Author of the publication

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.

, , , , , and . IJCAI, page 761-767. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Label-free Node Classification on Graphs with Large Language Models (LLMS)., , , , , , , and . CoRR, (2023)FS-GRU: Continuous Perception and Prediction with inter Frame Feature Sharing., , , and . ITSC, page 517-522. IEEE, (2022)The 1st International Workshop on Graph Foundation Models (GFM)., , , , , , , , , and 4 other author(s). WWW (Companion Volume), page 1789-1792. ACM, (2024)Graph Machine Learning in the Era of Large Language Models (LLMs)., , , , , , , , , and 1 other author(s). CoRR, (2024)Arcade: A Web-Java Based Framework for Distributed Computing., , , and . WebNet, page 201-206. AACE, (1999)Enhancing ID and Text Fusion via Alternative Training in Session-based Recommendation., , , , , , and . CoRR, (2024)Appending Adversarial Frames for Universal Video Attack., , , , and . WACV, page 3198-3207. IEEE, (2021)Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations., , , , , and . IJCAI, page 761-767. ijcai.org, (2022)A Closer Look at the Reflection Formulation in Single Image Reflection Removal., , , , , , and . IEEE Trans. Image Process., (2024)Demystifying Structural Disparity in Graph Neural Networks: Can One Size Fit All?, , , , , , , and . CoRR, (2023)