Publications
2024
2023
- CVPRWExposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing ModelsIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Biometrics Workshops, Jun 2023
- CJIG
2022
- Robust Face-Swap Detection Based on 3D Facial Shape InformationIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2022
- 电子学报
2021
- CJIG
- A New Globally Adaptive K-Nearest Neighbor Classifier Based on Local Mean OptimizationSoft Computing, Oct 2021
2020
- A New Fast Search Algorithm for Exact K-Nearest Neighbors Based on Optimal Triangle-Inequality-Based Check StrategyKnowledge-Based Systems, Feb 2020
- 视觉对抗样本生成技术概述信息安全学报, Feb 2020
2019
- PRCVAn Accurate LSTM Based Video Heart Rate Estimation MethodIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
- Any-to-One Face Reenactment Based on Conditional Generative Adversarial NetworkIn 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2019, Nov 2019
- New Graph-Theoretic Approach to Social SteganographyIS and T International Symposium on Electronic Imaging Science and Technology, Jan 2019
- On the Generalization of GAN Image ForensicsIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
- Feature Pyramid Deep Matching and Localization Network for Image ForensicsIn 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018 - Proceedings, Nov 2019
2018
- Feature Learning for Steganalysis Using Convolutional Neural NetworksMultimedia Tools and Applications, Aug 2018
- Adaptive Histogram Shifting Based Reversible Data HidingIn Smart Innovation, Systems and Technologies, Aug 2018
- Ensemble Reversible Data HidingIn Proceedings - International Conference on Pattern Recognition, Aug 2018
- Reversible Embedding to Covers Full of BoundariesIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2018
2017
- Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of FacesIn IEEE Conference on Computer Vision and Pattern Recognition Workshops, Jul 2017
- High Capacity Reversible Data Hiding with Contrast EnhancementIn Communications in Computer and Information Science, Jul 2017
- Quantization Based Watermarking Methods against Valumetric DistortionsInternational Journal of Automation and Computing, Dec 2017
- Image Forgery Detection Based on Semantic Image UnderstandingIn Communications in Computer and Information Science, Dec 2017
2016
- Automatic Detection of 3D Lighting Inconsistencies via a Facial Landmark Based Morphable ModelIn Proceedings - International Conference on Image Processing, ICIP, Sep 2016
- Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary TasksIn Lecture Notes in Electrical Engineering, Sep 2016
- Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural NetworkIn Proceedings - International Conference on Image Processing, ICIP, Sep 2016
- An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted FusionIn Lecture Notes in Electrical Engineering, Sep 2016
2015
- Improved 3D Lighting Environment Estimation for Image Forgery DetectionIn 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings, Nov 2015
- Deep Learning for Steganalysis via Convolutional Neural NetworksIn Media Watermarking, Security, and Forensics 2015, Mar 2015
- Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition SystemIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Mar 2015
- Local Correlation Pattern for Image SteganalysisIn 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Jul 2015
2014
- An Effective Watermarking Method against Valumetric DistortionsIn 2014 IEEE International Conference on Image Processing, ICIP 2014, Oct 2014
- Improved Robust Watermarking Based on Rational Dither ModulationIn Communications in Computer and Information Science, Oct 2014
2013
- CASIA Image Tampering Detection Evaluation DatabaseIn 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings, Jul 2013
2011
- Exploring DCT Coefficient Quantization Effect for Image Tampering LocalizationIn 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Nov 2011
- Tampered Region Localization of Digital Color Images Based on JPEG Compression NoiseIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Dec 2011
2010
- Image Tampering Detection Based on Stationary Distribution of Markov ChainIn Proceedings - International Conference on Image Processing, ICIP, Sep 2010
2009
- Effective Image Splicing Detection Based on Image ChromaIn Proceedings - International Conference on Image Processing, ICIP, Nov 2009
- A Survey of Passive Image Tampering DetectionIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nov 2009