Follow
mengnan zhao
mengnan zhao
Verified email at mail.dlut.edu.cn - Homepage
Title
Cited by
Cited by
Year
Adversarial analysis for source camera identification
B Wang(tutor), M Zhao, W Wang, X Dai, Y Li, Y Guo
IEEE Transactions on Circuits and Systems for Video Technology 31 (11), 4174 …, 2020
122020
Source camera identification based on coupling coding and adaptive filter
M Zhao, B Wang, F Wei, M Zhu, X Sui
IEEE Access 8, 54431-54440, 2019
112019
Virtual sample generation and ensemble learning based image source identification with small training samples
S Wu, B Wang, J Zhao, M Zhao, K Zhong, Y Guo
International Journal of Digital Crime and Forensics (IJDCF) 13 (3), 34-46, 2021
82021
Are you confident that you have successfully generated adversarial examples?
B Wang(tutor), M Zhao, W Wang, F Wei, Z Qin, K Ren
IEEE Transactions on Circuits and Systems for Video Technology 31 (6), 2089-2099, 2020
82020
Guided erasable adversarial attack (GEAA) toward shared data protection
M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren
IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022
62022
Temporal knowledge graph reasoning triggered by memories
M Zhao, L Zhang, Y Kong, B Yin
Applied Intelligence, 2023
42023
Class correlation correction for unbiased scene graph generation
M Zhao, Y Kong, L Zhang, B Yin
Pattern Recognition 149, 110221, 2024
22024
Fast Adversarial Training with Smooth Convergence
M Zhao, L Zhang, Y Kong, B Yin
International Conference on Computer Vision (ICCV), 2023
12023
Further understanding towards sparsity adversarial attacks
M Zhao, X Dai, B Wang, F Yu, F Wei
International Conference on Artificial Intelligence and Security, 200-212, 2022
12022
Catastrophic Overfitting: A Potential Blessing in Disguise
M Zhao, L Zhang, Y Kong, B Yin
European Conference on Computer Vision, 2024
2024
Separable Multi-Concept Erasure from Diffusion Models
M Zhao, L Zhang, T Zheng, Y Kong, B Yin
arXiv preprint arXiv:2402.05947, 2024
2024
Adversarial Attacks on Scene Graph Generation
M Zhao, L Zhang, W Wang, Y Kong, B Yin
IEEE Transactions on Information Forensics and Security, 2024
2024
EipFormer: Emphasizing Instance Positions in 3D Instance Segmentation
M Zhao, L Zhang, Y Kong, B Yin
arXiv preprint arXiv:2312.05602, 2023
2023
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples
M Zhao, B Wang, W Guo, W Wang
Neurocomputing 551, 126481, 2023
2023
Supplementary Material for “Fast Adversarial Training with Smooth Convergence”
M Zhao, L Zhang, Y Kong, B Yin
The system can't perform the operation now. Try again later.
Articles 1–15