UM

Browse/Search Results:  1-10 of 51 Help

Selected(0)Clear Items/Page:    Sort:
Face Omron Ring: Proactive defense against face forgery with identity awareness Journal article
Dai, Yunshu, Fei, Jianwei, Huang, Fangjun, Xia, Zhihua. Face Omron Ring: Proactive defense against face forgery with identity awareness[J]. Neural Networks, 2024, 180, 106639.
Authors:  Dai, Yunshu;  Fei, Jianwei;  Huang, Fangjun;  Xia, Zhihua
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.0/7.9 | Submit date:2024/09/03
Celebrities Protection  Deep Neural Networks  Face Forgery  Identity Awareness  Proactive Defense  
X2-Softmax: Margin adaptive loss function for face recognition Journal article
Xu, Jiamu, Liu, Xiaoxiang, Zhang, Xinyuan, Si, Yain Whar, Li, Xiaofan, Shi, Zheng, Wang, Ke, Gong, Xueyuan. X2-Softmax: Margin adaptive loss function for face recognition[J]. Expert Systems with Applications, 2024, 249, 123791.
Authors:  Xu, Jiamu;  Liu, Xiaoxiang;  Zhang, Xinyuan;  Si, Yain Whar;  Li, Xiaofan; et al.
Favorite | TC[WOS]:0 TC[Scopus]:2  IF:7.5/7.6 | Submit date:2024/05/16
Adaptive Margins  Deep Neural Networks  Face Recognition  Loss Function  Machine Learning  
Editorial: Information theory meets deep neural networks: theory and applications Other
2024-07-15
Authors:  Zhang, Anguo;  Zhang, Qichun;  Zhao, Kai
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2024/08/05
Artificial Neural Networks  Deep Learning—artificial Intelligence  Deep Neural Networks (Dnns)  Information Bottleneck  Information Theory  
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training Journal article
Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li. Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34(3), 1857-1872.
Authors:  Yuanman Li;  Liangpei Hu;  Li Dong;  Haiwei Wu;  Jinyu Tian; et al.
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:8.3/7.1 | Submit date:2023/08/28
Inpainting Forensics  Constrained Adversarial Training  Generalizability  Deep Neural Networks  
Extreme Fuzzy Broad Learning System: Algorithm, Frequency Principle, and Applications in Classification and Regression Journal article
Duan, Junwei, Yao, Shiyi, Tan, Jiantao, Liu, Yang, Chen, Long, Zhang, Zhen, Chen, C. L.P.. Extreme Fuzzy Broad Learning System: Algorithm, Frequency Principle, and Applications in Classification and Regression[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:  Duan, Junwei;  Yao, Shiyi;  Tan, Jiantao;  Liu, Yang;  Chen, Long; et al.
Favorite | TC[WOS]:2 TC[Scopus]:1  IF:10.2/10.4 | Submit date:2024/05/16
Broad Learning System (Bls)  Classification  Deep Neural Network  Feature Extraction  Frequency Principle  Fuzzy Extreme Learning Machine (Elm)  Learning Systems  Mathematical Models  Neural Networks  Regression  Stacking  Task Analysis  Training  
Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet Journal article
Feng, Guangxu, Lao, Keng Weng, Chen, Ge. Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet[J]. IEEE Transactions on Smart Grid, 2024.
Authors:  Feng, Guangxu;  Lao, Keng Weng;  Chen, Ge
Favorite | TC[Scopus]:0  IF:8.6/9.6 | Submit date:2024/07/04
Bayes Methods  Bayesian Neural Network  Current Measurement  Deep Learning  Epistemic Uncertainty  False Data Injection Attack  Neural Networks  Out-of-distribution Detection  Training  Uncertainty  Uncertainty Calibration  Vectors  
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning Journal article
Wu, Haiwei, Zhou, Jiantao, Zhang, Xinyu, Tian, Jinyu, Sun, Weiwei. Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 148-162.
Authors:  Wu, Haiwei;  Zhou, Jiantao;  Zhang, Xinyu;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2024/05/16
Camera Model Identification  Deep Neural Networks  Online Social Networks  Robustness  
Towards evaluating the robustness of deep neural semantic segmentation networks with Feature-Guided Method Journal article
Xiao, Yatie, Pun, Chi Man, Chen, Kongyang. Towards evaluating the robustness of deep neural semantic segmentation networks with Feature-Guided Method[J]. Knowledge-Based Systems, 2023, 281, 111063.
Authors:  Xiao, Yatie;  Pun, Chi Man;  Chen, Kongyang
Favorite | TC[WOS]:2 TC[Scopus]:3  IF:7.2/7.4 | Submit date:2024/01/02
Adversarial Attack  Deep Neural Networks  Feature Guide  Segmentation  
SpikoPoniC: A Low-Cost Spiking Neuromorphic Computer for Smart Aquaponics Journal article
Siddique, Ali, Sun, Jingqi, Hou, Kung Jui, Vai, Mang I., Pun, Sio Hang, Iqbal, Muhammad Azhar. SpikoPoniC: A Low-Cost Spiking Neuromorphic Computer for Smart Aquaponics[J]. Agriculture (Switzerland), 2023, 13(11).
Authors:  Siddique, Ali;  Sun, Jingqi;  Hou, Kung Jui;  Vai, Mang I.;  Pun, Sio Hang; et al.
Favorite | TC[WOS]:3 TC[Scopus]:5 | Submit date:2024/01/10
Artificial Intelligence  Deep Learning  Digital Agriculture  Internet Of Things (Iot)  Neuromorphic Chips  On-chip Learning  Precision Agriculture  Smart Aquaponics  Smart Farming  Spiking Neural Networks