


default search action
Junhao Dong 0001
Person information
- affiliation: Nanyang Technological University, College of Computing and Data Science, Singapore
- affiliation: Agency for Science Technology and Research (A*STAR), Singapore
- affiliation: Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China
Other persons with the same name
- Junhao Dong
- Junhao Dong 0002
— Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beijing, China - Junhao Dong 0003 — University of Hong Kong, Department of Mechanical Engineering, Hong Kong
- Junhao Dong 0004 — University of California, Irvine, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j7]Zhongliang Guo
, Yifei Qian
, Shuai Zhao
, Junhao Dong
, Yanli Li
, Ognjen Arandjelovic
, Lei Fang
, Chun Pong Lau
:
Artwork protection against unauthorized neural style transfer and aesthetic color distance metric. Pattern Recognit. 171: 112105 (2026)- 2025
[j6]Junhao Dong
, Junxi Chen
, Xiaohua Xie
, Jianhuang Lai
, Hao Chen
:
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges. ACM Comput. Surv. 57(3): 79:1-79:38 (2025)
[j5]Jia Li, Junhao Dong
, Jianhuang Lai, Xiaohua Xie
:
Imperceptible diffusion modification for facial privacy protection. Neurocomputing 649: 130614 (2025)
[j4]Junxi Chen, Junhao Dong, Xiaohua Xie
, Jianhuang Lai
:
Releasing Inequality Phenomenon in ℓ∞-Norm Adversarial Training via Input Gradient Distillation. IEEE Trans. Inf. Forensics Secur. 20: 5632-5646 (2025)
[j3]Junhao Dong
, Yuan Wang
, Xiaohua Xie
, Jianhuang Lai
, Yew-Soon Ong
:
Generalizable and Discriminative Representations for Adversarially Robust Few-Shot Learning. IEEE Trans. Neural Networks Learn. Syst. 36(3): 5480-5493 (2025)
[c17]Weiming Liu, Jun Dan, Fan Wang, Xinting Liao, Junhao Dong, Hua Yu, Shunjie Dong, Lianyong Qi:
Distinguish Then Exploit: Source-free Open Set Domain Adaptation via Weight Barcode Estimation and Sparse Label Assignment. CVPR 2025: 4927-4938
[c16]Junxi Chen, Junhao Dong, Xiaohua Xie:
Mind the Trojan Horse: Image Prompt Adapter Enabling Scalable and Deceptive Jailbreaking. CVPR 2025: 23785-23794
[c15]Hao Zhu, Yifei Zhang, Junhao Dong, Piotr Koniusz:
BiLoRA: Almost-Orthogonal Parameter Spaces for Continual Learning. CVPR 2025: 25613-25622
[c14]Junhao Dong
, Piotr Koniusz
, Xinghua Qu
, Yew-Soon Ong
:
Stabilizing Modality Gap & Lowering Gradient Norms Improve Zero-Shot Adversarial Robustness of VLMs. KDD (1) 2025: 236-247
[i13]Junxi Chen, Junhao Dong, Xiaohua Xie:
Mind the Trojan Horse: Image Prompt Adapter Enabling Scalable and Deceptive Jailbreaking. CoRR abs/2504.05838 (2025)
[i12]Chaomeng Chen, Zitong Yu, Junhao Dong, Sen Su, LinLin Shen, Shutao Xia, Xiaochun Cao:
Mitigating Group-Level Fairness Disparities in Federated Visual Language Models. CoRR abs/2505.01851 (2025)
[i11]Yuqi Li, Kai Li, Xin Yin, Zhifei Yang, Junhao Dong, Zeyu Dong, Chuanguang Yang, Yingli Tian, Yao Lu:
SepPrune: Structured Pruning for Efficient Deep Speech Separation. CoRR abs/2505.12079 (2025)
[i10]Yuqi Li, Junhao Dong, Zeyu Dong, Chuanguang Yang, Zhulin An, Yongjun Xu:
SRKD: Towards Efficient 3D Point Cloud Segmentation via Structure- and Relation-aware Knowledge Distillation. CoRR abs/2506.17290 (2025)
[i9]Yuqi Li, Chuanguang Yang, Junhao Dong, Zhengtao Yao, Haoyan Xu, Zeyu Dong, Hansheng Zeng, Zhulin An, Yingli Tian:
AMMKD: Adaptive Multimodal Multi-teacher Distillation for Lightweight Vision-Language Models. CoRR abs/2509.00039 (2025)- 2024
[c13]Junhao Dong, Piotr Koniusz
, Junxi Chen, Z. Jane Wang, Yew-Soon Ong:
Robust Distillation via Untargeted and Targeted Intermediate Adversarial Samples. CVPR 2024: 28432-28442
[c12]Junhao Dong, Piotr Koniusz
, Junxi Chen, Xiaohua Xie, Yew-Soon Ong:
Adversarially Robust Few-shot Learning via Parameter Co-distillation of Similarity and Class Concept Learners. CVPR 2024: 28535-28544
[c11]Zhongliang Guo
, Junhao Dong, Yifei Qian, Kaixuan Wang
, Weiye Li, Ziheng Guo, Yuheng Wang, Yanli Li, Ognjen Arandjelovic
, Lei Fang:
Artwork Protection Against Neural Style Transfer Using Locally Adaptive Adversarial Color Attack. ECAI 2024: 1414-1421
[c10]Junhao Dong
, Piotr Koniusz
, Junxi Chen
, Yew-Soon Ong
:
Adversarially Robust Distillation by Reducing the Student-Teacher Variance Gap. ECCV (4) 2024: 92-111
[c9]Junhao Dong, Melvin Wong, Sihan Xia, Joel Wei En Tay:
Towards Adversarially Robust Data-Efficient Learning with Generated Data. CAI 2024: 1422-1424
[c8]Haodong Chen
, Haojian Huang
, Junhao Dong
, Mingzhe Zheng
, Dian Shao
:
FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs. ACM Multimedia 2024: 2301-2310
[i8]Junxi Chen, Junhao Dong, Xiaohua Xie:
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability. CoRR abs/2401.07087 (2024)
[i7]Haodong Chen, Haojian Huang, Junhao Dong, Mingzhe Zheng, Dian Shao:
FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs. CoRR abs/2407.02157 (2024)
[i6]Zhongliang Guo, Lei Fang, Jingyu Lin, Yifei Qian, Shuai Zhao, Zeyu Wang, Junhao Dong, Cunjian Chen, Ognjen Arandjelovic, Chun Pong Lau:
A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse. CoRR abs/2408.10901 (2024)
[i5]Junhao Dong, Xinghua Qu, Z. Jane Wang, Yew-Soon Ong:
Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training. CoRR abs/2411.02871 (2024)- 2023
[j2]Junhao Dong
, Yuan Wang
, Jianhuang Lai
, Xiaohua Xie
:
Restricted Black-Box Adversarial Attack Against DeepFake Face Swapping. IEEE Trans. Inf. Forensics Secur. 18: 2596-2608 (2023)
[j1]Junhao Dong
, Lingxiao Yang, Yuan Wang
, Xiaohua Xie
, Jianhuang Lai
:
Toward Intrinsic Adversarial Robustness Through Probabilistic Training. IEEE Trans. Image Process. 32: 3862-3872 (2023)
[c7]Junhao Dong, Seyed-Mohsen Moosavi-Dezfooli, Jianhuang Lai, Xiaohua Xie:
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training. CVPR 2023: 24678-24687
[c6]Zheng Li, Weibo Cai, Junhao Dong, Jianhuang Lai, Xiaohua Xie:
Feature Disentanglement and Adaptive Fusion for Improving Multi-modal Tracking. PRCV (12) 2023: 68-80
[c5]Weibo Cai, Zheng Li, Junhao Dong, Jianhuang Lai, Xiaohua Xie:
Modality Balancing Mechanism for RGB-Infrared Object Detection in Aerial Image. PRCV (12) 2023: 81-93
[i4]Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen:
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications. CoRR abs/2303.14133 (2023)
[i3]Junxi Chen, Junhao Dong, Xiaohua Xie:
Releasing Inequality Phenomena in L∞-Adversarial Training via Input Gradient Distillation. CoRR abs/2305.09305 (2023)- 2022
[c4]Junhao Dong
, Yuan Wang, Jianhuang Lai, Xiaohua Xie:
Improving Adversarially Robust Few-shot Image Classification with Generalizable Representations. CVPR 2022: 9015-9024
[c3]Yuan Wang, Quan Zhang, Jianhuang Lai, Xiaohua Xie, Junhao Dong:
Learning Bi-directional Feature Propagation with Latent Layout Modeling for Group Re-identification. ICPR 2022: 907-913
[i2]Junhao Dong, Yuan Wang, Jianhuang Lai, Xiaohua Xie:
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping. CoRR abs/2204.12347 (2022)
[i1]Junhao Dong, Seyed-Mohsen Moosavi-Dezfooli, Jianhuang Lai, Xiaohua Xie:
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training. CoRR abs/2211.00525 (2022)- 2021
[c2]Kaiheng Dang, Jianhuang Lai, Junhao Dong, Xiaohua Xie:
Adversarial Training Inspired Self-attention Flow for Universal Image Style Transfer. ACPR (2) 2021: 476-489
[c1]Junhao Dong
, Xiaohua Xie:
Visually Maintained Image Disturbance Against Deepfake Face Swapping. ICME 2021: 1-6
Coauthor Index
aka: Jianhuang Lai

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-22 04:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







