×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [7]
THE STATE KEY LA... [3]
Authors
PUN CHI MAN [4]
CHENGZHONG XU [2]
LI LI [1]
Document Type
Journal article [6]
Conference paper [2]
Date Issued
2024 [2]
2022 [1]
2021 [3]
2020 [1]
2019 [1]
Language
英語English [8]
Source Publication
ACM Internationa... [1]
ICASSP, IEEE Int... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE/ACM Transac... [1]
Journal of Paral... [1]
More...
Indexed By
SCIE [5]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-8 of 8
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Journal article
Zeng, Yijia, Pun, Chi Man. Frequency-constrained transferable adversarial attack on image manipulation detection and localization[J]. The Visual Computer, 2024, 40(7), 4817-4828.
Authors:
Zeng, Yijia
;
Pun, Chi Man
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
3.0
/
3.0
|
Submit date:2024/07/04
Adversarial Attack
Forgery Image Detection And Localization
Reverse Image Forensics
Transferability
Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet
Journal article
Feng, Guangxu, Lao, Keng Weng, Chen, Ge. Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet[J]. IEEE Transactions on Smart Grid, 2024.
Authors:
Feng, Guangxu
;
Lao, Keng Weng
;
Chen, Ge
Favorite
|
TC[WOS]:
0
TC[Scopus]:
1
IF:
8.6
/
9.6
|
Submit date:2024/07/04
Bayes Methods
Bayesian Neural Network
Current Measurement
Deep Learning
Epistemic Uncertainty
False Data Injection Attack
Neural Networks
Out-of-distribution Detection
Training
Uncertainty
Uncertainty Calibration
Vectors
FGFL: A blockchain-based fair incentive governor for Federated Learning
Journal article
Liang Gao, Li Li, Yingwen Chen, Cheng Zhong Xu, Ming Xu. FGFL: A blockchain-based fair incentive governor for Federated Learning[J]. Journal of Parallel and Distributed Computing, 2022, 163, 283-299.
Authors:
Liang Gao
;
Li Li
;
Yingwen Chen
;
Cheng Zhong Xu
;
Ming Xu
Favorite
|
TC[WOS]:
28
TC[Scopus]:
41
IF:
3.4
/
3.4
|
Submit date:2022/05/13
Attack Detection
Federated Learning
Incentive Mechanism
FIFL: A Fair Incentive Mechanism for Federated Learning
Conference paper
Liang Gao, Li Li, Yingwen Chen, Wenli Zheng, ChengZhong Xu, Ming Xu. FIFL: A Fair Incentive Mechanism for Federated Learning[C], 2021, 326 - 329.
Authors:
Liang Gao
;
Li Li
;
Yingwen Chen
;
Wenli Zheng
;
ChengZhong Xu
; et al.
Favorite
|
TC[WOS]:
16
TC[Scopus]:
29
|
Submit date:2021/12/08
Attack Detection
Federated Learning
Incentive Mechanism
Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation
Journal article
Xiao, Yatie, Pun, Chi Man, Liu, Bo. Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation[J]. Pattern Recognition, 2021, 115, 107903.
Authors:
Xiao, Yatie
;
Pun, Chi Man
;
Liu, Bo
Favorite
|
TC[WOS]:
26
TC[Scopus]:
30
IF:
7.5
/
7.6
|
Submit date:2021/12/08
Adaptive Object-oriented Perturbation
Adversarial Attack
Object Detection
IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks
Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Li, Xiong, Jia, Weijia. IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2), 995-1008.
Authors:
Xia, Zhuoqun
;
Tan, Jingjing
;
Gu, Ke
;
Li, Xiong
;
Jia, Weijia
Favorite
|
TC[WOS]:
9
TC[Scopus]:
10
IF:
6.7
/
6.0
|
Submit date:2021/12/07
Advanced Adaptive Attack
Evolutionary Game
Evolutionary Stability Strategy
Intelligent Configuration
Intrusion Detection System.
Audio Replay Spoof Attack Detection by Joint Segment-Based Linear Filter Bank Feature Extraction and Attention-Enhanced DenseNet-BiLSTM Network
Journal article
Huang,Lian, Pun,Chi Man. Audio Replay Spoof Attack Detection by Joint Segment-Based Linear Filter Bank Feature Extraction and Attention-Enhanced DenseNet-BiLSTM Network[J]. IEEE/ACM Transactions on Audio Speech and Language Processing, 2020, 28, 1813-1825.
Authors:
Huang,Lian
;
Pun,Chi Man
Favorite
|
TC[WOS]:
30
TC[Scopus]:
42
IF:
4.1
/
4.2
|
Submit date:2021/03/11
Attack Detection
Attention-enhanced
Densenet-bilstm Network
Linear Filter Bank Feature
Replay Spoof
Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network
Conference paper
Lian Huang, Chi-Man Pun. Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network[C]:IEEE, 2019, 2567-2571.
Authors:
Lian Huang
;
Chi-Man Pun
Favorite
|
TC[WOS]:
22
TC[Scopus]:
29
|
Submit date:2021/03/11
Asv Spoof
Densenet
Lstm
Replay Spoof Attack Detection
Speaker Verification