Zobrazeno 1 - 10
of 1 906
pro vyhledávání: '"TANG Long"'
Autor:
Shen, Sipeng, Zhang, Yunming, Ye, Dengpan, Shi, Xiuwen, Tang, Long, Duan, Haoran, Deng, Jiacheng, Liu, Ziyi
While face recognition (FR) models have brought remarkable convenience in face verification and identification, they also pose substantial privacy risks to the public. Existing facial privacy protection schemes usually adopt adversarial examples to d
Externí odkaz:
http://arxiv.org/abs/2412.17038
Industrial control network (ICN) is characterized by real-time responsiveness and reliability, which plays a key role in increasing production speed, rational and efficient processing, and managing the production process. Despite tremendous advantage
Externí odkaz:
http://arxiv.org/abs/2412.14669
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks
Deep hash-based retrieval techniques are widely used in facial retrieval systems to improve the efficiency of facial matching. However, it also carries the danger of exposing private information. Deep hash models are easily influenced by adversarial
Externí odkaz:
http://arxiv.org/abs/2412.09692
Autor:
Xie, Caiyun, Ye, Dengpan, Zhang, Yunming, Tang, Long, Lv, Yunna, Deng, Jiacheng, Song, Jiawei
The security of AI-generated content (AIGC) detection is crucial for ensuring multimedia content credibility. To enhance detector security, research on adversarial attacks has become essential. However, most existing adversarial attacks focus only on
Externí odkaz:
http://arxiv.org/abs/2412.06727
With the development of artificial intelligence, neural networks play a key role in network intrusion detection systems (NIDS). Despite the tremendous advantages, neural networks are susceptible to adversarial attacks. To improve the reliability of N
Externí odkaz:
http://arxiv.org/abs/2409.12472
Autor:
Tang Long, Vumar Elkin
Publikováno v:
Discussiones Mathematicae Graph Theory, Vol 40, Iss 1, Pp 77-84 (2020)
Let 𝒫 be a property of a graph. A graph G is said to be locally 𝒫, if the subgraph induced by the open neighbourhood of every vertex in G has property 𝒫. Ryjáček conjectures that every connected, locally connected graph is weakly pancyclic
Externí odkaz:
https://doaj.org/article/dfd2039c420841d692e19e0fe5141083
Autor:
Zhang, Yunming, Ye, Dengpan, Xie, Caiyun, Shen, Sipeng, Liu, Ziyi, Deng, Jiacheng, Tang, Long
The wide deployment of Face Recognition (FR) systems poses privacy risks. One countermeasure is adversarial attack, deceiving unauthorized malicious FR, but it also disrupts regular identity verification of trusted authorizers, exacerbating the poten
Externí odkaz:
http://arxiv.org/abs/2404.14693
With the continuous improvements of deepfake methods, forgery messages have transitioned from single-modality to multi-modal fusion, posing new challenges for existing forgery detection algorithms. In this paper, we propose AVT2-DWF, the Audio-Visual
Externí odkaz:
http://arxiv.org/abs/2403.14974
Autor:
Carolina Soekmadji, Bo Li, Yiyao Huang, Haifang Wang, Taixue An, Chunchen Liu, Weilun Pan, Jing Chen, Lesley Cheung, Juan Manuel Falcon-Perez, Yong Song Gho, Harry B. Holthofer, Minh T. N. Le, Antonio Marcilla, Lorraine O’Driscoll, Faezeh Shekari, Tang Long Shen, Ana Claudia Torrecilhas, Xiaomei Yan, Fuquan Yang, Hang Yin, Yu Xiao, Zezhou Zhao, Xue Zou, Qian Wang, Lei Zheng
Publikováno v:
Journal of Extracellular Vesicles, Vol 9, Iss 1 (2020)
The utilization of extracellular vesicles (EVs) in clinical theranostics has rapidly advanced in the past decade. In November 2018, the International Society for Extracellular Vesicles (ISEV) held a workshop on “EVs in Clinical Theranostic”. Here
Externí odkaz:
https://doaj.org/article/263ca225604b4e7e8d175495127a08a8
Autor:
Zhang, Yunming, Ye, Dengpan, Xie, Caiyun, Tang, Long, Chen, Chuanxi, Liu, Ziyi, Deng, Jiacheng
The malicious applications of deep forgery, represented by face swapping, have introduced security threats such as misinformation dissemination and identity fraud. While some research has proposed the use of robust watermarking methods to trace the c
Externí odkaz:
http://arxiv.org/abs/2310.16540