Chenhao Lin

Orcid: 0000-0002-6265-7345

According to our database1, Chenhao Lin authored at least 41 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization.
IEEE Trans. Inf. Forensics Secur., 2024

Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness.
IEEE Trans. Dependable Secur. Comput., 2024

Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving.
CoRR, 2024

LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection.
CoRR, 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Sensitive region-aware black-box adversarial attacks.
Inf. Sci., August, 2023

Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense.
IEEE Trans. Inf. Forensics Secur., 2023

CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Interpreting Adversarial Examples in Deep Learning: A Review.
ACM Comput. Surv., 2023

Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval.
CoRR, 2023

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
CoRR, 2023

Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection.
CoRR, 2023

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

Hard Adversarial Example Mining for Improving Robust Fairness.
CoRR, 2023

Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths.
CoRR, 2023

End-to-end Face-swapping via Adaptive Latent Representation Learning.
CoRR, 2023

KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Black-Box Fairness Testing with Shadow Models.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

A Surrogate-Based Optimization Method for Solving Economic Emission Dispatch Problems with Green Certificate Trading and Wind Power.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2023

MLGL: Model-free Lesion Generation and Learning for Diabetic Retinopathy Diagnosis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Making the Implicit Explicit: Depression Detection in Web across Posted Texts and Images.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Artificial Intelligence Security Competition (AISC).
CoRR, 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Towards Benchmarking and Evaluating Deepfake Detection.
CoRR, 2022

2021
Spatial Dual-Modality Graph Reasoning for Key Information Extraction.
CoRR, 2021

Rethinking Adversarial Examples Exploiting Frequency-Based Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

SenseMood: Depression Detection on Social Media.
Proceedings of the 2020 on International Conference on Multimedia Retrieval, 2020

BlueMemo: Depression Analysis through Twitter Posts.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition.
Proceedings of the Computer Vision - ECCV 2020, 2020

Object Instance Mining for Weakly Supervised Object Detection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2019

2018
Matching Contactless and Contact-Based Conventional Fingerprint Images for Biometrics Identification.
IEEE Trans. Image Process., 2018

Contactless and partial 3D fingerprint recognition using multi-view deep representation.
Pattern Recognit., 2018

Tetrahedron Based Fast 3D Fingerprint Identification Using Colored LEDs Illumination.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

2017
Multi-Siamese networks to accurately match contactless to contact-based fingerprint images.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Improving cross sensor interoperability for fingerprint identification.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016


  Loading...