UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Frequency-constrained transferable adversarial attack on image manipulation detection and localization Journal article
Zeng, Yijia, Pun, Chi Man. Frequency-constrained transferable adversarial attack on image manipulation detection and localization[J]. The Visual Computer, 2024, 40(7), 4817-4828.
Authors:  Zeng, Yijia;  Pun, Chi Man
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.0/3.0 | Submit date:2024/07/04
Adversarial Attack  Forgery Image Detection And Localization  Reverse Image Forensics  Transferability  
Travel demand management policies: A case study of Singapore and transferability potentials for Hanoi Journal article
Dinh Toan, Trinh, Hoi Lam, Soi, Meng, Meng, Diew Wong, Yiik. Travel demand management policies: A case study of Singapore and transferability potentials for Hanoi[J]. Case Studies on Transport Policy, 2022, 11, 100934.
Authors:  Dinh Toan, Trinh;  Hoi Lam, Soi;  Meng, Meng;  Diew Wong, Yiik
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:2.4/2.5 | Submit date:2023/04/03
Comprehensive Framework  Policy Transfer  Transferability  Transport Policy  Travel Demand Management