Publications
2024
- Improving Generalization of Deepfake Detectors by Imposing Gradient RegularizationIEEE Transactions on Information Forensics and Security, 2024
- AAAIAE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head SynthesisIn Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2024
- IEEE SPLRobust Adversarial Watermark Defending Against GAN Synthesization AttackIEEE Signal Processing Letters, Mar 2024
- AAAILearning Dense Correspondence for NeRF-Based Face ReenactmentIn Proceedings of the AAAI Conference on Artificial Intelligence, Mar 2024
- Adversarial Attacks on Scene Graph GenerationIEEE Transactions on Information Forensics and Security, Mar 2024
2023
- SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery DetectionIEEE Transactions on Circuits and Systems for Video Technology, Feb 2023
- PRTemporal Sparse Adversarial Attack on Sequence-Based Gait RecognitionPattern Recognition, Sep 2023
- IJCBDFGC 2022: The Second DeepFake Game CompetitionIn 2022 IEEE International Joint Conference on Biometrics (IJCB), Oct 2023
- IJCBDFGC-VRA: DeepFake Game Competition on Visual Realism AssessmentIn 2023 IEEE International Joint Conference on Biometrics (IJCB), Sep 2023
- 中国科学
- ACM MMContext-Aware Talking-Head Video EditingIn Proceedings of the 31st ACM International Conference on Multimedia, Oct 2023
- ICASSPDesigning a 3D-Aware StyleNeRF Encoder for Face EditingIn ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Jun 2023
- CVPRWExposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing ModelsIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Biometrics Workshops, Jun 2023
- NeurocomputingProtecting by Attacking: A Personal Information Protecting Method with Cross-Modal Adversarial ExamplesNeurocomputing, Sep 2023
- CJIG
2022
- ICPRDefending Against Deepfakes with Ensemble Adversarial PerturbationIn Proceedings - International Conference on Pattern Recognition, Aug 2022
- Robust Face-Swap Detection Based on 3D Facial Shape InformationIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2022
- ACM MMDefeating DeepFakes via Adversarial Visual ReconstructionIn Proceedings of the 30th ACM International Conference on Multimedia, Oct 2022
- SPIC
- 电子学报
- Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional NetworkIEEE Transactions on Circuits and Systems for Video Technology, Mar 2022
- ICPRContrastive Knowledge Transfer for Deepfake Detection with Limited DataIn Proceedings - International Conference on Pattern Recognition, Aug 2022
- ICPRAdaDeId: Adjust Your Identity Attribute FreelyIn Proceedings - International Conference on Pattern Recognition, Aug 2022
- PRCVCounterfactual Image Enhancement for Explanation of Face Swap DeepfakesIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2022
- A Unified Framework for High Fidelity Face Swap and Expression ReenactmentIEEE Transactions on Circuits and Systems for Video Technology, Jun 2022
- Guided Erasable Adversarial Attack (GEAA) Toward Shared Data ProtectionIEEE Transactions on Information Forensics and Security, Jun 2022
- CCBRIrisGuard: Image Forgery Detection for Iris Anti-spoofingIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Jun 2022
2021
- ICAASPA Features Decoupling Method for Multiple Manipulations Identification in Image Operation ChainsIn ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Jun 2021
- CVPRExploring Adversarial Fake Images on Face ManifoldIn Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Jun 2021
- CJIG
- ACM MMSOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup TransferIn MM 2021 - Proceedings of the 29th ACM International Conference on Multimedia, Oct 2021
- CVPRMUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image GenerationIn Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Jun 2021
- A New Globally Adaptive K-Nearest Neighbor Classifier Based on Local Mean OptimizationSoft Computing, Oct 2021
- IJCBDFGC 2021: A Deepfake Game CompetitionIn 2021 IEEE International Joint Conference on Biometrics, IJCB 2021, Aug 2021
- NeurocomputingLearning Pose-Invariant 3D Object Reconstruction from Single-View ImagesNeurocomputing, Jan 2021
- Adversarial Analysis for Source Camera IdentificationIEEE Transactions on Circuits and Systems for Video Technology, Jan 2021
- Are You Confident That You Have Successfully Generated Adversarial Examples?IEEE Transactions on Circuits and Systems for Video Technology, Jun 2021
2020
- A New Fast Search Algorithm for Exact K-Nearest Neighbors Based on Optimal Triangle-Inequality-Based Check StrategyKnowledge-Based Systems, Feb 2020
- 视觉对抗样本生成技术概述信息安全学报, Feb 2020
2019
- PRCVAn Accurate LSTM Based Video Heart Rate Estimation MethodIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
- Any-to-One Face Reenactment Based on Conditional Generative Adversarial NetworkIn 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2019, Nov 2019
- New Graph-Theoretic Approach to Social SteganographyIS and T International Symposium on Electronic Imaging Science and Technology, Jan 2019
- On the Generalization of GAN Image ForensicsIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Feb 2019
- Feature Pyramid Deep Matching and Localization Network for Image ForensicsIn 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018 - Proceedings, Nov 2019
2018
- ICPRDeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm RetrievalIn Proceedings - International Conference on Pattern Recognition, Aug 2018
- Image Forensics Based on Planar Contact Constraints of 3D ObjectsIEEE Transactions on Information Forensics and Security, Feb 2018
- Feature Learning for Steganalysis Using Convolutional Neural NetworksMultimedia Tools and Applications, Aug 2018
- Adaptive Histogram Shifting Based Reversible Data HidingIn Smart Innovation, Systems and Technologies, Aug 2018
- Ensemble Reversible Data HidingIn Proceedings - International Conference on Pattern Recognition, Aug 2018
- Reversible Embedding to Covers Full of BoundariesIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Aug 2018
2017
- ICMEMFC: A Multi-Scale Fully Convolutional Approach for Visual Instance RetrievalIn 2017 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2017, Jul 2017
- Optimized 3D Lighting Environment Estimation for Image Forgery DetectionIEEE Transactions on Information Forensics and Security, Feb 2017
- Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of FacesIn IEEE Conference on Computer Vision and Pattern Recognition Workshops, Jul 2017
- High Capacity Reversible Data Hiding with Contrast EnhancementIn Communications in Computer and Information Science, Jul 2017
- Quantization Based Watermarking Methods against Valumetric DistortionsInternational Journal of Automation and Computing, Dec 2017
- Image Forgery Detection Based on Semantic Image UnderstandingIn Communications in Computer and Information Science, Dec 2017
2016
- Automatic Detection of 3D Lighting Inconsistencies via a Facial Landmark Based Morphable ModelIn Proceedings - International Conference on Image Processing, ICIP, Sep 2016
- Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary TasksIn Lecture Notes in Electrical Engineering, Sep 2016
- Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural NetworkIn Proceedings - International Conference on Image Processing, ICIP, Sep 2016
- An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted FusionIn Lecture Notes in Electrical Engineering, Sep 2016
2015
- ChinaSIPDetection of Computer Generated Faces in Videos Based on Pulse SignalIn 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Jul 2015
- Improved 3D Lighting Environment Estimation for Image Forgery DetectionIn 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings, Nov 2015
- Deep Learning for Steganalysis via Convolutional Neural NetworksIn Media Watermarking, Security, and Forensics 2015, Mar 2015
- Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition SystemIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Mar 2015
- Local Correlation Pattern for Image SteganalysisIn 2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Jul 2015
- ICIPRobust Steganalysis Based on Training Set Construction and Ensemble Classifiers WeightingIn Proceedings - International Conference on Image Processing, ICIP, Sep 2015
2014
- An Effective Watermarking Method against Valumetric DistortionsIn 2014 IEEE International Conference on Image Processing, ICIP 2014, Oct 2014
- Exploring DCT Coefficient Quantization Effects for Local Tampering DetectionIEEE Transactions on Information Forensics and Security, Oct 2014
- Improved Robust Watermarking Based on Rational Dither ModulationIn Communications in Computer and Information Science, Oct 2014
2013
- CASIA Image Tampering Detection Evaluation DatabaseIn 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings, Jul 2013
- ICIPVideo Steganalysis Based on the Constraints of Motion VectorsIn 2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings, Sep 2013
2011
- Exploring DCT Coefficient Quantization Effect for Image Tampering LocalizationIn 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Nov 2011
- Tampered Region Localization of Digital Color Images Based on JPEG Compression NoiseIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Dec 2011
2010
- Image Tampering Detection Based on Stationary Distribution of Markov ChainIn Proceedings - International Conference on Image Processing, ICIP, Sep 2010
2009
- IWDWMulti-Class Blind Steganalysis Based on Image Run-Length AnalysisIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sep 2009
- IWDWRun-Length and Edge Statistics Based Approach for Image Splicing DetectionIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sep 2009
- Effective Image Splicing Detection Based on Image ChromaIn Proceedings - International Conference on Image Processing, ICIP, Nov 2009
- A Survey of Passive Image Tampering DetectionIn Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nov 2009