Adversarial analysis for source camera identification B Wang(tutor), M Zhao, W Wang, X Dai, Y Li, Y Guo IEEE Transactions on Circuits and Systems for Video Technology 31 (11), 4174 …, 2020 | 12 | 2020 |
Source camera identification based on coupling coding and adaptive filter M Zhao, B Wang, F Wei, M Zhu, X Sui IEEE Access 8, 54431-54440, 2019 | 11 | 2019 |
Virtual sample generation and ensemble learning based image source identification with small training samples S Wu, B Wang, J Zhao, M Zhao, K Zhong, Y Guo International Journal of Digital Crime and Forensics (IJDCF) 13 (3), 34-46, 2021 | 8 | 2021 |
Are you confident that you have successfully generated adversarial examples? B Wang(tutor), M Zhao, W Wang, F Wei, Z Qin, K Ren IEEE Transactions on Circuits and Systems for Video Technology 31 (6), 2089-2099, 2020 | 8 | 2020 |
Guided erasable adversarial attack (GEAA) toward shared data protection M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022 | 6 | 2022 |
Temporal knowledge graph reasoning triggered by memories M Zhao, L Zhang, Y Kong, B Yin Applied Intelligence, 2023 | 4 | 2023 |
Class correlation correction for unbiased scene graph generation M Zhao, Y Kong, L Zhang, B Yin Pattern Recognition 149, 110221, 2024 | 2 | 2024 |
Fast Adversarial Training with Smooth Convergence M Zhao, L Zhang, Y Kong, B Yin International Conference on Computer Vision (ICCV), 2023 | 1 | 2023 |
Further understanding towards sparsity adversarial attacks M Zhao, X Dai, B Wang, F Yu, F Wei International Conference on Artificial Intelligence and Security, 200-212, 2022 | 1 | 2022 |
Catastrophic Overfitting: A Potential Blessing in Disguise M Zhao, L Zhang, Y Kong, B Yin European Conference on Computer Vision, 2024 | | 2024 |
Separable Multi-Concept Erasure from Diffusion Models M Zhao, L Zhang, T Zheng, Y Kong, B Yin arXiv preprint arXiv:2402.05947, 2024 | | 2024 |
Adversarial Attacks on Scene Graph Generation M Zhao, L Zhang, W Wang, Y Kong, B Yin IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
EipFormer: Emphasizing Instance Positions in 3D Instance Segmentation M Zhao, L Zhang, Y Kong, B Yin arXiv preprint arXiv:2312.05602, 2023 | | 2023 |
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples M Zhao, B Wang, W Guo, W Wang Neurocomputing 551, 126481, 2023 | | 2023 |
Supplementary Material for “Fast Adversarial Training with Smooth Convergence” M Zhao, L Zhang, Y Kong, B Yin | | |