×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [18]
THE STATE KEY L... [11]
Authors
ZHOU JIANTAO [16]
TANG YUAN YAN [2]
CHEN CHUN LUNG P... [1]
CHEN LONG [1]
Document Type
Conference pape... [11]
Journal article [11]
Date Issued
2024 [5]
2023 [3]
2022 [3]
2021 [4]
2020 [1]
2019 [2]
More...
Language
英語English [19]
Source Publication
Proceedings of t... [3]
ACM Transactions... [2]
IEEE TRANSACTION... [2]
IEEE Transaction... [2]
Proceedings of t... [2]
2019 Internation... [1]
More...
Indexed By
SCIE [10]
CPCI-S [7]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 22
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples
Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:
Liu, Jun
;
Zhou, Jiantao
;
Tian, Jinyu
;
Sun, Weiwei
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
5.2
/
4.9
|
Submit date:2024/06/05
Deep Neural Networks
Encryption
Image Classification
Privacy-preserving
Regroup Median Loss for Combating Label Noise
Conference paper
Li, Fengpeng, Li, Kemou, Tian, Jinyu, Zhou, Jiantao. Regroup Median Loss for Combating Label Noise[C], 2024, 13474-13482.
Authors:
Li, Fengpeng
;
Li, Kemou
;
Tian, Jinyu
;
Zhou, Jiantao
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2024/05/16
Ml: Classification And Regression
Ml: Representation Learning
DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space
Conference paper
Liu, Jun, Zhou, Jiantao, Zeng, Jiandian, Tian, Jinyu. DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space[C], 2024, 3666-3674.
Authors:
Liu, Jun
;
Zhou, Jiantao
;
Zeng, Jiandian
;
Tian, Jinyu
Favorite
|
TC[WOS]:
0
TC[Scopus]:
1
|
Submit date:2024/05/16
Cv: Adversarial Attacks & Robustness
Ml: Adversarial Learning & Robustness
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training
Journal article
Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li. Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34(3), 1857-1872.
Authors:
Yuanman Li
;
Liangpei Hu
;
Li Dong
;
Haiwei Wu
;
Jinyu Tian
; et al.
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
IF:
8.3
/
7.1
|
Submit date:2023/08/28
Inpainting Forensics
Constrained Adversarial Training
Generalizability
Deep Neural Networks
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning
Journal article
Wu, Haiwei, Zhou, Jiantao, Zhang, Xinyu, Tian, Jinyu, Sun, Weiwei. Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 148-162.
Authors:
Wu, Haiwei
;
Zhou, Jiantao
;
Zhang, Xinyu
;
Tian, Jinyu
;
Sun, Weiwei
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
IF:
6.3
/
7.3
|
Submit date:2024/05/16
Camera Model Identification
Deep Neural Networks
Online Social Networks
Robustness
Generating Robust Adversarial Examples against Online Social Networks (OSNs)
Journal article
Jun Liu, Jiantao Zhou, Haiwei Wu, Weiwei Sun, Jinyu Tian. Generating Robust Adversarial Examples against Online Social Networks (OSNs)[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 20(4), 1-26.
Authors:
Jun Liu
;
Jiantao Zhou
;
Haiwei Wu
;
Weiwei Sun
;
Jinyu Tian
Favorite
|
|
Submit date:2024/08/08
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Conference paper
Yiming Chen, Jinyu Tian, Xiangyu Chen, Jiantao Zhou. Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution[C], USA:IEEE Computer Society, 2023, 8123-8132.
Authors:
Yiming Chen
;
Jinyu Tian
;
Xiangyu Chen
;
Jiantao Zhou
Favorite
|
TC[WOS]:
2
TC[Scopus]:
6
|
Submit date:2023/03/14
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption
Journal article
Tian, Jinyu, Zhou, Jiantao, Duan, Jia. Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption[J]. IEEE Transactions on Services Computing, 2023, 16(1), 343 - 355.
Authors:
Tian, Jinyu
;
Zhou, Jiantao
;
Duan, Jia
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
IF:
5.5
/
5.9
|
Submit date:2022/05/13
Cnn
Computational Modeling
Convolutional Neural Networks
Encryption
Hierarchical Service
Model Protection
Noise Reduction
Selective Encryption
Task Analysis
Training
Watermarking
Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion
Journal article
Li, Yuanman, Zhou, Jiantao, Chen, Junyang, Tian, Jinyu, Dong, Li, Li, Xia. Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion[J]. IEEE Transactions on Computational Social Systems, 2022, 9(6), 1830-1841.
Authors:
Li, Yuanman
;
Zhou, Jiantao
;
Chen, Junyang
;
Tian, Jinyu
;
Dong, Li
; et al.
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
IF:
4.5
/
4.6
|
Submit date:2022/05/13
Data Models
Distributed Databases
Entropy
Gaussian Noise
Information-theoretic Learning (Itl)
Laplace Equations
Noise Of Social Data
Optimization
Robustness
Robustness Of Social Systems
Surveillance Video Modeling.
Robust Image Forgery Detection over Online Social Network Shared Images
Conference paper
Haiwei Wu, Jiantao Zhou, Jinyu Tian, Jun Liu. Robust Image Forgery Detection over Online Social Network Shared Images[C], 2022, 13440-13449.
Authors:
Haiwei Wu
;
Jiantao Zhou
;
Jinyu Tian
;
Jun Liu
Adobe PDF
|
Favorite
|
TC[WOS]:
24
TC[Scopus]:
41
|
Submit date:2022/07/07
Transparency
Fairness
Accountability
Privacy And Ethics In Vision
Computer Vision For Social Good
Vision Applications And Systems