


Остановите войну!
for scientists:
Wenbo Zhou
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j20]Yuan Cao
, Ligang Li, Wei Ni, Bo Liu
, Wenbo Zhou, Qi Xiao:
Amalgamation of Geometry Structure, Meteorological and Thermophysical Parameters for Intelligent Prediction of Temperature Fields in 3D Scenes. Sensors 22(6): 2386 (2022) - [j19]Tianyi Wei
, Dongdong Chen
, Wenbo Zhou, Jing Liao
, Weiming Zhang
, Lu Yuan
, Gang Hua
, Nenghai Yu
:
E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion. IEEE Trans. Image Process. 31: 3267-3280 (2022) - [j18]Han Fang
, Dongdong Chen
, Feng Wang, Zehua Ma
, Honggu Liu
, Wenbo Zhou, Weiming Zhang
, Nenghai Yu
:
TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability. IEEE Trans. Multim. 24: 955-967 (2022) - [i14]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Weiming Zhang, Nenghai Yu:
Self-supervised Transformer for Deepfake Detection. CoRR abs/2203.01265 (2022) - [i13]Hengyue Pan, Yixin Chen, Xin Niu, Wenbo Zhou, Dongsheng Li:
Learning Convolutional Neural Networks in the Frequency Domain. CoRR abs/2204.06718 (2022) - 2021
- [j17]Kunlin Liu, Ping Wang
, Wenbo Zhou, Zhenyu Zhang, Yanhao Ge, Honggu Liu
, Weiming Zhang, Nenghai Yu:
Face Swapping Consistency Transfer with Neural Identity Carrier. Future Internet 13(11): 298 (2021) - [j16]Huanyu Bian, Dongdong Chen, Kui Zhang, Hang Zhou, Xiaoyi Dong, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Adversarial defense via self-orthogonal randomization super-network. Neurocomputing 452: 147-158 (2021) - [j15]Shuai Lü, Shuai Han, Wenbo Zhou
, Junwei Zhang:
Recruitment-imitation mechanism for evolutionary reinforcement learning. Inf. Sci. 553: 172-188 (2021) - [j14]Huanyu Bian, Hao Cui, Kunlin Liu, Hang Zhou, Dongdong Chen, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
CDAE: Color decomposition-based adversarial examples for screen devices. Inf. Sci. 569: 287-301 (2021) - [j13]Shuai Han, Wenbo Zhou
, Shuai Lü, Jiayu Yu:
Regularly updated deterministic policy gradient algorithm. Knowl. Based Syst. 214: 106736 (2021) - [j12]Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181: 107920 (2021) - [c14]Qidong Huang, Jie Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Initiative Defense against Facial Manipulation. AAAI 2021: 1619-1627 - [c13]Honggu Liu, Xiaodan Li, Wenbo Zhou, Yuefeng Chen, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain. CVPR 2021: 772-781 - [c12]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, Nenghai Yu:
Multi-Attentional Deepfake Detection. CVPR 2021: 2185-2194 - [c11]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation. CVPR 2021: 15374-15383 - [c10]Changlei Lu, Bin Liu, Wenbo Zhou, Qi Chu, Nenghai Yu:
Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network. ICIP 2021: 3572-3576 - [c9]Jiangcheng Cao, Tingting Hun, Wenbo Zhou, Zheng Liu, Wei Wang, Yufeng Jin:
A Method for Automatic Counting and Labeling of Cells Stained with Microporous Membrane. NEMS 2021: 949-952 - [c8]Xin Shi, Maqiang Zhai, Pengjie Qin, Keqi Yu, Wenbo Zhou:
A new sEMG signal feature extraction method based on S transform. RCAR 2021: 1419-1424 - [i12]Honggu Liu, Xiaodan Li, Wenbo Zhou, Yuefeng Chen, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain. CoRR abs/2103.01856 (2021) - [i11]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, Nenghai Yu:
Multi-attentional Deepfake Detection. CoRR abs/2103.02406 (2021) - [i10]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Lu Yuan, Gang Hua, Nenghai Yu:
A Simple Baseline for StyleGAN Inversion. CoRR abs/2104.07661 (2021) - [i9]Junjie Li, Jingyao Li, Wenbo Zhou, Shuai Lü:
Evolutionary Generative Adversarial Networks based on New Fitness Function and Generic Crossover Operator. CoRR abs/2109.11078 (2021) - [i8]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Zhentao Tan, Lu Yuan, Weiming Zhang, Nenghai Yu:
HairCLIP: Design Your Hair by Text and Reference Image. CoRR abs/2112.05142 (2021) - [i7]Qidong Huang, Jie Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Initiative Defense against Facial Manipulation. CoRR abs/2112.10098 (2021) - 2020
- [j11]Liangzhi Yu, Wenbo Zhou, Junli Wang:
A structure-agency integrative framework for information access disparity. J. Documentation 76(4): 829-848 (2020) - [j10]Weixiang Li
, Wenbo Zhou, Weiming Zhang
, Chuan Qin
, Huanhuan Hu, Nenghai Yu
:
Shortening the Cover for Fast JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(6): 1745-1757 (2020) - [c7]Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, Nenghai Yu:
Model Watermarking for Image Processing Networks. AAAI 2020: 12805-12812 - [c6]Wenbo Zhou
, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi:
A Coloured Petri Nets Based Attack Tolerance Framework. APSEC 2020: 159-168 - [i6]Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, Nenghai Yu:
Model Watermarking for Image Processing Networks. CoRR abs/2002.11088 (2020) - [i5]Shuai Han, Wenbo Zhou, Jing Liu, Shuai Lü:
NROWAN-DQN: A Stable Noisy Network with Noise Reduction and Online Weight Adjustment for Exploration. CoRR abs/2006.10980 (2020) - [i4]Shuai Han, Wenbo Zhou, Shuai Lü, Jiayu Yu:
Regularly Updated Deterministic Policy Gradient Algorithm. CoRR abs/2007.00169 (2020) - [i3]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Improved Image Matting via Real-time User Clicks and Uncertainty Estimation. CoRR abs/2012.08323 (2020)
2010 – 2019
- 2019
- [j9]Junqi Ren, Lei Liu, Feng Liu, Wenbo Zhou
, Shuai Lü
:
An Executable Specification of Map-Join-Reduce Using Haskell. IEEE Access 7: 10892-10904 (2019) - [j8]Wenbo Zhou
, Lei Liu, Shuai Lü
, Peng Zhang
:
Toward Formal Modeling and Verification of Resource Provisioning as a Service in Cloud. IEEE Access 7: 26721-26730 (2019) - [j7]Junqi Ren
, Lei Liu, Peng Zhang
, Wenbo Zhou
:
A Method of Automatically Evolving Feature Models of Software Product Lines. IEEE Access 7: 39253-39272 (2019) - [j6]Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Controversial 'pixel' prior rule for JPEG adaptive steganography. IET Image Process. 13(1): 24-33 (2019) - [j5]Kejiang Chen
, Hang Zhou, Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. IEEE Trans. Inf. Forensics Secur. 14(4): 1052-1066 (2019) - [c5]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense. ICCV 2019: 1961-1970 - [i2]Shuai Lü, Shuai Han, Wenbo Zhou, Junwei Zhang:
Recruitment-imitation Mechanism for Evolutionary Reinforcement Learning. CoRR abs/1912.06310 (2019) - 2018
- [j4]Wenbo Zhou
, Lei Liu, Peng Zhang, Shuai Lü
, Jingyao Li:
SDAC: A model for analysis of the execution semantics of data processing framework in cloud. Comput. Lang. Syst. Struct. 54: 406-426 (2018) - [j3]Wenbo Zhou, Lei Shi, Jian Chen:
Design and Implementation of the Online Computer-Assisted Instruction System Based on Object-Oriented Analysis Technology. Int. J. Emerg. Technol. Learn. 13(10): 183-195 (2018) - [c4]Chuan Qin
, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Ensemble Steganography. DSC 2018: 582-587 - [c3]Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. IH&MMSec 2018: 5-16 - [i1]Hang Zhou
, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. CoRR abs/1812.11017 (2018) - 2017
- [j2]Wenbo Zhou, Hongjia Liu, Lei Liu, Peng Zhang, Shuai Lv:
一种服务消息交互行为的元建模方法 (Meta-modeling Approach of Message Interaction in Service). 计算机科学 44(4): 24-29 (2017) - [j1]Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
A New Rule for Cost Reassignment in Adaptive Steganography. IEEE Trans. Inf. Forensics Secur. 12(11): 2654-2667 (2017) - 2016
- [c2]Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Evolving distortion function by exploiting the differences among comparable adaptive steganography. ICNC-FSKD 2016: 2262-2271 - 2012
- [c1]Jianhui Shi, Wenbo Zhou, Ying Liu:
The Domain Decomposition Method in Land Surface Model. CyberC 2012: 531-534
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-20 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint