Wei Wang

Orcid: 0000-0002-8598-0831

Affiliations:
  • Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing (CRIPAC), Beijing, China (since 2012)
  • North China Electric Power University, China (former)


According to our database1, Wei Wang authored at least 106 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TCNet: tensor and covariance attention network for semantic segmentation.
Soft Comput., June, 2024

Deep Stereo Network With MRF-Based Cost Aggregation.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

PPNet : pooling position attention network for semantic segmentation.
Multim. Tools Appl., April, 2024

Robust Variable Impedance Control for Aerial Compliant Interaction With Stability Guarantee.
IEEE Trans. Ind. Informatics, March, 2024

Adversarial Attacks on Scene Graph Generation.
IEEE Trans. Inf. Forensics Secur., 2024

Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization.
IEEE Trans. Inf. Forensics Secur., 2024

Robust Adversarial Watermark Defending Against GAN Synthesization Attack.
IEEE Signal Process. Lett., 2024

Probing Unlearned Diffusion Models: A Transferable Adversarial Attack Perspective.
CoRR, 2024

Beyond Inserting: Learning Identity Embedding for Semantic-Fidelity Personalized Diffusion Generation.
CoRR, 2024

Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?
CoRR, 2024

ST-SBV: Spatial-Temporal Self-Blended Videos for Deepfake Detection.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

S<sup>3</sup>D-NeRF: Single-Shot Speech-Driven Neural Radiance Field for High Fidelity Talking Head Synthesis.
Proceedings of the Computer Vision - ECCV 2024, 2024

Learning Dense Correspondence for NeRF-Based Face Reenactment.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples.
Neurocomputing, September, 2023

Deep Confidence Propagation Stereo Network.
IEEE Trans. Intell. Transp. Syst., August, 2023

Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Temporal sparse adversarial attack on sequence-based gait recognition.
Pattern Recognit., 2023

Few-shot learning with unsupervised part discovery and part-aligned similarity.
Pattern Recognit., 2023

Collaborative Feature Learning for Fine-grained Facial Forgery Detection and Segmentation.
CoRR, 2023

RiDDLE: Reversible and Diversified De-identification with Latent Encryptor.
CoRR, 2023

Deep Stereo Matching with Superpixel Based Feature and Cost.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Context-Aware Talking-Head Video Editing.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Designing A 3d-Aware Stylenerf Encoder for Face Editing.
Proceedings of the IEEE International Conference on Acoustics, 2023

Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection.
IEEE Trans. Inf. Forensics Secur., 2022

A Unified Framework for High Fidelity Face Swap and Expression Reenactment.
IEEE Trans. Circuits Syst. Video Technol., 2022

Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Revisiting ensemble adversarial attack.
Signal Process. Image Commun., 2022

Cross-Domain Cross-Set Few-Shot Learning via Learning Compact and Aligned Representations.
CoRR, 2022

Exposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing Models.
CoRR, 2022

Counterfactual Image Enhancement for Explanation of Face Swap Deepfakes.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

Defeating DeepFakes via Adversarial Visual Reconstruction.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

AdaDeId: Adjust Your Identity Attribute Freely.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Contrastive Knowledge Transfer for Deepfake Detection with Limited Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Defending Against Deepfakes with Ensemble Adversarial Perturbation.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

DFGC 2022: The Second DeepFake Game Competition.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Robust Face-Swap Detection Based on 3D Facial Shape Information.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022

IrisGuard: Image Forgery Detection for Iris Anti-spoofing.
Proceedings of the Biometric Recognition - 16th Chinese Conference, 2022

2021
Are You Confident That You Have Successfully Generated Adversarial Examples?
IEEE Trans. Circuits Syst. Video Technol., 2021

Adversarial Analysis for Source Camera Identification.
IEEE Trans. Circuits Syst. Video Technol., 2021

A new globally adaptive k-nearest neighbor classifier based on local mean optimization.
Soft Comput., 2021

Learning pose-invariant 3D object reconstruction from single-view images.
Neurocomputing, 2021

Transferable Sparse Adversarial Attack.
CoRR, 2021

Face Anonymization by Manipulating Decoupled Identity Representation.
CoRR, 2021

SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

DFGC 2021: A DeepFake Game Competition.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021

MUST-GAN: Multi-Level Statistics Transfer for Self-Driven Person Image Generation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Exploring Adversarial Fake Images on Face Manifold.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

A Systematical Solution for Face De-identification.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

2020
A new fast search algorithm for exact k-nearest neighbors based on optimal triangle-inequality-based check strategy.
Knowl. Based Syst., 2020

Temporal Sparse Adversarial Attack on Gait Recognition.
CoRR, 2020

2019
Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning.
CoRR, 2019

A New Ensemble Method for Concessively Targeted Multi-model Attack.
CoRR, 2019

An Accurate LSTM Based Video Heart Rate Estimation Method.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

New Graph-Theoretic Approach to Social Steganography.
Proceedings of the Media Watermarking, 2019

On the Generalization of GAN Image Forensics.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

Any-to-one Face Reenactment Based on Conditional Generative Adversarial Network.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Image Forensics Based on Planar Contact Constraints of 3D Objects.
IEEE Trans. Inf. Forensics Secur., 2018

Feature learning for steganalysis using convolutional neural networks.
Multim. Tools Appl., 2018

Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels.
CoRR, 2018

The Cut and Dominating Set Problem in A Steganographer Network.
CoRR, 2018

Reversible Embedding to Covers Full of Boundaries.
CoRR, 2018

Ensemble Reversible Data Hiding.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Feature Pyramid Deep Matching and Localization Network for Image Forensics.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Optimized 3D Lighting Environment Estimation for Image Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2017

Vehicle counting based on double virtual lines.
Signal Image Video Process., 2017

Quantization based watermarking methods against valumetric distortions.
Int. J. Autom. Comput., 2017

A Simply Study to Steganography on Social Networks.
CoRR, 2017

Matrix Separation Based on LMaFit-Seed.
Comput. J., 2017

SSGAN: Secure Steganography Based on Generative Adversarial Networks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Adaptive Histogram Shifting Based Reversible Data Hiding.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

MFC: A multi-scale fully convolutional approach for visual instance retrieval.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Image Forgery Detection Based on Semantic Image Understanding.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

High Capacity Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
CoRR, 2016

Learning and transferring representations for image steganalysis using convolutional neural network.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Improved 3D lighting environment estimation for image forgery detection.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Deep learning for steganalysis via convolutional neural networks.
Proceedings of the Media Watermarking, 2015

Robust steganalysis based on training set construction and ensemble classifiers weighting.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Local correlation pattern for image steganalysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Detection of computer generated faces in videos based on pulse signal.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Improved Robust Watermarking Based on Rational Dither Modulation.
Proceedings of the Advances in Image and Graphics Technologies - Chinese Conference, 2014

An effective watermarking method against valumetric distortions.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Video steganalysis based on the constraints of motion vectors.
Proceedings of the IEEE International Conference on Image Processing, 2013

CASIA Image Tampering Detection Evaluation Database.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Overview of Monitor Selection in Computer Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Continuum regression for cross-modal multimedia retrieval.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Community Detection Based on an Improved Modularity.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

2011
Exploring DCT coefficient quantization effect for image tampering localization.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Image tampering detection based on stationary distribution of Markov chain.
Proceedings of the International Conference on Image Processing, 2010

2009
A Survey of Passive Image Tampering Detection.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Multi-class Blind Steganalysis Based on Image Run-Length Analysis.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Effective image splicing detection based on image chroma.
Proceedings of the International Conference on Image Processing, 2009

2008
Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008


  Loading...