Jing Dong

Orcid: 0000-0002-2763-7832

Affiliations:
  • Chinese Academy of Sciences, Institute of Automation, Center for Research on Intelligent Perception and Computing, Beijing, China (PhD 2010)


According to our database1, Jing Dong authored at least 118 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

DRAN: Detailed Region-Adaptive Normalization for Conditional Image Synthesis.
IEEE Trans. Multim., 2024

Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization.
IEEE Trans. Inf. Forensics Secur., 2024

Artifact feature purification for cross-domain detection of AI-generated images.
Comput. Vis. Image Underst., 2024

Probing Unlearned Diffusion Models: A Transferable Adversarial Attack Perspective.
CoRR, 2024

Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space.
CoRR, 2024

Artifact Feature Purification for Cross-domain Detection of AI-generated Images.
CoRR, 2024

Beyond Inserting: Learning Identity Embedding for Semantic-Fidelity Personalized Diffusion Generation.
CoRR, 2024

Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?
CoRR, 2024

ST-SBV: Spatial-Temporal Self-Blended Videos for Deepfake Detection.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Mitigating Social Biases in Text-to-Image Diffusion Models via Linguistic-Aligned Attention Guidance.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Freestyle 3D-Aware Portrait Synthesis Based on Compositional Generative Priors.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

SPI2I: Structure-Preserved Image-to-Image Translation with Diffusion Models.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

S<sup>3</sup>D-NeRF: Single-Shot Speech-Driven Neural Radiance Field for High Fidelity Talking Head Synthesis.
Proceedings of the Computer Vision - ECCV 2024, 2024

Learning Dense Correspondence for NeRF-Based Face Reenactment.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
3D-Aware Adversarial Makeup Generation for Facial Privacy Protection.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and Localization.
IEEE Trans. Neural Networks Learn. Syst., April, 2023

Temporal sparse adversarial attack on sequence-based gait recognition.
Pattern Recognit., 2023

RS-Corrector: Correcting the Racial Stereotypes in Latent Diffusion Models.
CoRR, 2023

DeltaSpace: A Semantic-aligned Feature Space for Flexible Text-guided Image Editing.
CoRR, 2023

GaFET: Learning Geometry-aware Facial Expression Translation from In-The-Wild Images.
CoRR, 2023

Free-style and Fast 3D Portrait Synthesis.
CoRR, 2023

Collaborative Feature Learning for Fine-grained Facial Forgery Detection and Segmentation.
CoRR, 2023

DeltaEdit: Exploring Text-free Training for Text-Driven Image Manipulation.
CoRR, 2023

RiDDLE: Reversible and Diversified De-identification with Latent Encryptor.
CoRR, 2023

Context-Aware Talking-Head Video Editing.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Visual Realism Assessment for Face-Swap Videos.
Proceedings of the Image and Graphics - 12th International Conference, 2023

DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Designing A 3d-Aware Stylenerf Encoder for Face Editing.
Proceedings of the IEEE International Conference on Acoustics, 2023

Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

CFFT-GAN: Cross-Domain Feature Fusion Transformer for Exemplar-Based Image Translation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Semantic 3D-Aware Portrait Synthesis and Manipulation Based on Compositional Neural Radiance Field.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Unified Framework for High Fidelity Face Swap and Expression Reenactment.
IEEE Trans. Circuits Syst. Video Technol., 2022

Revisiting ensemble adversarial attack.
Signal Process. Image Commun., 2022

Exposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing Models.
CoRR, 2022

Counterfactual Image Enhancement for Explanation of Face Swap Deepfakes.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

Defeating DeepFakes via Adversarial Visual Reconstruction.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

DesignerGAN: Sketch Your Own Photo.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

AdaDeId: Adjust Your Identity Attribute Freely.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Contrastive Knowledge Transfer for Deepfake Detection with Limited Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Defending Against Deepfakes with Ensemble Adversarial Perturbation.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

DFGC 2022: The Second DeepFake Game Competition.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Robust Face-Swap Detection Based on 3D Facial Shape Information.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022

IrisGuard: Image Forgery Detection for Iris Anti-spoofing.
Proceedings of the Biometric Recognition - 16th Chinese Conference, 2022

2021
Learning pose-invariant 3D object reconstruction from single-view images.
Neurocomputing, 2021

SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentation.
Comput. Vis. Image Underst., 2021

Detailed Region-Adaptive Normalization for Heavy Makeup Transfer.
CoRR, 2021

Transferable Sparse Adversarial Attack.
CoRR, 2021

Face Anonymization by Manipulating Decoupled Identity Representation.
CoRR, 2021

SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

DFGC 2021: A DeepFake Game Competition.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

MUST-GAN: Multi-Level Statistics Transfer for Self-Driven Person Image Generation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Exploring Adversarial Fake Images on Face Manifold.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

A Systematical Solution for Face De-identification.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

2020
Temporal Sparse Adversarial Attack on Gait Recognition.
CoRR, 2020

2019
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting.
IEEE Trans. Circuits Syst. Video Technol., 2019

Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning.
CoRR, 2019

A New Ensemble Method for Concessively Targeted Multi-model Attack.
CoRR, 2019

An Accurate LSTM Based Video Heart Rate Estimation Method.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

New Graph-Theoretic Approach to Social Steganography.
Proceedings of the Media Watermarking, 2019

On the Generalization of GAN Image Forensics.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

Any-to-one Face Reenactment Based on Conditional Generative Adversarial Network.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Image Forensics Based on Planar Contact Constraints of 3D Objects.
IEEE Trans. Inf. Forensics Secur., 2018

Feature learning for steganalysis using convolutional neural networks.
Multim. Tools Appl., 2018

Deep-MATEM: TEM query image based cross-modal retrieval for material science literature.
Multim. Tools Appl., 2018

Reversible data hiding in encrypted image with separable capability and high embedding capacity.
Inf. Sci., 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018

Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels.
CoRR, 2018

The Cut and Dominating Set Problem in A Steganographer Network.
CoRR, 2018

Reversible Embedding to Covers Full of Boundaries.
CoRR, 2018

Ensemble Reversible Data Hiding.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Feature Pyramid Deep Matching and Localization Network for Image Forensics.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Optimized 3D Lighting Environment Estimation for Image Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Process., 2017

Quantization based watermarking methods against valumetric distortions.
Int. J. Autom. Comput., 2017

A Simply Study to Steganography on Social Networks.
CoRR, 2017

SSGAN: Secure Steganography Based on Generative Adversarial Networks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Adaptive Histogram Shifting Based Reversible Data Hiding.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

MFC: A multi-scale fully convolutional approach for visual instance retrieval.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Influence Evaluation for Image Tampering Using Saliency Mechanism.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

Image Forgery Detection Based on Semantic Image Understanding.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

High Capacity Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
Perceptual image hashing with selective sampling for salient structure features.
Displays, 2016

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
CoRR, 2016

Learning and transferring representations for image steganalysis using convolutional neural network.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Improved 3D lighting environment estimation for image forgery detection.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Deep learning for steganalysis via convolutional neural networks.
Proceedings of the Media Watermarking, 2015

Robust steganalysis based on training set construction and ensemble classifiers weighting.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Local correlation pattern for image steganalysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Detection of computer generated faces in videos based on pulse signal.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Improved Robust Watermarking Based on Rational Dither Modulation.
Proceedings of the Advances in Image and Graphics Technologies - Chinese Conference, 2014

An effective watermarking method against valumetric distortions.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Video steganalysis based on the constraints of motion vectors.
Proceedings of the IEEE International Conference on Image Processing, 2013

Two Notes from Experimental Study on Image Steganalysis.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

CASIA Image Tampering Detection Evaluation Database.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Universal spatial feature set for video steganalysis.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Exploring DCT coefficient quantization effect for image tampering localization.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

An effective image steganalysis method based on neighborhood information of pixels.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New developments in color image tampering detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Image tampering detection based on stationary distribution of Markov chain.
Proceedings of the International Conference on Image Processing, 2010

2009
A Survey of Passive Image Tampering Detection.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Multi-class Blind Steganalysis Based on Image Run-Length Analysis.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Effective image splicing detection based on image chroma.
Proceedings of the International Conference on Image Processing, 2009

2008
Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Blind image steganalysis based on run-length histogram analysis.
Proceedings of the International Conference on Image Processing, 2008

Effects of watermarking on iris recognition performance.
Proceedings of the 10th International Conference on Control, 2008

2007
Fusion Based Blind Image Steganalysis by Boosting Feature Selection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007


  Loading...