CASIA OpenIR

浏览/检索结果: 共6条,第1-6条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:47/15  |  提交时间:2024/06/21
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356
作者:  Weinan Guan;  Wei Wang;  Jing Dong;  Bo Peng
Adobe PDF(1989Kb)  |  收藏  |  浏览/下载:45/14  |  提交时间:2024/06/21
Deepfake detection  forgery texture patterns  
Supar Sparse 3D Object Detection 期刊论文
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, 卷号: 45, 期号: 10, 页码: 12490-12505
作者:  Fan L(范略);  Yang YX(杨禹雪);  Wang F(王峰);  Wang NY(王乃岩);  Zhang ZX(张兆翔)
Adobe PDF(5476Kb)  |  收藏  |  浏览/下载:45/6  |  提交时间:2024/06/18
目标检测  点云  自动驾驶  
A Reconstruction-based Visual-Acoustic-Semantic Embedding Method for Speech-Image Retrieval 期刊论文
IEEE Transactions on Multimedia, 2022, 页码: 14
作者:  Cheng, Wenlong;  Tang, Wei;  Huang, Yan;  Luo, Yiwen;  Wang, Liang
Adobe PDF(1628Kb)  |  收藏  |  浏览/下载:278/99  |  提交时间:2022/06/14
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:320/64  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:379/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer