Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu arXiv preprint arXiv:1909.06122, 2019 | 276 | 2019 |
Countering malicious deepfakes: Survey, battleground, and horizon F Juefei-Xu, R Wang, Y Huang, Q Guo, L Ma, Y Liu International journal of computer vision 130 (7), 1678-1734, 2022 | 121 | 2022 |
Deepsonar: Towards effective and robust detection of ai-synthesized fake voices R Wang, F Juefei-Xu, Y Huang, Q Guo, X Xie, L Ma, Y Liu Proceedings of the 28th ACM international conference on multimedia, 1207-1216, 2020 | 104 | 2020 |
Fakelocator: Robust localization of gan-based face manipulations Y Huang, F Juefei-Xu, Q Guo, Y Liu, G Pu IEEE Transactions on Information Forensics and Security 17, 2657-2672, 2022 | 93* | 2022 |
Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction Y Huang, F Juefei-Xu, R Wang, Q Guo, L Ma, X Xie, J Li, W Miao, Y Liu, ... Proceedings of the 28th ACM international conference on multimedia, 1217-1226, 2020 | 68 | 2020 |
Amora: Black-box adversarial morphing attack R Wang, F Juefei-Xu, Q Guo, Y Huang, X Xie, L Ma, Y Liu Proceedings of the 28th ACM International Conference on Multimedia, 1376-1385, 2020 | 50 | 2020 |
Dodging deepfake detection via implicit spatial-domain notch filtering Y Huang, F Juefei-Xu, Q Guo, Y Liu, G Pu IEEE Transactions on Circuits and Systems for Video Technology, 2023 | 33* | 2023 |
Evading deepfake detectors via adversarial statistical consistency Y Hou, Q Guo, Y Huang, X Xie, L Ma, J Zhao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 28 | 2023 |
Personalization as a shortcut for few-shot backdoor attack against text-to-image diffusion models Y Huang, F Juefei-Xu, Q Guo, J Zhang, Y Wu, M Hu, T Li, G Pu, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21169 …, 2024 | 16* | 2024 |
On the robustness of segment anything Y Huang, Y Cao, T Li, F Juefei-Xu, D Lin, IW Tsang, Y Liu, Q Guo arXiv preprint arXiv:2305.16220, 2023 | 13 | 2023 |
Ala: Naturalness-aware adversarial lightness attack Y Huang, L Sun, Q Guo, F Juefei-Xu, J Zhu, J Feng, Y Liu, G Pu arXiv preprint arXiv:2201.06070, 2022 | 12* | 2022 |
AdvFilter: predictive perturbation-aware filtering against adversarial attack via multi-domain learning Y Huang, Q Guo, F Juefei-Xu, L Ma, W Miao, Y Liu, G Pu Proceedings of the 29th ACM International Conference on Multimedia, 395-403, 2021 | 11 | 2021 |
FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain J Feng, W Miao, H Zheng, Y Huang, J Li, Z Wang, T Su, B Gu, G Pu, ... Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 11 | 2020 |
A mutation-based method for multi-modal jailbreaking attack detection X Zhang, C Zhang, T Li, Y Huang, X Jia, X Xie, Y Liu, C Shen arXiv preprint arXiv:2312.10766, 2023 | 8 | 2023 |
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network Y Huang, F Juefei-Xu, Q Guo, G Pu, Y Liu IEEE Transactions on Multimedia, 2023 | 8* | 2023 |
Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces. arXiv 2019 R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu arXiv preprint arXiv:1909.06122, 0 | 5 | |
Protect federated learning against backdoor attacks via data-free trigger generation Y Yang, M Hu, Y Cao, J Xia, Y Huang, Y Liu, M Chen arXiv preprint arXiv:2308.11333, 2023 | 4 | 2023 |
FedCross: Towards accurate federated learning via multi-model cross aggregation M Hu, P Zhou, Z Yue, Z Ling, Y Huang, Y Liu, M Chen arXiv preprint arXiv:2210.08285, 2022 | 4 | 2022 |
Prema: a tool for precise requirements editing, modeling and analysis Y Huang, J Feng, H Zheng, J Zhu, S Wang, S Jiang, W Miao, G Pu 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 4 | 2019 |
Gitfl: Adaptive asynchronous federated learning using version control M Hu, Z Xia, Z Yue, J Xia, Y Huang, Y Liu, M Chen arXiv preprint arXiv:2211.12049, 2022 | 3 | 2022 |