Search

Your search keyword '"Wang, Run"' showing total 1,095 results

Search Constraints

Start Over You searched for: Author "Wang, Run" Remove constraint Author: "Wang, Run" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
1,095 results on '"Wang, Run"'

Search Results

1. Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models

2. Perception-guided Jailbreak against Text-to-Image Models

3. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

4. Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models

5. Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes

6. Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain

7. GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning

8. SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning

9. Hard Adversarial Example Mining for Improving Robust Fairness

10. What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network

13. Query Generation based on Generative Adversarial Networks

16. Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks

17. A Survey of Causal Inference Frameworks

18. Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations

27. Maximizing the Smallest Eigenvalue of Grounded Laplacian Matrix

34. Bayesian iterative screening in ultra-high dimensional settings

35. Fingerprinting Image-to-Image Generative Adversarial Networks

37. Countering Malicious DeepFakes: Survey, Battleground, and Horizon

38. Tracking Interaction States for Multi-Turn Text-to-SQL Semantic Parsing

41. FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking

42. FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

43. DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices

44. Amora: Black-box Adversarial Morphing Attack

47. Torsional refrigeration by twisted, coiled, and supercoiled fibers

50. FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces

Catalog

Books, media, physical & digital resources