Search

Your search keyword '"Zhang, Yushu"' showing total 1,216 results

Search Constraints

Start Over You searched for: Author "Zhang, Yushu" Remove constraint Author: "Zhang, Yushu"
1,216 results on '"Zhang, Yushu"'

Search Results

1. AIGC-Chain: A Blockchain-Enabled Full Lifecycle Recording System for AIGC Product Copyright Management

2. Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

3. Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models

4. Security and Privacy on Generative Data in AIGC: A Survey

5. Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection

6. Spatial-Frequency Discriminability for Revealing Adversarial Perturbations

7. LCKGCN: Identifying Potential Circrna–Disease Associations Based on Large Convolutional Kernel and Graph Convolutional Network

9. A New and Efficient Dormitory Management System

14. Visual Content Privacy Protection: A Survey

15. Representing Noisy Image Without Denoising

17. InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features

18. Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion

19. Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service

20. Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection

21. Protecting Face Privacy via Beautification

22. Detecting Recolored Image by Spatial Correlation

24. Metaverse: Security and Privacy Concerns

25. A Principled Design of Image Representation: Towards Forensic Tasks

26. Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks

27. Compression-Resistant Backdoor Attack against Deep Neural Networks

41. Protect the Intellectual Property of Dataset against Unauthorized Use

48. Detect and remove watermark in deep neural networks via generative adversarial networks

49. Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations

50. AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption

Catalog

Books, media, physical & digital resources