UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs Journal article
Yin, Qilin, Lu, Wei, Cao, Xiaochun, Luo, Xiangyang, Zhou, Yicong, Huang, Jiwu. Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs[J]. International Journal of Computer Vision, 2024.
Authors:  Yin, Qilin;  Lu, Wei;  Cao, Xiaochun;  Luo, Xiangyang;  Zhou, Yicong; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:11.6/14.5 | Submit date:2024/07/04
Audio-visual Model  Graph Neural Networks  Heterogeneous Graphs  Multimodal Deepfake Classification  
Detection of Deepfake Videos Using Long-Distance Attention Journal article
Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. Detection of Deepfake Videos Using Long-Distance Attention[J]. IEEE Transactions on Neural Networks and Learning Systems, 2023, 35(7), 9366-9379.
Authors:  Wei Lu;  Lingyi Liu;  Bolin Zhang;  Junwei Luo;  Xianfeng Zhao; et al.
Favorite | TC[WOS]:4 TC[Scopus]:9  IF:10.2/10.4 | Submit date:2023/08/03
Attention Mechanism  Deepfake Detection  Deepfakes  Face Manipulation  Faces  Forgery  Semantics  Spatial And Temporal Artifacts  Task Analysis  Time-domain Analysis  Transformers  
Anti-rounding Image Steganography with Separable Fine-tuned Network Journal article
Yin,Xiaolin, Wu,Shaowu, Wang,Ke, Lu,Wei, Zhou,Yicong, Huang,Jiwu. Anti-rounding Image Steganography with Separable Fine-tuned Network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(11), 7066-7079.
Authors:  Yin,Xiaolin;  Wu,Shaowu;  Wang,Ke;  Lu,Wei;  Zhou,Yicong; et al.
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:8.3/7.1 | Submit date:2023/08/03
Anti-rounding  Data Mining  Decoding  Feature Extraction  Generative Adversarial Networks  Generators  Image Steganography  Precision Loss  Separable Fine-tuned Network  Steganography  Training  
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems Journal article
Wang, Shen, Zhang, Zhaoyang, Zhu, Guopu, Zhang, Xinpeng, Zhou, Yicong, Huang, Jiwu. Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 351 - 364.
Authors:  Wang, Shen;  Zhang, Zhaoyang;  Zhu, Guopu;  Zhang, Xinpeng;  Zhou, Yicong; et al.
Favorite | TC[WOS]:14 TC[Scopus]:18  IF:6.3/7.3 | Submit date:2023/01/30
Adversarial Example  Automatic Speech Recognition  Black-box Attack  Monte Carlo Tree Search  
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding Journal article
Lu, Wei, Chen, Junjia, Zhang, Junhong, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secure Halftone Image Steganography Based on Feature Space and Layer Embedding[J]. IEEE Transactions on Cybernetics, 2022, 52(6), 5001-5014.
Authors:  Lu, Wei;  Chen, Junjia;  Zhang, Junhong;  Huang, Jiwu;  Weng, Jian; et al.
Favorite | TC[WOS]:7 TC[Scopus]:8  IF:9.4/10.3 | Submit date:2022/08/03
Data Hiding  Feature Space  Halftone Image  Steganography  Syndrome-trellis Codes (Stcs)  
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders Journal article
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 978-991.
Authors:  Chen, Bing;  Lu, Wei;  Huang, Jiwu;  Weng, Jian;  Zhou, Yicong
Favorite | TC[WOS]:37 TC[Scopus]:55  IF:7.0/6.8 | Submit date:2022/05/17
Encrypted Images  Multiple Data-hiders  Reversible Data Hiding  Secret Sharing  
Robust Estimation of Upscaling Factor on Double JPEG Compressed Images Journal article
Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun-Qing Shi. Robust Estimation of Upscaling Factor on Double JPEG Compressed Images[J]. IEEE Transactions on Cybernetics, 2021, 52(10), 10814-10826.
Authors:  Wei Lu;  Qin Zhang;  Shangjun Luo;  Yicong Zhou;  Jiwu Huang; et al.
Favorite | TC[WOS]:11 TC[Scopus]:8  IF:9.4/10.3 | Submit date:2022/05/13
Detectors  Estimation  Forensics  Frequency-domain Analysis  Image Coding  Image Forensics  Image Resampling Detection  Jpeg Block Artifacts  Robustness  Scaling Factor Estimation.  Transform Coding  
Erratum to: Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition) (Autophagy, 12, 1, 1-222, 10.1080/15548627.2015.1100356 Other
2016-01-01
Authors:  Klionsky, Daniel J.;  Abdelmohsen, Kotb;  Abe, Akihisa;  Abedin, Md Joynal;  Abeliovich, Hagai; et al.
Favorite | TC[WOS]:407 TC[Scopus]:24 | Submit date:2022/07/20