Author of the publication

SHIELD : An Evaluation Benchmark for Face Spoofing and Forgery Detection with Multimodal Large Language Models.

, , , , , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation of wide-swath and high-resolution SAR images from multichannel small spaceborne SAR systems., , , and . IEEE Geosci. Remote. Sens. Lett., 2 (1): 82-86 (2005)An Approach for Detecting Infeasible Paths Based on a SMT Solver., , , , , and . IEEE Access, (2019)Efficient object tracking algorithm based on lightweight Siamese networks., and . Eng. Appl. Artif. Intell., (2024)siGCD: a web server to explore survival interaction of genes, cells and drugs in human cancers., , , , , , , , and . Briefings Bioinform., (2021)Waveform optimization for MIMO-STAP to improve the detection performance., , , and . Signal Process., 91 (11): 2690-2696 (2011)Waveform Optimization for MIMO Radar Based on Cramer-Rao Bound in the Presence of Clutter., , , , and . IEICE Trans. Commun., 95-B (6): 2087-2094 (2012)Multiblock ICA-PCA and Bayesian Inference based Distributed Process Monitoring., , , and . CAA SAFEPROCESS, page 805-810. IEEE, (2019)Exploring the role of IoT in project management based on Task-technology Fit model., , and . ITQM, volume 199 of Procedia Computer Science, page 1052-1059. Elsevier, (2021)Research on Gesar event detection method based on attention mechanism., , , and . CAIBDA, page 1-4. VDE / IEEE, (2022)Adversarial Neural Collaborative Filtering with Embedding Dimension Correlations., , , , , , , and . Data Intell., 5 (3): 786-806 (Summer 2023)