Author of the publication

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping., , , , , , and . CoRR, (2023)Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition., , , , , , , and . ACM Multimedia, page 7559-7568. ACM, (2023)BSNet: Box-Supervised Simulation-Assisted Mean Teacher for 3D Instance Segmentation., , and . CVPR, page 20374-20384. IEEE, (2024)TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN., , , , and . CoRR, (2024)Detection of Synthetic Speech Based on Spectrum Defects., , , , and . DDAM@MM, page 3-8. ACM, (2022)SE-ORNet: Self-Ensembling Orientation-Aware Network for Unsupervised Point Cloud Shape Correspondence., , , , , , and . CVPR, page 5364-5373. IEEE, (2023)Unsupervised Template-assisted Point Cloud Shape Correspondence Network., , and . CVPR, page 5250-5259. IEEE, (2024)Mamba24/8D: Enhancing Global Interaction in Point Clouds via State Space Model., , , , , , , , , and . CoRR, (2024)Double Privacy Guard: Robust Traceable Adversarial Watermarking against Face Recognition., , , , , , and . CoRR, (2024)Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)