CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共6条,第1-6条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Learning pose-invariant 3D object reconstruction from single-view images 期刊论文
Neurocomputing, 2021, 卷号: 423, 页码: 407-418
作者:  Bo Peng;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(2589Kb)  |  收藏  |  浏览/下载:125/49  |  提交时间:2023/04/26
Learning 3D shape, Single view supervision, Domain confusion, Adversarial learning  
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:175/62  |  提交时间:2023/04/26
A Unified Framework for High Fidelity Face Swap and Expression Reenactment 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 6, 页码: 3673-3684
作者:  Peng, Bo;  Fan, Hongxing;  Wang, Wei;  Dong, Jing;  Lyu, Siwei
收藏  |  浏览/下载:166/0  |  提交时间:2022/07/25
Faces  Task analysis  Videos  Shape  Three-dimensional displays  Face recognition  Information integrity  Face swap  expression reenactment  3DMM  video manipulation  
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:600/191  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:661/263  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation  
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 10, 页码: 1653-1666
作者:  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6342Kb)  |  收藏  |  浏览/下载:444/133  |  提交时间:2015/08/12
Image Forensics  Local Tampering Detection  Double Quantization  Graph Cut