Personensuche
X
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
2
Enhancing Robustness of LLM-Synthetic Text Detectors for Ac..:
, In:
?
Digital Forensics and Watermarking; Lecture Notes in Computer Science ,
3
From Deconstruction to Reconstruction: A Plug-In Module for..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
5
Leveraging Chat-Based Large Vision Language Models for Mult..:
, In:
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
7
Analysis of Master Vein Attacks on Finger Vein Recognition ..:
, In:
?
2023 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) ,
8
Image-Text Out-Of-Context Detection Using Synthetic Multimo..:
, In:
?
Proceedings of the 31st ACM International Conference on Multimedia ,
10
Physics-Based Adversarial Attack on Near-Infrared Human Det..:
, In:
?
2023 IEEE International Joint Conference on Biometrics (IJCB) ,
11
How Close Are Other Computer Vision Tasks to Deepfake Detec..:
, In:
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW) ,
12
Face Forgery Detection Based on Facial Region Displacement ..:
, In:
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
13
Closer Look at the Transferability of Adversarial Examples:..:
, In:
?
2023 30th Asia-Pacific Software Engineering Conference (APSEC) ,
14