Initializing film homogeneity to retard phase segregation for stable perovskite solar cells Y Bai, Z Huang, X Zhang, J Lu, X Niu, Z He, C Zhu, M Xiao, Q Song, X Wei, ... Science 378 (6621), 747-754, 2022 | 112 | 2022 |
Transferable sparse adversarial attack Z He, W Wang, J Dong, T Tan arXiv preprint arXiv:2105.14727, 2021 | 26 | 2021 |
Temporal sparse adversarial attack on sequence-based gait recognition Z He, W Wang, J Dong, T Tan Pattern Recognition 133, 109028, 2023 | 22 | 2023 |
Defeating deepfakes via adversarial visual reconstruction Z He, W Wang, W Guan, J Dong, T Tan Proceedings of the 30th ACM International Conference on Multimedia, 2464-2472, 2022 | 18 | 2022 |
Revisiting ensemble adversarial attack Z He, W Wang, J Dong, T Tan Signal Processing: Image Communication 107, 116747, 2022 | 8 | 2022 |
3d-aware adversarial makeup generation for facial privacy protection Y Lyu, Y Jiang, Z He, B Peng, Y Liu, J Dong IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023 | 6 | 2023 |
Exposing fine-grained adversarial vulnerability of face anti-spoofing models S Yang, W Wang, C Xu, Z He, B Peng, J Dong Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 4 | 2023 |
Defending against deepfakes with ensemble adversarial perturbation W Guan, Z He, W Wang, J Dong, B Peng 2022 26th International Conference on Pattern Recognition (ICPR), 1952-1958, 2022 | 4 | 2022 |
Is it possible to backdoor face forgery detection with natural triggers? X Han, S Yang, W Wang, Z He, J Dong arXiv preprint arXiv:2401.00414, 2023 | 3 | 2023 |
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts Y Li, S Yang, W Wang, Z He, B Peng, J Dong arXiv preprint arXiv:2404.08341, 2024 | 1 | 2024 |
Exploiting Backdoors of Face Synthesis Detection with Natural Triggers X Han, S Yang, W Wang, Z He, J Dong ACM Transactions on Multimedia Computing, Communications and Applications, 2024 | | 2024 |
A Brief Introduction to Visual Adversarial Samples W Wei, D Jing, HE Ziwen, SUN Zhenan Journal of Cyber Security 5 (2), 39-48, 2020 | | 2020 |
Mitigating Social Biases in Text-to-Image Diffusion Models via Linguistic-Aligned Attention Guidance Y Jiang, Y Lyu, Z He, B Peng, J Dong ACM Multimedia 2024, 0 | | |