Bei-Bei Liu

Orcid: 0009-0008-7253-979X

According to our database1, Bei-Bei Liu authored at least 61 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intelligent Sensing of Thermal Error of CNC Machine Tool Spindle Based on Multi-Source Information Fusion.
Sensors, June, 2024

MadFormer: multi-attention-driven image super-resolution method based on Transformer.
Multim. Syst., April, 2024

Confidence-Aware Object Capture for a Manipulator Subject to Floating-Base Disturbances.
IEEE Trans. Robotics, 2024

Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Multimodal Proxy-Free Face Anti-Spoofing Exploiting Local Patch Features.
IEEE Signal Process. Lett., 2024

Boosting Deepfake Feature Extractors Using Unsupervised Domain Adaptation.
IEEE Signal Process. Lett., 2024

Exploring Static-Dynamic ID Matching and Temporal Static ID Inconsistency for Generalizable Deepfake Detection.
IET Biom., 2024

A Bilingual Templates Data Augmentation Method for Low-Resource Neural Machine Translation.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
Learnable Information-Preserving Image Resizer for Face Forgery Detection.
IEEE Signal Process. Lett., 2023

STA: An efficient data augmentation method for low-resource neural machine translation.
J. Intell. Fuzzy Syst., 2023

Explore the difficulty of words and its influential attributes based on the Wordle game.
CoRR, 2023

Detecting Deepfakes in Alternative Color Spaces to Withstand Unseen Corruptions.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Hybrid Domain Meta-Learning Network for Face Forgery Detection and Localization in Deepfakes.
Proceedings of the International Joint Conference on Neural Networks, 2023

Glancing Text and Vision Regularized Training to Enhance Machine Translation.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

ML-Assisted Optimization of Securities Lending.
Proceedings of the 4th ACM International Conference on AI in Finance, 2023

2022
UmeTrack: Unified multi-view end-to-end hand tracking for VR.
Proceedings of the SIGGRAPH Asia 2022 Conference Papers, 2022

A Robust Blind Watermarking Scheme Based on Attention Mechanism and Neural Joint Source-Channel Coding.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Chinese vascular ultrasound report Generation based on LSTM-RNN-Attention model.
Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, 2022

2021
Two-Stream Compare and Contrast Network for Vertebral Compression Fracture Diagnosis.
IEEE Trans. Medical Imaging, 2021

Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction.
IEEE Signal Process. Lett., 2021

An HEVC steganalytic approach against motion vector modification using local optimality in candidate list.
Pattern Recognit. Lett., 2021

Double-Stream Segmentation Network with Temporal Self-attention for Deepfake Video Detection.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Exposing Deepfake Videos with Spatial, Frequency and Multi-scale Temporal Artifacts.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Deepfake Detection Using Robust Spatial and Temporal Features from Facial Landmarks.
Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics, 2021

2020
MEgATrack: monochrome egocentric articulated hand-tracking for virtual reality.
ACM Trans. Graph., 2020

Selection-Channel-Aware Deep Neural Network to Detect Motion Vector Embedding of HEVC Videos.
Proceedings of the IEEE International Conference on Signal Processing, 2020

Exposing Deepfake Videos by Tracking Eye Movements.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

A New Efficient Finger-Vein Verification Based on Lightweight Neural Network Using Multiple Schemes.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Face Anti-spoofing with a Noise-Attention Network Using Color-Channel Difference Images.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of HEVC Videos.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Computational Insights into the Catalytic Mechanism of Bacterial Carboxylic Acid Reductase.
J. Chem. Inf. Model., 2019

The Discussion on Interior Design Mode Based on 3D Virtual Vision Technology.
J. Adv. Comput. Intell. Intell. Informatics, 2019

Doubly Nonnegative and Semidefinite Relaxations for the Densest <i>k</i>-Subgraph Problem.
Entropy, 2019

Auto-Zooming CNN-Based Framework for Real-Time Pedestrian Detection in Outdoor Surveillance Videos.
IEEE Access, 2019

Multi-Label-Based Similarity Learning for Vehicle Re-Identification.
IEEE Access, 2019

Variational Representation Learning for Vehicle Re-Identification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Online optical marker-based hand tracking with deep labels.
ACM Trans. Graph., 2018

2017
ESES: Software for Eulerian solvent excluded surface.
J. Comput. Chem., 2017

Spectral Affine-Kernel Embeddings.
Comput. Graph. Forum, 2017

2016
Discrete Connection and Covariant Derivative for Vector Field Analysis and Design.
ACM Trans. Graph., 2016

<i>Power coordinates</i>: a geometric construction of barycentric coordinates on convex polytopes.
ACM Trans. Graph., 2016

Optimal voronoi tessellations with hessian-based anisotropy.
ACM Trans. Graph., 2016

Subdivision based isogeometric analysis technique for electric field integral equations for simply connected structures.
J. Comput. Phys., 2016

A security analysis of automated chinese turing tests.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Model-reduced variational fluid simulation.
ACM Trans. Graph., 2015

Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
Discrete 2-Tensor Fields on Triangulations.
Comput. Graph. Forum, 2014

2013
Orientation Field Guided Texture Synthesis.
J. Comput. Sci. Technol., 2013

A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords.
J. Comput. Syst. Sci., 2013

Audio forensic authentication based on MOCC between ENF and reference signals.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Fast Image Artistic Style Learning Using Twin-Codebook Vector Quantization.
J. Inf. Hiding Multim. Signal Process., 2012

An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery.
Int. J. Digit. Crime Forensics, 2012

Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2010
On classification of source cameras: A graph based approach.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Source camera identification from significant noise residual regions.
Proceedings of the International Conference on Image Processing, 2010

2009
An improved lossless data hiding scheme based on image VQ-index residual value coding.
J. Syst. Softw., 2009

Image colourisation using graph-based semi-supervised learning.
IET Image Process., 2009

2008
Pornographic Images Detection Based on CBIR and Skin Analysis.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

Comments on "A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition".
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008


  Loading...