Publications

2024

  1. Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization
    Weinan Guan, Wei WangJing Dong, and 1 more author
    IEEE Transactions on Information Forensics and Security, 2024
  2. AAAI
    AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis
    Dongze Li, Kang Zhao, Wei Wang, and 4 more authors
    In Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2024
  3. IEEE SPL
    Robust Adversarial Watermark Defending Against GAN Synthesization Attack
    Shengwang Xu, Tong Qiao, Ming Xu, and 2 more authors
    IEEE Signal Processing Letters, Mar 2024
  4. AAAI
    Learning Dense Correspondence for NeRF-Based Face Reenactment
    Songlin Yang, Wei Wang, Yushi Lan, and 4 more authors
    In Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2024
  5. Adversarial Attacks on Scene Graph Generation
    Mengnan Zhao, Lihe Zhang, Wei Wang, and 2 more authors
    IEEE Transactions on Information Forensics and Security, Mar 2024

2023

  1. SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection
    Jiaxin Chen, Xin Liao, Wei Wang, and 3 more authors
    IEEE Transactions on Circuits and Systems for Video Technology, Feb 2023
  2. PR
    Temporal Sparse Adversarial Attack on Sequence-Based Gait Recognition
    Ziwen He, Wei WangJing Dong, and 1 more author
    Pattern Recognition, Sep 2023
  3. IJCB
    DFGC 2022: The Second DeepFake Game Competition
    Bo Peng, Wei Xiang, Yue Jiang, and 5 more authors
    In 2022 IEEE International Joint Conference on Biometrics (IJCB), Oct 2023
  4. IJCB
    DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment
    Bo Peng, Xianyun Sun, Caiyong Wang, and 22 more authors
    In 2023 IEEE International Joint Conference on Biometrics (IJCB), Sep 2023
  5. 中国科学
    面向联邦学习的对抗样本投毒攻击
    王波,  代晓蕊,  王伟, and 3 more authors
    中国科学:信息科学, Mar 2023
  6. ACM MM
    Context-Aware Talking-Head Video Editing
    Songlin Yang, Wei Wang, Jun Ling, and 3 more authors
    In Proceedings of the 31st ACM International Conference on Multimedia, Oct 2023
  7. ICASSP
    Designing a 3D-Aware StyleNeRF Encoder for Face Editing
    Songlin Yang, Wei WangBo Peng, and 1 more author
    In ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Jun 2023
  8. CVPRW
    Exposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing Models
    Songlin Yang, Wei Wang, Chenye Xu, and 2 more authors
    In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Biometrics Workshops, Jun 2023
  9. Neurocomputing
    Protecting by Attacking: A Personal Information Protecting Method with Cross-Modal Adversarial Examples
    Mengnan Zhao, Bo Wang, Weikuo Guo, and 1 more author
    Neurocomputing, Sep 2023
  10. CJIG
    面向轻量级深度伪造检测的无数据模型压缩
    卓文琦,  李东泽,  王伟, and 1 more author
    中国图象图形学报, Sep 2023

2022

  1. ICPR
    Defending Against Deepfakes with Ensemble Adversarial Perturbation
    Weinan Guan, Ziwen He, Wei Wang, and 2 more authors
    In Proceedings - International Conference on Pattern Recognition, Aug 2022
  2. Robust Face-Swap Detection Based on 3D Facial Shape Information
    Weinan Guan, Wei WangJing Dong, and 2 more authors
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2022
  3. ACM MM
    Defeating DeepFakes via Adversarial Visual Reconstruction
    Ziwen He, Wei Wang, Weinan Guan, and 2 more authors
    In Proceedings of the 30th ACM International Conference on Multimedia, Oct 2022
  4. SPIC
    Revisiting Ensemble Adversarial Attack
    Ziwen He, Wei WangJing Dong, and 1 more author
    Signal Processing: Image Communication, Sep 2022
  5. 电子学报
    开放环境下自适应聚类优化包络的相机来源取证
    侯嘉尧,  王波,  王伟, and 1 more author
    电子学报, Sep 2022
  6. Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network
    Juan Hu, Xin Liao, Wei Wang, and 1 more author
    IEEE Transactions on Circuits and Systems for Video Technology, Mar 2022
  7. ICPR
    Contrastive Knowledge Transfer for Deepfake Detection with Limited Data
    Dongze Li, Wenqi Zhuo, Wei Wang, and 1 more author
    In Proceedings - International Conference on Pattern Recognition, Aug 2022
  8. ICPR
    AdaDeId: Adjust Your Identity Attribute Freely
    Tianxiang Ma, Dongze Li, Wei Wang, and 1 more author
    In Proceedings - International Conference on Pattern Recognition, Aug 2022
  9. PRCV
    Counterfactual Image Enhancement for Explanation of Face Swap Deepfakes
    Bo Peng, Siwei Lyu, Wei Wang, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2022
  10. A Unified Framework for High Fidelity Face Swap and Expression Reenactment
    Bo Peng, Hongxing Fan, Wei Wang, and 2 more authors
    IEEE Transactions on Circuits and Systems for Video Technology, Jun 2022
  11. Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection
    Mengnan Zhao, Bo Wang, Wei Wang, and 3 more authors
    IEEE Transactions on Information Forensics and Security, Jun 2022
  12. CCBR
    IrisGuard: Image Forgery Detection for Iris Anti-spoofing
    Wenqi Zhuo, Wei Wang, Hui Zhang, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Jun 2022

2021

  1. ICAASP
    A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains
    Jiaxin Chen, Xin Liao, Wei Wang, and 1 more author
    In ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Jun 2021
  2. CVPR
    Exploring Adversarial Fake Images on Face Manifold
    Dongze Li, Wei Wang, Hongxing Fan, and 1 more author
    In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Jun 2021
  3. CJIG
    数字媒体取证技术综述
    李晓龙,  俞能海,  张新鹏, and 5 more authors
    中国图象图形学报, Jun 2021
  4. ACM MM
    SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer
    Yueming Lyu, Jing DongBo Peng, and 2 more authors
    In MM 2021 - Proceedings of the 29th ACM International Conference on Multimedia, Oct 2021
  5. CVPR
    MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation
    Tianxiang Ma, Bo PengWei Wang, and 1 more author
    In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Jun 2021
  6. A New Globally Adaptive K-Nearest Neighbor Classifier Based on Local Mean Optimization
    Zhibin Pan, Yiwei Pan, Yidi Wang, and 1 more author
    Soft Computing, Oct 2021
  7. IJCB
    DFGC 2021: A Deepfake Game Competition
    Bo Peng, Hongxing Fan, Wei Wang, and 20 more authors
    In 2021 IEEE International Joint Conference on Biometrics, IJCB 2021, Aug 2021
  8. Neurocomputing
    Learning Pose-Invariant 3D Object Reconstruction from Single-View Images
    Bo PengWei WangJing Dong, and 1 more author
    Neurocomputing, Jan 2021
  9. Adversarial Analysis for Source Camera Identification
    Bo Wang, Mengnan Zhao, Wei Wang, and 3 more authors
    IEEE Transactions on Circuits and Systems for Video Technology, Jan 2021
  10. Are You Confident That You Have Successfully Generated Adversarial Examples?
    Bo Wang, Mengnan Zhao, Wei Wang, and 3 more authors
    IEEE Transactions on Circuits and Systems for Video Technology, Jun 2021

2020

  1. A New Fast Search Algorithm for Exact K-Nearest Neighbors Based on Optimal Triangle-Inequality-Based Check Strategy
    Yiwei Pan, Zhibin Pan, Yikun Wang, and 1 more author
    Knowledge-Based Systems, Feb 2020
  2. 视觉对抗样本生成技术概述
    王伟,  董晶,  何子文, and 1 more author
    信息安全学报, Feb 2020

2019

  1. PRCV
    An Accurate LSTM Based Video Heart Rate Estimation Method
    Mingyun Bian, Bo PengWei Wang, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
  2. Any-to-One Face Reenactment Based on Conditional Generative Adversarial Network
    Tianxiang Ma, Bo PengWei Wang, and 1 more author
    In 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2019, Nov 2019
  3. New Graph-Theoretic Approach to Social Steganography
    Hanzhou Wu, Wei WangJing Dong, and 1 more author
    IS and T International Symposium on Electronic Imaging Science and Technology, Jan 2019
  4. On the Generalization of GAN Image Forensics
    Xinsheng Xuan, Bo PengWei Wang, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
  5. Feature Pyramid Deep Matching and Localization Network for Image Forensics
    Kui Ye, Jing DongWei Wang, and 2 more authors
    In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018 - Proceedings, Nov 2019

2018

  1. ICPR
    DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval
    Jiedong Hao, Jing DongWei Wang, and 1 more author
    In Proceedings - International Conference on Pattern Recognition, Aug 2018
  2. Image Forensics Based on Planar Contact Constraints of 3D Objects
    Bo PengWei WangJing Dong, and 1 more author
    IEEE Transactions on Information Forensics and Security, Feb 2018
  3. Feature Learning for Steganalysis Using Convolutional Neural Networks
    Yinlong Qian, Jing DongWei Wang, and 1 more author
    Multimedia Tools and Applications, Aug 2018
  4. Adaptive Histogram Shifting Based Reversible Data Hiding
    Yonggwon Ri, Jing DongWei Wang, and 1 more author
    In Smart Innovation, Systems and Technologies, Aug 2018
  5. Ensemble Reversible Data Hiding
    Hanzhou Wu, Wei WangJing Dong, and 1 more author
    In Proceedings - International Conference on Pattern Recognition, Aug 2018
  6. Reversible Embedding to Covers Full of Boundaries
    Hanzhou Wu, Wei WangJing Dong, and 3 more authors
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2018

2017

  1. ICME
    MFC: A Multi-Scale Fully Convolutional Approach for Visual Instance Retrieval
    Jiedong Hao, Wei WangJing Dong, and 1 more author
    In 2017 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2017, Jul 2017
  2. Optimized 3D Lighting Environment Estimation for Image Forgery Detection
    Bo PengWei WangJing Dong, and 1 more author
    IEEE Transactions on Information Forensics and Security, Feb 2017
  3. Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
    Bo PengWei WangJing Dong, and 1 more author
    In IEEE Conference on Computer Vision and Pattern Recognition Workshops, Jul 2017
  4. High Capacity Reversible Data Hiding with Contrast Enhancement
    Yonggwon Ri, Jing DongWei Wang, and 1 more author
    In Communications in Computer and Information Science, Jul 2017
  5. Quantization Based Watermarking Methods against Valumetric Distortions
    Zai Ran Wang, Jing Dong, and Wei Wang
    International Journal of Automation and Computing, Dec 2017
  6. Image Forgery Detection Based on Semantic Image Understanding
    Kui Ye, Jing DongWei Wang, and 2 more authors
    In Communications in Computer and Information Science, Dec 2017

2016

  1. Automatic Detection of 3D Lighting Inconsistencies via a Facial Landmark Based Morphable Model
    Bo PengWei WangJing Dong, and 1 more author
    In Proceedings - International Conference on Image Processing, ICIP, Sep 2016
  2. Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary Tasks
    Yinlong Qian, Jing DongWei Wang, and 1 more author
    In Lecture Notes in Electrical Engineering, Sep 2016
  3. Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural Network
    Yinlong Qian, Jing DongWei Wang, and 1 more author
    In Proceedings - International Conference on Image Processing, ICIP, Sep 2016
  4. An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted Fusion
    Xikai Xu, Jing DongWei Wang, and 1 more author
    In Lecture Notes in Electrical Engineering, Sep 2016

2015

  1. ChinaSIP
    Detection of Computer Generated Faces in Videos Based on Pulse Signal
    Bo PengWei WangJing Dong, and 1 more author
    In 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Jul 2015
  2. Improved 3D Lighting Environment Estimation for Image Forgery Detection
    Bo PengWei WangJing Dong, and 1 more author
    In 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings, Nov 2015
  3. Deep Learning for Steganalysis via Convolutional Neural Networks
    Yinlong Qian, Jing DongWei Wang, and 1 more author
    In Media Watermarking, Security, and Forensics 2015, Mar 2015
  4. Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition System
    Zairan Wang, Jing DongWei Wang, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Mar 2015
  5. Local Correlation Pattern for Image Steganalysis
    Xikai Xu, Jing DongWei Wang, and 1 more author
    In 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Jul 2015
  6. ICIP
    Robust Steganalysis Based on Training Set Construction and Ensemble Classifiers Weighting
    Xikai Xu, Jing DongWei Wang, and 1 more author
    In Proceedings - International Conference on Image Processing, ICIP, Sep 2015

2014

  1. An Effective Watermarking Method against Valumetric Distortions
    Zairan Wang, Jing DongWei Wang, and 1 more author
    In 2014 IEEE International Conference on Image Processing, ICIP 2014, Oct 2014
  2. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
    Wei WangJing Dong, and Tieniu Tan
    IEEE Transactions on Information Forensics and Security, Oct 2014
  3. Improved Robust Watermarking Based on Rational Dither Modulation
    Zairan Wang, Jing DongWei Wang, and 1 more author
    In Communications in Computer and Information Science, Oct 2014

2013

  1. CASIA Image Tampering Detection Evaluation Database
    Jing DongWei Wang, and Tieniu Tan
    In 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings, Jul 2013
  2. ICIP
    Video Steganalysis Based on the Constraints of Motion Vectors
    Xikai Xu, Jing DongWei Wang, and 1 more author
    In 2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings, Sep 2013

2011

  1. Exploring DCT Coefficient Quantization Effect for Image Tampering Localization
    Wei WangJing Dong, and Tieniu Tan
    In 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Nov 2011
  2. Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
    Wei WangJing Dong, and Tieniu Tan
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Dec 2011

2010

  1. Image Tampering Detection Based on Stationary Distribution of Markov Chain
    Wei WangJing Dong, and Tieniu Tan
    In Proceedings - International Conference on Image Processing, ICIP, Sep 2010

2009

  1. IWDW
    Multi-Class Blind Steganalysis Based on Image Run-Length Analysis
    Jing DongWei Wang, and Tieniu Tan
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sep 2009
  2. IWDW
    Run-Length and Edge Statistics Based Approach for Image Splicing Detection
    Jing DongWei Wang, Tieniu Tan, and 1 more author
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sep 2009
  3. Effective Image Splicing Detection Based on Image Chroma
    Wei WangJing Dong, and Tieniu Tan
    In Proceedings - International Conference on Image Processing, ICIP, Nov 2009
  4. A Survey of Passive Image Tampering Detection
    Wei WangJing Dong, and Tieniu Tan
    In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nov 2009