已选(0)清除
条数/页: 排序方式: |
| Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文 IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13 作者: Bo Wang; Fei Yu; Fei Wei; Yi Li; Wei Wang![](/image/person.jpg)
Adobe PDF(1364Kb)  |   收藏  |  浏览/下载:39/13  |  提交时间:2024/06/21 |
| Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356 作者: Weinan Guan; Wei Wang ; Jing Dong ; Bo Peng![](/image/person.jpg)
Adobe PDF(1989Kb)  |   收藏  |  浏览/下载:34/9  |  提交时间:2024/06/21 Deepfake detection forgery texture patterns |
| Memory-based Error Label Suppression for Embodied Self-Improving Object Detection 会议论文 , 意大利巴里, 2024-8-28 作者: Deng JR(邓杰仁) ; Zhang HJ(张好剑) ; Hu JH(胡建华) ; Wang YK(王云宽)![](/image/person.jpg)
Adobe PDF(2603Kb)  |   收藏  |  浏览/下载:34/12  |  提交时间:2024/06/20 |
| Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication: Progress, Insights and Trends 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 7, 页码: 1539-1556 作者: Weihao Song; Zidong Wang; Zhongkui Li; Jianan Wang; Qing-Long Han
Adobe PDF(1858Kb)  |   收藏  |  浏览/下载:31/9  |  提交时间:2024/06/07 Communication constraints maximum correntropy filter networked nonlinear filtering particle filter sample-based approximation unscented Kalman filter |
| DRAN: Detailed Region-Adaptive Normalization for Conditional Image Synthesis 期刊论文 IEEE Transactions on Multimedia, 2024, 页码: 14 作者: Yueming Lyu ; Peibin Chen; Jingna Sun; Bo Peng; Xu Wang; Jing Dong![](/image/person.jpg)
Adobe PDF(20492Kb)  |   收藏  |  浏览/下载:28/6  |  提交时间:2024/05/28 |
| InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer 期刊论文 IEEE Transactions on Circuits and Systems for Video Technology, 2024, 页码: 13 作者: Yueming Lyu ; Yue Jiang ; Bo Peng ; Jing Dong![](/image/person.jpg)
Adobe PDF(6334Kb)  |   收藏  |  浏览/下载:27/6  |  提交时间:2024/05/28 |
| 3D-Aware Adversarial Makeup Generation for Facial Privacy Protection 期刊论文 IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, 页码: 16 作者: Yueming Lyu ; Yue Jiang ; Ziwen He ; Bo Peng; Yunfan Liu ; Jing Dong![](/image/person.jpg)
Adobe PDF(13973Kb)  |   收藏  |  浏览/下载:39/12  |  提交时间:2024/05/28 |
| AUNet: Learning Relations Between Action Units for Face Forgery Detection 会议论文 , 加拿大温哥华温哥华会议中心, 2023 年 6 月 18 日 – 2023 年 6 月 22 日 作者: Bai WM(白炜铭) ; Liu YF(刘雨帆) ; Zhang ZP(张志鹏); Li B(李兵) ; Hu WM(胡卫明)![](/image/person.jpg)
Adobe PDF(5917Kb)  |   收藏  |  浏览/下载:43/3  |  提交时间:2024/05/28 |
| 基于一致性分析的伪造图像鉴别方法研究 学位论文 , 2024 作者: 白炜铭![](/image/person.jpg)
Adobe PDF(17362Kb)  |   收藏  |  浏览/下载:32/1  |  提交时间:2024/05/27 伪造图像鉴别 计算机生成图像鉴别 伪造人脸鉴别 一致性线索 |
| Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文 IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667 作者: Li Duan; Yangyang Sun; Wei Ni; Weiping Ding; Jiqiang Liu; Wei Wang
Adobe PDF(2148Kb)  |   收藏  |  浏览/下载:146/40  |  提交时间:2023/07/20 Blockchain cross-chain defense distributed private key control hash-locking notary security threats sidechain/relay |