学术论文

(2022). Transferable Sparse Adversarial Attack. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

PDF 引用 代码 项目 海报

(2022). Defeating DeepFakes via Adversarial Visual Reconstruction. Proceedings of the 30th ACM International Conference on Multimedia.

引用 项目 项目

(2021). MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

PDF 引用 代码 项目 视频

(2021). Exploring Adversarial Fake Images on Face Manifold. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR, Oral).

PDF 引用 项目 项目 海报

(2021). A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings.

引用 项目 DOI URL

(2019). Feature Pyramid Deep Matching and Localization Network for Image Forensics. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

引用 项目 DOI

(2019). Any-to-One Face Reenactment Based on Conditional Generative Adversarial Network. 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

引用 DOI

(2019). On the Generalization of GAN Image Forensics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 项目 DOI

(2019). An Accurate LSTM Based Video Heart Rate Estimation Method. Chinese Conference on Pattern Recognition and Computer Vision (PRCV).

引用 DOI

(2018). Ensemble Reversible Data Hiding. Proceedings - International Conference on Pattern Recognition.

引用 DOI

(2018). SSGAN: Secure Steganography Based on Generative Adversarial Networks. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2018). Reversible Embedding to Covers Full of Boundaries. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2017). Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

引用 项目 DOI

(2017). MFC: A Multi-Scale Fully Convolutional Approach for Visual Instance Retrieval. 2017 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2017.

引用 DOI

(2017). Recent Advances in Image Steganalysis. Journal of Image and Signal Processing.

引用 DOI

(2015). Improved 3D Lighting Environment Estimation for Image Forgery Detection. IEEE International Workshop on Information Forensics and Security.

引用 项目 DOI

(2015). Local Correlation Pattern for Image Steganalysis. 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings.

引用 DOI

(2015). Detection of Computer Generated Faces in Videos Based on Pulse Signal. IEEE China Summit and International Conference on Signal and Information Processing.

引用 项目 DOI

(2015). Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition System. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2013). Video Steganalysis Based on the Constraints of Motion Vectors. 2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings.

引用 DOI

(2013). CASIA Image Tampering Detection Evaluation Database. 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings.

引用 项目 DOI

(2011). Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2011). Exploring DCT Coefficient Quantization Effect for Image Tampering Localization. 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011.

引用 DOI

(2010). Image Tampering Detection Based on Stationary Distribution of Markov Chain. Proceedings - International Conference on Image Processing, ICIP.

引用 DOI

(2009). Effective Image Splicing Detection Based on Image Chroma. Proceedings - International Conference on Image Processing, ICIP.

引用 DOI

(2009). Run-Length and Edge Statistics Based Approach for Image Splicing Detection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2009). Multi-Class Blind Steganalysis Based on Image Run-Length Analysis. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI

(2009). A Survey of Passive Image Tampering Detection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

引用 DOI