UM

Browse/Search Results:  1-10 of 22 Help

Selected(0)Clear Items/Page:    Sort:
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
Regroup Median Loss for Combating Label Noise Conference paper
Li, Fengpeng, Li, Kemou, Tian, Jinyu, Zhou, Jiantao. Regroup Median Loss for Combating Label Noise[C], 2024, 13474-13482.
Authors:  Li, Fengpeng;  Li, Kemou;  Tian, Jinyu;  Zhou, Jiantao
Favorite | TC[Scopus]:0 | Submit date:2024/05/16
DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space Conference paper
Liu, Jun, Zhou, Jiantao, Zeng, Jiandian, Tian, Jinyu. DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space[C], 2024, 3666-3674.
Authors:  Liu, Jun;  Zhou, Jiantao;  Zeng, Jiandian;  Tian, Jinyu
Favorite | TC[Scopus]:1 | Submit date:2024/05/16
Cv: Adversarial Attacks & Robustness  Ml: Adversarial Learning & Robustness  
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training Journal article
Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li. Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34(3), 1857-1872.
Authors:  Yuanman Li;  Liangpei Hu;  Li Dong;  Haiwei Wu;  Jinyu Tian; et al.
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:8.3/7.1 | Submit date:2023/08/28
Inpainting Forensics  Constrained Adversarial Training  Generalizability  Deep Neural Networks  
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning Journal article
Wu, Haiwei, Zhou, Jiantao, Zhang, Xinyu, Tian, Jinyu, Sun, Weiwei. Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 148-162.
Authors:  Wu, Haiwei;  Zhou, Jiantao;  Zhang, Xinyu;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2024/05/16
Camera Model Identification  Deep Neural Networks  Online Social Networks  Robustness  
Generating Robust Adversarial Examples against Online Social Networks (OSNs) Journal article
Jun Liu, Jiantao Zhou, Haiwei Wu, Weiwei Sun, Jinyu Tian. Generating Robust Adversarial Examples against Online Social Networks (OSNs)[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 20(4), 1-26.
Authors:  Jun Liu;  Jiantao Zhou;  Haiwei Wu;  Weiwei Sun;  Jinyu Tian
Favorite |  | Submit date:2024/08/08
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution Conference paper
Yiming Chen, Jinyu Tian, Xiangyu Chen, Jiantao Zhou. Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution[C], USA:IEEE Computer Society, 2023, 8123-8132.
Authors:  Yiming Chen;  Jinyu Tian;  Xiangyu Chen;  Jiantao Zhou
Favorite | TC[WOS]:2 TC[Scopus]:6 | Submit date:2023/03/14
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption Journal article
Tian, Jinyu, Zhou, Jiantao, Duan, Jia. Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption[J]. IEEE Transactions on Services Computing, 2023, 16(1), 343 - 355.
Authors:  Tian, Jinyu;  Zhou, Jiantao;  Duan, Jia
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:5.5/5.9 | Submit date:2022/05/13
Cnn  Computational Modeling  Convolutional Neural Networks  Encryption  Hierarchical Service  Model Protection  Noise Reduction  Selective Encryption  Task Analysis  Training  Watermarking  
Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion Journal article
Li, Yuanman, Zhou, Jiantao, Chen, Junyang, Tian, Jinyu, Dong, Li, Li, Xia. Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion[J]. IEEE Transactions on Computational Social Systems, 2022, 9(6), 1830-1841.
Authors:  Li, Yuanman;  Zhou, Jiantao;  Chen, Junyang;  Tian, Jinyu;  Dong, Li; et al.
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:4.5/4.6 | Submit date:2022/05/13
Data Models  Distributed Databases  Entropy  Gaussian Noise  Information-theoretic Learning (Itl)  Laplace Equations  Noise Of Social Data  Optimization  Robustness  Robustness Of Social Systems  Surveillance Video Modeling.  
Robust Image Forgery Detection over Online Social Network Shared Images Conference paper
Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu. Robust Image Forgery Detection over Online Social Network Shared Images[C], 2022, 13440-13449.
Authors:  Haiwei Wu;  Jiantao Zhou;  Jinyu Tian;  Jun Liu
Adobe PDF | Favorite | TC[WOS]:23 TC[Scopus]:41 | Submit date:2022/07/07
Transparency  Fairness  Accountability  Privacy And Ethics In Vision  Computer Vision For Social Good  Vision Applications And Systems