CASIA OpenIR

浏览/检索结果: 共20条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
MonoPoly: A practical monocular 3D object detector 期刊论文
Pattern Recognition, 2022, 卷号: 132, 期号: 108967, 页码: 1-10
作者:  He Guan;  Chunfeng Song;  Zhaoxiang Zhang;  Tieniu Tan
Adobe PDF(2584Kb)  |  收藏  |  浏览/下载:252/136  |  提交时间:2023/05/04
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:134/37  |  提交时间:2023/04/26
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:254/49  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
A Reconstruction-based Visual-Acoustic-Semantic Embedding Method for Speech-Image Retrieval 期刊论文
IEEE Transactions on Multimedia, 2022, 页码: 14
作者:  Cheng, Wenlong;  Tang, Wei;  Huang, Yan;  Luo, Yiwen;  Wang, Liang
Adobe PDF(1628Kb)  |  收藏  |  浏览/下载:244/91  |  提交时间:2022/06/14
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:329/36  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
Learning 3D Human Shape and Pose from Dense Body Parts 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 卷号: 0, 期号: 0, 页码: 0
作者:  Zhang, Hongwen;  Cao, Jie;  Lu, Guo;  Ouyang, Wanli;  Sun, Zhenan
Adobe PDF(4759Kb)  |  收藏  |  浏览/下载:193/45  |  提交时间:2021/06/16
3D human shape and pose estimation  decompose-and-aggregate network  position-aided rotation feature refinement  part-based dropout  
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 卷号: 29, 期号: 11, 页码: 3341-3355
作者:  Qin, Chuan;  Zhou, Qing;  Cao, Fang;  Dong, Jing;  Zhang, Xinpeng
收藏  |  浏览/下载:275/0  |  提交时间:2020/03/30
Image coding  Encryption  Image reconstruction  Receivers  Transforms  Cloud computing  Lossy compression  image encryption  image reconstruction  image inpainting  
Reversible data hiding in encrypted image with separable capability and high embedding capacity 期刊论文
INFORMATION SCIENCES, 2018, 卷号: 465, 页码: 285-304
作者:  Qin, Chuan;  He, Zhihong;  Luo, Xiangyang;  Dong, Jing
收藏  |  浏览/下载:319/0  |  提交时间:2019/07/12
Reversible data hiding  Encrypted image  Embedding rate  Image quality  
Spatiotemporal Distilled Dense-Connectivity Network for Video Action Recognition 期刊论文
Pattern Recognition, 2019, 卷号: 10, 期号: 20, 页码: 100-130
作者:  Wangli Hao;  Zhaoxiang Zhang
浏览  |  Adobe PDF(2496Kb)  |  收藏  |  浏览/下载:404/148  |  提交时间:2019/04/19
Two-stream  Action Recognition  Dense-connectivity  Knowledge Distillation  
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:601/191  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model