The visual object tracking vot2015 challenge results M Kristan, J Matas, A Leonardis, M Felsberg, L Cehovin, G Fernandez, ... Proceedings of the IEEE international conference on computer vision …, 2015 | 2720* | 2015 |
Celeb-df: A large-scale challenging dataset for deepfake forensics Y Li, X Yang, P Sun, H Qi, S Lyu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 1245 | 2020 |
In ictu oculi: Exposing ai created fake videos by detecting eye blinking Y Li, MC Chang, S Lyu 2018 IEEE International workshop on information forensics and security (WIFS …, 2018 | 1046* | 2018 |
Exposing deepfake videos by detecting face warping artifacts Y Li, S Lyu CVPR Workshop on Media Forensics, 2018 | 1039 | 2018 |
Exposing deep fakes using inconsistent head poses X Yang, Y Li, S Lyu ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019 | 1030 | 2019 |
Detecting hidden messages using higher-order statistics and support vector machines S Lyu, H Farid International Workshop on information hiding, 340-354, 2002 | 752 | 2002 |
UA-DETRAC: A new benchmark and protocol for multi-object detection and tracking L Wen, D Du, Z Cai, Z Lei, MC Chang, H Qi, J Lim, MH Yang, S Lyu Computer Vision and Image Understanding 193, 102907, 2020 | 663 | 2020 |
Steganalysis using higher-order image statistics S Lyu, H Farid IEEE transactions on Information Forensics and Security 1 (1), 111-119, 2006 | 576 | 2006 |
Region duplication detection using image feature matching X Pan, S Lyu IEEE Transactions on Information Forensics and Security 5 (4), 857-867, 2010 | 563 | 2010 |
How realistic is photorealistic? S Lyu, H Farid IEEE Transactions on Signal Processing 53 (2), 845-850, 2005 | 480 | 2005 |
Invisible backdoor attack with sample-specific triggers Y Li, Y Li, B Wu, L Li, R He, S Lyu Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 399 | 2021 |
Multi-scale structure-aware network for human pose estimation L Ke, MC Chang, H Qi, S Lyu Proceedings of the european conference on computer vision (ECCV), 713-728, 2018 | 352 | 2018 |
Object-driven text-to-image synthesis via adversarial training W Li, P Zhang, L Zhang, Q Huang, X He, S Lyu, J Gao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019 | 346 | 2019 |
Higher-order wavelet statistics and their application to digital forensics H Farid, S Lyu 2003 Conference on Computer Vision and Pattern Recognition Workshop 8, 94-94, 2003 | 328 | 2003 |
Exposing region splicing forgeries with blind local noise estimation S Lyu, X Pan, X Zhang International journal of computer vision 110 (2), 202-221, 2014 | 293* | 2014 |
Steganalysis using color wavelet statistics and one-class support vector machines S Lyu, H Farid Security, steganography, and watermarking of multimedia contents VI 5306, 35-45, 2004 | 288 | 2004 |
A digital technique for art authentication S Lyu, D Rockmore, H Farid Proceedings of the National Academy of Sciences 101 (49), 17006-17010, 2004 | 249 | 2004 |
Nonlinear image representation using divisive normalization S Lyu, EP Simoncelli 2008 IEEE Conference on Computer Vision and Pattern Recognition, 1-8, 2008 | 200 | 2008 |
Deepfake detection: Current challenges and next steps S Lyu 2020 IEEE international conference on multimedia & expo workshops (ICMEW), 1-6, 2020 | 196 | 2020 |
Stochastic online AUC maximization Y Ying, L Wen, S Lyu Advances in neural information processing systems 29, 2016 | 194 | 2016 |