CASIA OpenIR

浏览/检索结果: 共11条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2024, 页码: 13
作者:  Yueming Lyu;  Yue Jiang;  Bo Peng;  Jing Dong
Adobe PDF(6334Kb)  |  收藏  |  浏览/下载:11/2  |  提交时间:2024/05/28
Artificial Identification: A Novel Privacy Framework for Federated Learning Based on Blockchain 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 1-10
作者:  Ouyang,Liwei;  Wang,Fei-Yue;  Tian,Yonglin;  Jia,Xiaofeng;  Qi,Hongwei;  Wang,Ge
Adobe PDF(1574Kb)  |  收藏  |  浏览/下载:106/21  |  提交时间:2023/06/06
A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 10, 页码: 1879-1882
作者:  Ya Wang;  Xinming Chen;  Lei Shi;  Yuhua Cheng;  Houjun Wang
Adobe PDF(771Kb)  |  收藏  |  浏览/下载:172/52  |  提交时间:2022/09/08
Inconsistency-Aware Wavelet Dual-Branch Network for Face Forgery Detection 期刊论文
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 卷号: 3, 期号: 3, 页码: 308-319
作者:  jia geng yun;  zheng mei song;  hu chuan rui;  ma xin;  xu yu ting;  liu luo qi;  deng ya feng;  he ran
Adobe PDF(2690Kb)  |  收藏  |  浏览/下载:211/46  |  提交时间:2022/06/14
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:346/41  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
A hybrid convolutional architecture for accurate image manipulation localization at the pixel-level 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 期号: 80, 页码: 23377–23392
作者:  Zhang, Yixuan;  Zhang, Jiguang;  Xu, Shibiao
Adobe PDF(1369Kb)  |  收藏  |  浏览/下载:288/60  |  提交时间:2021/03/08
Manipulation localization  Top-down detection  Bottom-up segmentation  DenseCRFs  
Exposing splicing forgery based on color temperature estimation 期刊论文
FORENSIC SCIENCE INTERNATIONAL, 2018, 卷号: 289, 页码: 1-11
作者:  Sun, Peng;  Lang, Yubo;  Fan, Shu;  Shen, Zhe;  Liu, Lei;  Shan, Daguo;  Peng, Silong
收藏  |  浏览/下载:105/0  |  提交时间:2019/12/16
Image authentication  Manipulation localization  Color shift  Color temperature estimation  
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 11, 页码: 2772-2787
作者:  Quan, Weize;  Wang, Kai;  Yan, Dong-Ming;  Zhang, Xiaopeng
浏览  |  Adobe PDF(8950Kb)  |  收藏  |  浏览/下载:473/149  |  提交时间:2018/10/01
Image forensics  natural image  computer-generated image  convolutional neural network  robustness  local-to-global strategy  visualization  
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:613/192  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 138, 页码: 280-293
作者:  Qin, Chuan;  Ji, Ping;  Zhang, Xinpeng;  Dong, Jing;  Wang, Jinwei
收藏  |  浏览/下载:209/0  |  提交时间:2017/07/18
Fragile Watermarking  Overlapping Embedding  Pixel-wise Recovery  Tampering Localization