关注
Yihao Huang
Yihao Huang
在 ntu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces
R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu
arXiv preprint arXiv:1909.06122, 2019
2762019
Countering malicious deepfakes: Survey, battleground, and horizon
F Juefei-Xu, R Wang, Y Huang, Q Guo, L Ma, Y Liu
International journal of computer vision 130 (7), 1678-1734, 2022
1212022
Deepsonar: Towards effective and robust detection of ai-synthesized fake voices
R Wang, F Juefei-Xu, Y Huang, Q Guo, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM international conference on multimedia, 1207-1216, 2020
1042020
Fakelocator: Robust localization of gan-based face manipulations
Y Huang, F Juefei-Xu, Q Guo, Y Liu, G Pu
IEEE Transactions on Information Forensics and Security 17, 2657-2672, 2022
93*2022
Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction
Y Huang, F Juefei-Xu, R Wang, Q Guo, L Ma, X Xie, J Li, W Miao, Y Liu, ...
Proceedings of the 28th ACM international conference on multimedia, 1217-1226, 2020
682020
Amora: Black-box adversarial morphing attack
R Wang, F Juefei-Xu, Q Guo, Y Huang, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1376-1385, 2020
502020
Dodging deepfake detection via implicit spatial-domain notch filtering
Y Huang, F Juefei-Xu, Q Guo, Y Liu, G Pu
IEEE Transactions on Circuits and Systems for Video Technology, 2023
33*2023
Evading deepfake detectors via adversarial statistical consistency
Y Hou, Q Guo, Y Huang, X Xie, L Ma, J Zhao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
282023
Personalization as a shortcut for few-shot backdoor attack against text-to-image diffusion models
Y Huang, F Juefei-Xu, Q Guo, J Zhang, Y Wu, M Hu, T Li, G Pu, Y Liu
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21169 …, 2024
16*2024
On the robustness of segment anything
Y Huang, Y Cao, T Li, F Juefei-Xu, D Lin, IW Tsang, Y Liu, Q Guo
arXiv preprint arXiv:2305.16220, 2023
132023
Ala: Naturalness-aware adversarial lightness attack
Y Huang, L Sun, Q Guo, F Juefei-Xu, J Zhu, J Feng, Y Liu, G Pu
arXiv preprint arXiv:2201.06070, 2022
12*2022
AdvFilter: predictive perturbation-aware filtering against adversarial attack via multi-domain learning
Y Huang, Q Guo, F Juefei-Xu, L Ma, W Miao, Y Liu, G Pu
Proceedings of the 29th ACM International Conference on Multimedia, 395-403, 2021
112021
FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain
J Feng, W Miao, H Zheng, Y Huang, J Li, Z Wang, T Su, B Gu, G Pu, ...
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
112020
A mutation-based method for multi-modal jailbreaking attack detection
X Zhang, C Zhang, T Li, Y Huang, X Jia, X Xie, Y Liu, C Shen
arXiv preprint arXiv:2312.10766, 2023
82023
Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network
Y Huang, F Juefei-Xu, Q Guo, G Pu, Y Liu
IEEE Transactions on Multimedia, 2023
8*2023
Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces. arXiv 2019
R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu
arXiv preprint arXiv:1909.06122, 0
5
Protect federated learning against backdoor attacks via data-free trigger generation
Y Yang, M Hu, Y Cao, J Xia, Y Huang, Y Liu, M Chen
arXiv preprint arXiv:2308.11333, 2023
42023
FedCross: Towards accurate federated learning via multi-model cross aggregation
M Hu, P Zhou, Z Yue, Z Ling, Y Huang, Y Liu, M Chen
arXiv preprint arXiv:2210.08285, 2022
42022
Prema: a tool for precise requirements editing, modeling and analysis
Y Huang, J Feng, H Zheng, J Zhu, S Wang, S Jiang, W Miao, G Pu
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
42019
Gitfl: Adaptive asynchronous federated learning using version control
M Hu, Z Xia, Z Yue, J Xia, Y Huang, Y Liu, M Chen
arXiv preprint arXiv:2211.12049, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20