CASIA OpenIR

浏览/检索结果: 共5条,第1-5条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Adversarial Attacks on Scene Graph Generation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:  Zhao, Mengnan;  Zhang, Lihe;  Wang, Wei;  Kong, Yuqiu;  Yin, Baocai
收藏  |  浏览/下载:6/0  |  提交时间:2024/07/03
Task analysis  Object detection  Windows  Visualization  Mirrors  Predictive models  Perturbation methods  Scene graph generation  adversarial attack  bounding box relabeling  two-step weighted attack  
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2497-2507
作者:  Ajian, Liu;  Chenxu, Zhao;  Zitong, Yu;  Jun, Wan;  Anyang, Su;  Xing, Liu;  Zichang, Tan;  Sergio, Escalera;  Junliang, Xing;  Yanyan, Liang;  Guodong, Guo;  Zhen, Lei;  Stan, Z., Li;  Du, Zhang
Adobe PDF(3455Kb)  |  收藏  |  浏览/下载:52/20  |  提交时间:2024/06/03
Surveillance Face Anti-Spoofing 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 1535-1546
作者:  Fang, Hao;  Liu, Ajian;  Wan, Jun;  Escalera, Sergio;  Zhao, Chenxu;  Zhang, Xu;  Li, Stan Z.;  Lei, Zhen
Adobe PDF(3072Kb)  |  收藏  |  浏览/下载:94/7  |  提交时间:2024/02/22
Face anti-spoofing  dataset  surveillance scenes  
FM-ViT: Flexible Modal Vision Transformers for Face Anti-Spoofing 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 卷号: 18, 页码: 4775-4786
作者:  Liu, Ajian;  Tan, Zichang;  Yu, Zitong;  Zhao, Chenxu;  Wan, Jun;  Liang, Yanyan;  Lei, Zhen;  Zhang, Du;  Li, Stan Z.;  Guo, Guodong
Adobe PDF(10966Kb)  |  收藏  |  浏览/下载:182/2  |  提交时间:2023/11/17
Face anti-spoofing  flexible-modal testing  vision transformer  mutual-attention  fusion-attention  
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:295/60  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition