CASIA OpenIR

浏览/检索结果: 共5条,第1-5条 帮助

已选(0)清除 条数/页:   排序方式:
Identification of image global processing operator chain based on feature decoupling 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 637, 页码: 18
作者:  Chen, Jiaxin;  Liao, Xin;  Wang, Wei;  Qin, Zheng
收藏  |  浏览/下载:70/0  |  提交时间:2023/11/17
Image forensics  Global processing operator chain  Operator chain identification  Feature decoupling  
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:285/52  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
A Unified Framework for High Fidelity Face Swap and Expression Reenactment 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 6, 页码: 3673-3684
作者:  Peng, Bo;  Fan, Hongxing;  Wang, Wei;  Dong, Jing;  Lyu, Siwei
收藏  |  浏览/下载:160/0  |  提交时间:2022/07/25
Faces  Task analysis  Videos  Shape  Three-dimensional displays  Face recognition  Information integrity  Face swap  expression reenactment  3DMM  video manipulation  
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 3, 页码: 1089-1102
作者:  Hu, Juan;  Liao, Xin;  Wang, Wei;  Qin, Zheng
收藏  |  浏览/下载:189/0  |  提交时间:2022/06/06
Videos  Information integrity  Feature extraction  Streaming media  Faces  Forensics  Social networking (online)  Video forensics  compressed Deepfake videos  frame-level stream  temporality-level stream  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:307/32  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer