Run Wang

Orcid: 0009-0000-9751-4013

According to our database1, Run Wang authored at least 77 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph-Diffusion-Based Domain-Invariant Representation Learning for Cross-Domain Facial Expression Recognition.
IEEE Trans. Comput. Soc. Syst., June, 2024

Common Latent Embedding Space for Cross-Domain Facial Expression Recognition.
IEEE Trans. Comput. Soc. Syst., April, 2024

Remote Intelligent Medical Monitoring Data Transmission Network Optimization based on Deep Learning.
Scalable Comput. Pract. Exp., 2024

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
CoRR, 2024

Perception-guided Jailbreak against Text-to-Image Models.
CoRR, 2024

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024

Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models.
CoRR, 2024

Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes.
CoRR, 2024

Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain.
CoRR, 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024

Poster: Resource-Efficient Environmental Sound Classification Using Hyperdimensional Computing.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Multi-Source Unsupervised Transfer Components Learning for Cross-Domain Speech Emotion Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2024

Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Distinct Impacts of Two Types of Developing El Niño-Southern Oscillations on Tibetan Plateau Summer Precipitation.
Remote. Sens., August, 2023

An Approach for Monitoring Shallow Surface Outcrop Mining Activities Based on Multisource Satellite Remote Sensing Data.
Remote. Sens., August, 2023

Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey.
IEEE Trans. Knowl. Data Eng., March, 2023

Progressive Geological Modeling and Uncertainty Analysis Using Machine Learning.
ISPRS Int. J. Geo Inf., 2023

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

Hard Adversarial Example Mining for Improving Robust Fairness.
CoRR, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Dual-level Interaction for Domain Adaptive Semantic Segmentation.
CoRR, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Dynamic Graph-Guided Transferable Regression for Cross-Domain Speech Emotion Recognition.
Proceedings of the Biometric Recognition - 17th Chinese Conference, 2023

2022
Better constraints of imperceptibility, better adversarial examples in the text.
Int. J. Intell. Syst., 2022

Countering Malicious DeepFakes: Survey, Battleground, and Horizon.
Int. J. Comput. Vis., 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Multi-scale Self-attention-based Few-shot Object Detection for Remote Sensing Images.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2022

MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
A note on marginal correlation based screening.
Stat. Anal. Data Min., 2021

Crops Fine Classification in Airborne Hyperspectral Imagery Based on Multi-Feature Fusion and Deep Learning.
Remote. Sens., 2021

PS-InSAR-Based Validated Landslide Susceptibility Mapping along Karakorum Highway, Pakistan.
Remote. Sens., 2021

Dynamic multi-channel metric network for joint pose-aware and identity-invariant facial expression recognition.
Inf. Sci., 2021

Maximizing the Smallest Eigenvalue of Grounded Laplacian Matrix.
CoRR, 2021

A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021

An End-to-End Rumor Detection Model Based on Feature Aggregation.
Complex., 2021

TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification.
IEEE Access, 2021

FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Research on Teaching Evaluation of Courses Based on Computer System Ability Training.
Proceedings of the Data Science, 2021

Exposing DeepFakes via Localizing the Manipulated Artifacts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

An Impartial Semi-Supervised Learning Strategy for Imbalanced Classification on VHR Images.
Sensors, 2020

A dynamic financial distress forecast model with multiple forecast results under unbalanced data environment.
Knowl. Based Syst., 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Hybrid RNN-ANN Based Deep Physiological Network for Pain Recognition.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Security Analysis of Home Agent Time-Stamped Binding Update Based on CS Logic.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
Mapping Height and Aboveground Biomass of Mangrove Forests on Hainan Island Using UAV-LiDAR Sampling.
Remote. Sens., 2019

Quantifying the Effects of Urban Form on Land Surface Temperature in Subtropical High-Density Urban Areas Using Machine Learning.
Remote. Sens., 2019

Efficiency of Extreme Gradient Boosting for Imbalanced Land Cover Classification Using an Extended Margin and Disagreement Performance.
ISPRS Int. J. Geo Inf., 2019

An approach for computing routes without complicated decision points in landmark-based pedestrian navigation.
Int. J. Geogr. Inf. Sci., 2019

Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces.
CoRR, 2019

A survey on Adversarial Attacks and Defenses in Text.
CoRR, 2019

IRIS: Smart Phone Aided Intelligent Reimbursement System Using Deep Learning.
IEEE Access, 2019

Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

Evaluating the Performance of Sentinel-2, Landsat 8 and Pléiades-1 in Mapping Mangrove Extent and Species.
Remote. Sens., 2018

A Parallel-Computing Approach for Vector Road-Network Matching Using GPU Architecture.
ISPRS Int. J. Geo Inf., 2018

2017
Mapping Regional Urban Extent Using NPP-VIIRS DNB and MODIS NDVI Data.
Remote. Sens., 2017

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

2015
Mapping US Urban Extents from MODIS Data Using One-Class Classification Method.
Remote. Sens., 2015

Prediction of the Yield of Enzymatic Synthesis of Betulinic Acid Ester Using Artificial Neural Networks and Support Vector Machine.
CoRR, 2015

Rigorous derivation and propagation speed property for a two-component Degasperis-Procesi system in shallow water regimes.
Appl. Math. Comput., 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2010
Estimation of urbanization effect on climatic warming over the recent 30 years in Guangzhou, South China.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010


  Loading...