default search action
Wei Wang 0025
- > Home > Persons > Wei Wang 0025
Publications
- 2024
- [j29]Haixia Xu, Wei Wang, Shuailong Wang, Wei Zhou, Qi Chen, Wei Peng:
PPNet : pooling position attention network for semantic segmentation. Multim. Tools Appl. 83(12): 37007-37023 (2024) - [j28]Hai-Xia Xu, Yanbang Liu, Wei Wang, Wei Zhou, Fanxun Ding, Feng Han, Wei Peng:
TCNet: tensor and covariance attention network for semantic segmentation. Soft Comput. 28(11-12): 7575-7585 (2024) - [j27]Shengwang Xu, Tong Qiao, Ming Xu, Wei Wang, Ning Zheng:
Robust Adversarial Watermark Defending Against GAN Synthesization Attack. IEEE Signal Process. Lett. 31: 351-355 (2024) - [j26]Kai Zeng, Hui Zhang, Wei Wang, Yaonan Wang, Jianxu Mao:
Deep Stereo Network With MRF-Based Cost Aggregation. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2426-2438 (2024) - [j25]Mengnan Zhao, Lihe Zhang, Wei Wang, Yuqiu Kong, Baocai Yin:
Adversarial Attacks on Scene Graph Generation. IEEE Trans. Inf. Forensics Secur. 19: 3210-3225 (2024) - [j24]Weinan Guan, Wei Wang, Jing Dong, Bo Peng:
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization. IEEE Trans. Inf. Forensics Secur. 19: 5345-5356 (2024) - [j23]Jiacheng Liang, Yaonan Wang, Hang Zhong, Yanjie Chen, Hongwen Li, Jianxu Mao, Wei Wang:
Robust Variable Impedance Control for Aerial Compliant Interaction With Stability Guarantee. IEEE Trans. Ind. Informatics 20(3): 3351-3360 (2024) - [c57]Dongze Li, Kang Zhao, Wei Wang, Bo Peng, Yingya Zhang, Jing Dong, Tieniu Tan:
AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis. AAAI 2024: 3037-3045 - [c56]Songlin Yang, Wei Wang, Yushi Lan, Xiangyu Fan, Bo Peng, Lei Yang, Jing Dong:
Learning Dense Correspondence for NeRF-Based Face Reenactment. AAAI 2024: 6522-6530 - [i33]Xiaoxuan Han, Songlin Yang, Wei Wang, Ziwen He, Jing Dong:
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? CoRR abs/2401.00414 (2024) - [i32]Yang Li, Songlin Yang, Wei Wang, Jing Dong:
Beyond Inserting: Learning Identity Embedding for Semantic-Fidelity Personalized Diffusion Generation. CoRR abs/2402.00631 (2024) - [i31]Yang Li, Songlin Yang, Wei Wang, Ziwen He, Bo Peng, Jing Dong:
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts. CoRR abs/2404.08341 (2024) - [i30]Xiaoxuan Han, Songlin Yang, Wei Wang, Yang Li, Jing Dong:
Probing Unlearned Diffusion Models: A Transferable Adversarial Attack Perspective. CoRR abs/2404.19382 (2024) - 2023
- [j22]Mengnan Zhao, Bo Wang, Weikuo Guo, Wei Wang:
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples. Neurocomputing 551: 126481 (2023) - [j21]Jiaxin Chen, Xin Liao, Wei Wang, Zheng Qin:
Identification of image global processing operator chain based on feature decoupling. Inf. Sci. 637: 118961 (2023) - [j20]Wentao Chen, Zhang Zhang, Wei Wang, Liang Wang, Zilei Wang, Tieniu Tan:
Few-shot learning with unsupervised part discovery and part-aligned similarity. Pattern Recognit. 133: 108986 (2023) - [j19]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Temporal sparse adversarial attack on sequence-based gait recognition. Pattern Recognit. 133: 109028 (2023) - [j18]Jiaxin Chen, Xin Liao, Wei Wang, Zhenxing Qian, Zheng Qin, Yaonan Wang:
SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection. IEEE Trans. Circuits Syst. Video Technol. 33(2): 935-951 (2023) - [j17]Kai Zeng, Yaonan Wang, Wei Wang, Hui Zhang, Jianxu Mao, Qing Zhu:
Deep Confidence Propagation Stereo Network. IEEE Trans. Intell. Transp. Syst. 24(8): 8097-8108 (2023) - [c55]Songlin Yang, Wei Wang, Chenye Xu, Ziwen He, Bo Peng, Jing Dong:
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models. CVPR Workshops 2023: 1001-1010 - [c54]Songlin Yang, Wei Wang, Bo Peng, Jing Dong:
Designing A 3d-Aware Stylenerf Encoder for Face Editing. ICASSP 2023: 1-5 - [c53]Bo Peng, Xianyun Sun, Caiyong Wang, Wei Wang, Jing Dong, Zhenan Sun, Rongyu Zhang, Heng Cong, Lingzhi Fu, Hao Wang, Yusheng Zhang, Hanyuan Zhang, Xin Zhang, Boyuan Liu, Hefei Ling, Luka Dragar, Borut Batagelj, Peter Peer, Vitomir Struc, Xinghui Zhou, Kunlin Liu, Weitao Feng, Weiming Zhang, Haitao Wang, Wenxiu Diao:
DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment. IJCB 2023: 1-9 - [c52]Songlin Yang, Wei Wang, Jun Ling, Bo Peng, Xu Tan, Jing Dong:
Context-Aware Talking-Head Video Editing. ACM Multimedia 2023: 7718-7727 - [c51]Kai Zeng, Hui Zhang, Wei Wang, Yaonan Wang, Jianxu Mao:
Deep Stereo Matching with Superpixel Based Feature and Cost. PRCV (2) 2023: 3-15 - [i29]Songlin Yang, Wei Wang, Bo Peng, Jing Dong:
Designing a 3D-Aware StyleNeRF Encoder for Face Editing. CoRR abs/2302.09467 (2023) - [i28]Dongze Li, Wei Wang, Kang Zhao, Jing Dong, Tieniu Tan:
RiDDLE: Reversible and Diversified De-identification with Latent Encryptor. CoRR abs/2303.05171 (2023) - [i27]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Collaborative Feature Learning for Fine-grained Facial Forgery Detection and Segmentation. CoRR abs/2304.08078 (2023) - [i26]Songlin Yang, Wei Wang, Yushi Lan, Xiangyu Fan, Bo Peng, Lei Yang, Jing Dong:
Learning Dense Correspondence for NeRF-Based Face Reenactment. CoRR abs/2312.10422 (2023) - [i25]Dongze Li, Kang Zhao, Wei Wang, Bo Peng, Yingya Zhang, Jing Dong, Tieniu Tan:
AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis. CoRR abs/2312.10921 (2023) - 2022
- [j16]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Revisiting ensemble adversarial attack. Signal Process. Image Commun. 107: 116747 (2022) - [j15]Juan Hu, Xin Liao, Wei Wang, Zheng Qin:
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1089-1102 (2022) - [j14]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Siwei Lyu:
A Unified Framework for High Fidelity Face Swap and Expression Reenactment. IEEE Trans. Circuits Syst. Video Technol. 32(6): 3673-3684 (2022) - [j13]Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Trans. Inf. Forensics Secur. 17: 2468-2482 (2022) - [c50]Wenqi Zhuo, Wei Wang, Hui Zhang, Jing Dong:
IrisGuard: Image Forgery Detection for Iris Anti-spoofing. CCBR 2022: 602-612 - [c49]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Robust Face-Swap Detection Based on 3D Facial Shape Information. CICAI (1) 2022: 404-415 - [c48]Bo Peng, Wei Xiang, Yue Jiang, Wei Wang, Jing Dong, Zhenan Sun, Zhen Lei, Siwei Lyu:
DFGC 2022: The Second DeepFake Game Competition. IJCB 2022: 1-10 - [c47]Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong:
AdaDeId: Adjust Your Identity Attribute Freely. ICPR 2022: 210-216 - [c46]Dongze Li, Wenqi Zhuo, Wei Wang, Jing Dong:
Contrastive Knowledge Transfer for Deepfake Detection with Limited Data. ICPR 2022: 1945-1951 - [c45]Weinan Guan, Ziwen He, Wei Wang, Jing Dong, Bo Peng:
Defending Against Deepfakes with Ensemble Adversarial Perturbation. ICPR 2022: 1952-1958 - [c44]Ziwen He, Wei Wang, Weinan Guan, Jing Dong, Tieniu Tan:
Defeating DeepFakes via Adversarial Visual Reconstruction. ACM Multimedia 2022: 2464-2472 - [c43]Bo Peng, Siwei Lyu, Wei Wang, Jing Dong:
Counterfactual Image Enhancement for Explanation of Face Swap Deepfakes. PRCV (2) 2022: 492-508 - [i24]Songlin Yang, Wei Wang, Chenye Xu, Bo Peng, Jing Dong:
Exposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing Models. CoRR abs/2205.14851 (2022) - [i23]Bo Peng, Wei Xiang, Yue Jiang, Wei Wang, Jing Dong, Zhenan Sun, Zhen Lei, Siwei Lyu:
DFGC 2022: The Second DeepFake Game Competition. CoRR abs/2206.15138 (2022) - [i22]Wentao Chen, Zhang Zhang, Wei Wang, Liang Wang, Zilei Wang, Tieniu Tan:
Cross-Domain Cross-Set Few-Shot Learning via Learning Compact and Aligned Representations. CoRR abs/2207.07826 (2022) - 2021
- [j12]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Learning pose-invariant 3D object reconstruction from single-view images. Neurocomputing 423: 407-418 (2021) - [j11]Zhibin Pan, Yiwei Pan, Yidi Wang, Wei Wang:
A new globally adaptive k-nearest neighbor classifier based on local mean optimization. Soft Comput. 25(3): 2417-2431 (2021) - [j10]Bo Wang, Mengnan Zhao, Wei Wang, Fei Wei, Zhan Qin, Kui Ren:
Are You Confident That You Have Successfully Generated Adversarial Examples? IEEE Trans. Circuits Syst. Video Technol. 31(6): 2089-2099 (2021) - [j9]Bo Wang, Mengnan Zhao, Wei Wang, Xiaorui Dai, Yi Li, Yanqing Guo:
Adversarial Analysis for Source Camera Identification. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4174-4186 (2021) - [c42]Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong:
A Systematical Solution for Face De-identification. CCBR 2021: 20-30 - [c41]Dongze Li, Wei Wang, Hongxing Fan, Jing Dong:
Exploring Adversarial Fake Images on Face Manifold. CVPR 2021: 5789-5798 - [c40]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
MUST-GAN: Multi-Level Statistics Transfer for Self-Driven Person Image Generation. CVPR 2021: 13622-13631 - [c39]Jiaxin Chen, Xin Liao, Wei Wang, Zheng Qin:
A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains. ICASSP 2021: 2505-2509 - [c38]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang:
DFGC 2021: A DeepFake Game Competition. IJCB 2021: 1-8 - [c37]Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan:
SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer. ACM Multimedia 2021: 3601-3609 - [i21]Dongze Li, Wei Wang, Hongxing Fan, Jing Dong:
Exploring Adversarial Fake Images on Face Manifold. CoRR abs/2101.03272 (2021) - [i20]Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan:
SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer. CoRR abs/2104.10567 (2021) - [i19]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Robust Face-Swap Detection Based on 3D Facial Shape Information. CoRR abs/2104.13665 (2021) - [i18]Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong:
Face Anonymization by Manipulating Decoupled Identity Representation. CoRR abs/2105.11137 (2021) - [i17]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Transferable Sparse Adversarial Attack. CoRR abs/2105.14727 (2021) - [i16]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang:
DFGC 2021: A DeepFake Game Competition. CoRR abs/2106.01217 (2021) - [i15]Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong:
A Systematical Solution for Face De-identification. CoRR abs/2107.08581 (2021) - 2020
- [j8]Yiwei Pan, Zhibin Pan, Yikun Wang, Wei Wang:
A new fast search algorithm for exact k-nearest neighbors based on optimal triangle-inequality-based check strategy. Knowl. Based Syst. 189 (2020) - [i14]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Temporal Sparse Adversarial Attack on Gait Recognition. CoRR abs/2002.09674 (2020) - [i13]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Learning Pose-invariant 3D Object Reconstruction from Single-view Images. CoRR abs/2004.01347 (2020) - [i12]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation. CoRR abs/2011.09084 (2020) - 2019
- [c36]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
Any-to-one Face Reenactment Based on Conditional Generative Adversarial Network. APSIPA 2019: 1657-1664 - [c35]Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong:
On the Generalization of GAN Image Forensics. CCBR 2019: 134-141 - [c34]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
New Graph-Theoretic Approach to Social Steganography. Media Watermarking, Security, and Forensics 2019 - [c33]Mingyun Bian, Bo Peng, Wei Wang, Jing Dong:
An Accurate LSTM Based Video Heart Rate Estimation Method. PRCV (3) 2019: 409-417 - [i11]Xinsheng Xuan, Bo Peng, Jing Dong, Wei Wang:
On the generalization of GAN image forensics. CoRR abs/1902.11153 (2019) - [i10]Ziwen He, Wei Wang, Xinsheng Xuan, Jing Dong, Tieniu Tan:
A New Ensemble Method for Concessively Targeted Multi-model Attack. CoRR abs/1912.10833 (2019) - [i9]Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong:
Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning. CoRR abs/1912.11082 (2019) - 2018
- [j7]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Feature learning for steganalysis using convolutional neural networks. Multim. Tools Appl. 77(15): 19633-19657 (2018) - [j6]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. IEEE Trans. Inf. Forensics Secur. 13(2): 377-392 (2018) - [c32]Kui Ye, Jing Dong, Wei Wang, Bo Peng, Tieniu Tan:
Feature Pyramid Deep Matching and Localization Network for Image Forensics. APSIPA 2018: 1796-1802 - [c31]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. ICCCS (4) 2018: 404-415 - [c30]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. ICPR 2018: 2676-2681 - [c29]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval. ICPR 2018: 3335-3340 - [i8]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. CoRR abs/1801.04747 (2018) - [i7]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang:
Reversible Embedding to Covers Full of Boundaries. CoRR abs/1801.04752 (2018) - [i6]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang, Lizhi Xiong:
The Cut and Dominating Set Problem in A Steganographer Network. CoRR abs/1802.09333 (2018) - [i5]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval. CoRR abs/1806.02984 (2018) - [i4]Wei Wang, Jing Dong, Yinlong Qian, Tieniu Tan:
Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels. CoRR abs/1806.10443 (2018) - 2017
- [j5]Hai-Xia Xu, Wei Zhou, Yaonan Wang, Wei Wang, Yan Mo:
Matrix Separation Based on LMaFit-Seed. Comput. J. 60(11): 1609-1618 (2017) - [j4]Zairan Wang, Jing Dong, Wei Wang:
Quantization based watermarking methods against valumetric distortions. Int. J. Autom. Comput. 14(6): 672-685 (2017) - [j3]Haixia Xu, Wei Zhou, Jiang Zhu, Xia Huang, Wei Wang:
Vehicle counting based on double virtual lines. Signal Image Video Process. 11(5): 905-912 (2017) - [j2]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. IEEE Trans. Inf. Forensics Secur. 12(2): 479-494 (2017) - [c28]Yonggwon Ri, Jing Dong, Wei Wang, Tieniu Tan:
High Capacity Reversible Data Hiding with Contrast Enhancement. CCCV (2) 2017: 284-294 - [c27]Kui Ye, Jing Dong, Wei Wang, Jindong Xu, Tieniu Tan:
Image Forgery Detection Based on Semantic Image Understanding. CCCV (1) 2017: 472-481 - [c26]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces. CVPR Workshops 2017: 1813-1821 - [c25]Jiedong Hao, Wei Wang, Jing Dong, Tieniu Tan:
MFC: A multi-scale fully convolutional approach for visual instance retrieval. ICME Workshops 2017: 513-518 - [c24]Yonggwon Ri, Jing Dong, Wei Wang, Tieniu Tan:
Adaptive Histogram Shifting Based Reversible Data Hiding. IIH-MSP (2) 2017: 42-50 - [c23]Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang:
SSGAN: Secure Steganography Based on Generative Adversarial Networks. PCM (1) 2017: 534-544 - [i3]Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang:
SSGAN: Secure Steganography Based on Generative Adversarial Networks. CoRR abs/1707.01613 (2017) - [i2]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
A Simply Study to Steganography on Social Networks. CoRR abs/1712.03621 (2017) - 2016
- [c22]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Learning and transferring representations for image steganalysis using convolutional neural network. ICIP 2016: 2752-2756 - [c21]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model. ICIP 2016: 3932-3936 - [i1]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
What Is the Best Practice for CNNs Applied to Visual Instance Retrieval? CoRR abs/1611.01640 (2016) - 2015
- [c20]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Local correlation pattern for image steganalysis. ChinaSIP 2015: 468-472 - [c19]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Detection of computer generated faces in videos based on pulse signal. ChinaSIP 2015: 841-845 - [c18]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Robust steganalysis based on training set construction and ensemble classifiers weighting. ICIP 2015: 1498-1502 - [c17]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Deep learning for steganalysis via convolutional neural networks. Media Watermarking, Security, and Forensics 2015: 94090J - [c16]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Improved 3D lighting environment estimation for image forgery detection. WIFS 2015: 1-6 - 2014
- [j1]Wei Wang, Jing Dong, Tieniu Tan:
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. IEEE Trans. Inf. Forensics Secur. 9(10): 1653-1666 (2014) - [c15]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
An effective watermarking method against valumetric distortions. ICIP 2014: 5487-5491 - [c14]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
Improved Robust Watermarking Based on Rational Dither Modulation. IGTA 2014: 305-314 - [c13]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. IWDW 2014: 174-186 - 2013
- [c12]Jing Dong, Wei Wang, Tieniu Tan:
CASIA Image Tampering Detection Evaluation Database. ChinaSIP 2013: 422-426 - [c11]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Video steganalysis based on the constraints of motion vectors. ICIP 2013: 4422-4426 - 2012
- [c10]Zhen Zhou, Wei Wang, Liang Wang:
Community Detection Based on an Improved Modularity. CCPR 2012: 638-645 - [c9]Yongming Chen, Liang Wang, Wei Wang, Zhang Zhang:
Continuum regression for cross-modal multimedia retrieval. ICIP 2012: 1949-1952 - [c8]Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang:
Overview of Monitor Selection in Computer Networks. ISCTCS 2012: 52-59 - 2011
- [c7]Wei Wang, Jing Dong, Tieniu Tan:
Exploring DCT coefficient quantization effect for image tampering localization. WIFS 2011: 1-6 - 2010
- [c6]Wei Wang, Jing Dong, Tieniu Tan:
Image tampering detection based on stationary distribution of Markov chain. ICIP 2010: 2101-2104 - [c5]Wei Wang, Jing Dong, Tieniu Tan:
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. IWDW 2010: 120-133 - 2009
- [c4]Wei Wang, Jing Dong, Tieniu Tan:
Effective image splicing detection based on image chroma. ICIP 2009: 1257-1260 - [c3]Jing Dong, Wei Wang, Tieniu Tan:
Multi-class Blind Steganalysis Based on Image Run-Length Analysis. IWDW 2009: 199-210 - [c2]Wei Wang, Jing Dong, Tieniu Tan:
A Survey of Passive Image Tampering Detection. IWDW 2009: 308-322 - 2008
- [c1]Jing Dong, Wei Wang, Tieniu Tan, Yun Q. Shi:
Run-Length and Edge Statistics Based Approach for Image Splicing Detection. IWDW 2008: 76-87
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-24 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint