C Miao, Z Tan, Q Chu, H Liu, H Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In recent years, face forgery detectors have aroused great interest and achieved impressive performance, but they are still struggling with generalization and robustness. In this work, we …
A Luo, C Kong, J Huang, Y Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Face forgery detection is essential in combating malicious digital face attacks. Previous methods mainly rely on prior expert knowledge to capture specific forgery clues, such as …
D Liu, Z Dang, C Peng, Y Zheng, S Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the continuous development of deep learning in the field of image generation models, a large number of vivid forged faces have been generated and spread on the Internet. These …
With the large chunks of social media data being created daily and the parallel rise of realistic multimedia tampering methods, detecting and localising tampering in images and …
Z Tan, Z Yang, C Miao, G Guo - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
Deepfake detection has attracted increasing attention in recent years. In this paper, we propose a transformer-based framework with feature compensation and aggregation (Trans …
Detecting and grounding multi-modal media manipulation (DGM^ 4) has become increasingly crucial due to the widespread dissemination of face forgery and text …
C Kong, S Wang, H Li - APSIPA Transactions on Signal and …, 2022 - nowpublishers.com
With the rapid progress over the past five years, face authentication has become the most pervasive biometric recognition method. Thanks to the high-accuracy recognition …
G Zhang, Y Zhang, Z Tan - Proceedings of the 31st ACM International …, 2023 - dl.acm.org
Visible-Infrared person re-identification is challenging due to the large modality gap. To bridge the gap, most studies heavily rely on the correlation of visible-infrared holistic person …
R Xia, D Liu, J Li, L Yuan, N Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Advanced manipulation techniques have provided criminals with opportunities to make social panic or gain illicit profits through the generation of deceptive media, such as forgery …