关注
Ziwen He
Ziwen He
在 nuist.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Initializing film homogeneity to retard phase segregation for stable perovskite solar cells
Y Bai, Z Huang, X Zhang, J Lu, X Niu, Z He, C Zhu, M Xiao, Q Song, X Wei, ...
Science 378 (6621), 747-754, 2022
1122022
Transferable sparse adversarial attack
Z He, W Wang, J Dong, T Tan
arXiv preprint arXiv:2105.14727, 2021
262021
Temporal sparse adversarial attack on sequence-based gait recognition
Z He, W Wang, J Dong, T Tan
Pattern Recognition 133, 109028, 2023
222023
Defeating deepfakes via adversarial visual reconstruction
Z He, W Wang, W Guan, J Dong, T Tan
Proceedings of the 30th ACM International Conference on Multimedia, 2464-2472, 2022
182022
Revisiting ensemble adversarial attack
Z He, W Wang, J Dong, T Tan
Signal Processing: Image Communication 107, 116747, 2022
82022
3d-aware adversarial makeup generation for facial privacy protection
Y Lyu, Y Jiang, Z He, B Peng, Y Liu, J Dong
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023
62023
Exposing fine-grained adversarial vulnerability of face anti-spoofing models
S Yang, W Wang, C Xu, Z He, B Peng, J Dong
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
42023
Defending against deepfakes with ensemble adversarial perturbation
W Guan, Z He, W Wang, J Dong, B Peng
2022 26th International Conference on Pattern Recognition (ICPR), 1952-1958, 2022
42022
Is it possible to backdoor face forgery detection with natural triggers?
X Han, S Yang, W Wang, Z He, J Dong
arXiv preprint arXiv:2401.00414, 2023
32023
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts
Y Li, S Yang, W Wang, Z He, B Peng, J Dong
arXiv preprint arXiv:2404.08341, 2024
12024
Exploiting Backdoors of Face Synthesis Detection with Natural Triggers
X Han, S Yang, W Wang, Z He, J Dong
ACM Transactions on Multimedia Computing, Communications and Applications, 2024
2024
A Brief Introduction to Visual Adversarial Samples
W Wei, D Jing, HE Ziwen, SUN Zhenan
Journal of Cyber Security 5 (2), 39-48, 2020
2020
Mitigating Social Biases in Text-to-Image Diffusion Models via Linguistic-Aligned Attention Guidance
Y Jiang, Y Lyu, Z He, B Peng, J Dong
ACM Multimedia 2024, 0
系统目前无法执行此操作,请稍后再试。
文章 1–13