object detector 期刊论文
Pattern Recognition, 2022, 卷号: 132, 期号: 108967, 页码: 1-10
作者:  He Guan;  Chunfeng Song;  Zhaoxiang Zhang;  Tieniu Tan
Adobe PDF(2584Kb)  |  收藏  |  浏览/下载:255/136  |  提交时间:2023/05/04
Dynamic video mix-up for cross-domain action recognition 期刊论文
Neurocomputing, 2022, 卷号: 471, 期号: 2022, 页码: 358-368
作者:  Han Wu;  Chunfeng Song;  Shaolong Yue;  Zhenyu Wang;  Jun Xiao;  Yanyang Liu
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:85/37  |  提交时间:2023/05/04
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:137/38  |  提交时间:2023/04/26
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:259/50  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
DVG-Face: Dual Variational Generation for Heterogeneous Face Recognition 期刊论文
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 卷号: 44, 期号: 6, 页码: 2938-2952
作者:  Fu, Chaoyou;  Wu, Xiang;  Hu, Yibo;  Huang, Huaibo;  He, Ran
Adobe PDF(2900Kb)  |  收藏  |  浏览/下载:237/89  |  提交时间:2022/06/14
Inconsistency-Aware Wavelet Dual-Branch Network for Face Forgery Detection 期刊论文
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 卷号: 3, 期号: 3, 页码: 308-319
作者:  jia geng yun;  zheng mei song;  hu chuan rui;  ma xin;  xu yu ting;  liu luo qi;  deng ya feng;  he ran
Adobe PDF(2690Kb)  |  收藏  |  浏览/下载:196/40  |  提交时间:2022/06/14
A Reconstruction-based Visual-Acoustic-Semantic Embedding Method for Speech-Image Retrieval 期刊论文
IEEE Transactions on Multimedia, 2022, 页码: 14
作者:  Cheng, Wenlong;  Tang, Wei;  Huang, Yan;  Luo, Yiwen;  Wang, Liang
Adobe PDF(1628Kb)  |  收藏  |  浏览/下载:249/91  |  提交时间:2022/06/14
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:335/38  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer