×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [7]
Institute of Chi... [1]
Faculty of Healt... [1]
THE STATE KEY LA... [1]
Authors
ZHOU YICONG [7]
LU JIAHONG [1]
Document Type
Journal article [7]
Other [1]
Date Issued
2024 [1]
2023 [3]
2022 [2]
2021 [1]
2016 [1]
Language
英語English [8]
Source Publication
IEEE Transaction... [2]
Autophagy [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [7]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-8 of 8
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs
Journal article
Yin, Qilin, Lu, Wei, Cao, Xiaochun, Luo, Xiangyang, Zhou, Yicong, Huang, Jiwu. Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs[J]. International Journal of Computer Vision, 2024.
Authors:
Yin, Qilin
;
Lu, Wei
;
Cao, Xiaochun
;
Luo, Xiangyang
;
Zhou, Yicong
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
11.6
/
14.5
|
Submit date:2024/07/04
Audio-visual Model
Graph Neural Networks
Heterogeneous Graphs
Multimodal Deepfake Classification
Detection of Deepfake Videos Using Long-Distance Attention
Journal article
Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. Detection of Deepfake Videos Using Long-Distance Attention[J]. IEEE Transactions on Neural Networks and Learning Systems, 2023, 35(7), 9366-9379.
Authors:
Wei Lu
;
Lingyi Liu
;
Bolin Zhang
;
Junwei Luo
;
Xianfeng Zhao
; et al.
Favorite
|
TC[WOS]:
4
TC[Scopus]:
9
IF:
10.2
/
10.4
|
Submit date:2023/08/03
Attention Mechanism
Deepfake Detection
Deepfakes
Face Manipulation
Faces
Forgery
Semantics
Spatial And Temporal Artifacts
Task Analysis
Time-domain Analysis
Transformers
Anti-rounding Image Steganography with Separable Fine-tuned Network
Journal article
Yin,Xiaolin, Wu,Shaowu, Wang,Ke, Lu,Wei, Zhou,Yicong, Huang,Jiwu. Anti-rounding Image Steganography with Separable Fine-tuned Network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(11), 7066-7079.
Authors:
Yin,Xiaolin
;
Wu,Shaowu
;
Wang,Ke
;
Lu,Wei
;
Zhou,Yicong
; et al.
Favorite
|
TC[WOS]:
4
TC[Scopus]:
5
IF:
8.3
/
7.1
|
Submit date:2023/08/03
Anti-rounding
Data Mining
Decoding
Feature Extraction
Generative Adversarial Networks
Generators
Image Steganography
Precision Loss
Separable Fine-tuned Network
Steganography
Training
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems
Journal article
Wang, Shen, Zhang, Zhaoyang, Zhu, Guopu, Zhang, Xinpeng, Zhou, Yicong, Huang, Jiwu. Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 351 - 364.
Authors:
Wang, Shen
;
Zhang, Zhaoyang
;
Zhu, Guopu
;
Zhang, Xinpeng
;
Zhou, Yicong
; et al.
Favorite
|
TC[WOS]:
14
TC[Scopus]:
18
IF:
6.3
/
7.3
|
Submit date:2023/01/30
Adversarial Example
Automatic Speech Recognition
Black-box Attack
Monte Carlo Tree Search
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding
Journal article
Lu, Wei, Chen, Junjia, Zhang, Junhong, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secure Halftone Image Steganography Based on Feature Space and Layer Embedding[J]. IEEE Transactions on Cybernetics, 2022, 52(6), 5001-5014.
Authors:
Lu, Wei
;
Chen, Junjia
;
Zhang, Junhong
;
Huang, Jiwu
;
Weng, Jian
; et al.
Favorite
|
TC[WOS]:
7
TC[Scopus]:
8
IF:
9.4
/
10.3
|
Submit date:2022/08/03
Data Hiding
Feature Space
Halftone Image
Steganography
Syndrome-trellis Codes (Stcs)
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders
Journal article
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 978-991.
Authors:
Chen, Bing
;
Lu, Wei
;
Huang, Jiwu
;
Weng, Jian
;
Zhou, Yicong
Favorite
|
TC[WOS]:
37
TC[Scopus]:
55
IF:
7.0
/
6.8
|
Submit date:2022/05/17
Encrypted Images
Multiple Data-hiders
Reversible Data Hiding
Secret Sharing
Robust Estimation of Upscaling Factor on Double JPEG Compressed Images
Journal article
Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun-Qing Shi. Robust Estimation of Upscaling Factor on Double JPEG Compressed Images[J]. IEEE Transactions on Cybernetics, 2021, 52(10), 10814-10826.
Authors:
Wei Lu
;
Qin Zhang
;
Shangjun Luo
;
Yicong Zhou
;
Jiwu Huang
; et al.
Favorite
|
TC[WOS]:
11
TC[Scopus]:
8
IF:
9.4
/
10.3
|
Submit date:2022/05/13
Detectors
Estimation
Forensics
Frequency-domain Analysis
Image Coding
Image Forensics
Image Resampling Detection
Jpeg Block Artifacts
Robustness
Scaling Factor Estimation.
Transform Coding
Erratum to: Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition) (Autophagy, 12, 1, 1-222, 10.1080/15548627.2015.1100356
Other
2016-01-01
Authors:
Klionsky, Daniel J.
;
Abdelmohsen, Kotb
;
Abe, Akihisa
;
Abedin, Md Joynal
;
Abeliovich, Hagai
; et al.
Favorite
|
TC[WOS]:
407
TC[Scopus]:
24
|
Submit date:2022/07/20