Follow
Run Wang (汪润)
Run Wang (汪润)
Associate Professor, Wuhan University, China
Verified email at whu.edu.cn - Homepage
Title
Cited by
Cited by
Year
FakeSpotter: A simple yet robust baseline for spotting AI-synthesized fake faces
R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu
International Joint Conference on Artificial Intelligence (IJCAI), 3444-3451, 2020
2642020
Towards a robust deep neural network against adversarial texts: A survey
W Wang, R Wang, L Wang, Z Wang, A Ye
ieee transactions on knowledge and data engineering 35 (3), 3159-3179, 2021
152*2021
Countering malicious deepfakes: Survey, battleground, and horizon
F Juefei-Xu, R Wang, Y Huang, Q Guo, L Ma, Y Liu
International journal of computer vision 130 (7), 1678-1734, 2022
1022022
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices
R Wang, F Juefei-Xu, Y Huang, Q Guo, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1207–1216, 2020
932020
Fakelocator: Robust localization of gan-based face manipulations
Y Huang, F Juefei-Xu, Q Guo, Y Liu, G Pu
IEEE Transactions on Information Forensics and Security 17, 2657-2672, 2022
88*2022
Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction
Y Huang, F Juefei-Xu, R Wang, Q Guo, L Ma, X Xie, J Li, W Miao, Y Liu, ...
Proceedings of the 28th ACM international conference on multimedia, 1217-1226, 2020
642020
Faketagger: Robust safeguards against deepfake dissemination via provenance tracking
R Wang, F Juefei-Xu, M Luo, Y Liu, L Wang
Proceedings of the 29th ACM International Conference on Multimedia, 3546-3555, 2021
59*2021
Amora: Black-box adversarial morphing attack
R Wang, F Juefei-Xu, Q Guo, Y Huang, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1376-1385, 2020
522020
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations
R Wang, Z Huang, Z Chen, L Liu, J Chen, L Wang
International Joint Conference on Artificial Intelligence (IJCAI), 761-767, 2022
292022
Adversarial examples generation approach for tendency classification on Chinese texts
王文琦, 汪润, 王丽娜, 唐奔宵
Journal of Software 30 (8), 2415-2427, 2019
282019
Smartpi: Understanding permission implications of android apps from user reviews
R Wang, Z Wang, B Tang, L Zhao, L Wang
IEEE Transactions on Mobile Computing 19 (12), 2933-2945, 2019
192019
Capturing the persistence of facial expression features for deepfake video detection
Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming
Information and Communications Security: 21st International Conference …, 2020
162020
Mgaattack: Toward more query-efficient black-box attack by microbial genetic algorithm
L Wang, K Yang, W Wang, R Wang, A Ye
Proceedings of the 28th ACM International Conference on Multimedia, 2229-2236, 2020
152020
MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training
K Yang, R Wang, L Wang
142022
Textfirewall: Omni-defending against adversarial texts in sentiment classification
W Wang, R Wang, J Ke, L Wang
IEEE Access 9, 27467-27475, 2021
122021
An end-to-end rumor detection model based on feature aggregation
A Ye, L Wang, R Wang, W Wang, J Ke, D Wang
Complexity 2021, 1-16, 2021
102021
Free fine-tuning: A plug-and-play watermarking scheme for deep neural networks
R Wang, J Ren, B Li, T She, W Zhang, L Fang, J Chen, L Wang
Proceedings of the 31st ACM International Conference on Multimedia, 8463-8474, 2023
92023
Niffler: A context-aware and user-independent side-channel attack system for password inference
B Tang, Z Wang, R Wang, L Zhao, L Wang
Wireless Communications and Mobile Computing 2018, 2018
82018
Aoshuang Ye. Towards a robust deep neural network in texts: A survey
W Wang, R Wang, L Wang, Z Wang
arXiv preprint arXiv:1902.07285, 2019
72019
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
R Wang, P Liu, L Zhao, Y Cheng, L Wang
Journal of Systems and Software 124, 153-168, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20