Lingzhuang Meng

Orcid: 0000-0002-6549-6989

According to our database1, Lingzhuang Meng authored at least 29 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DiffRA: universal restorative adversarial attack based on diffusion model.
Multim. Syst., October, 2025

Meta-prompt tuning for low-resource visual question answering.
Multim. Syst., August, 2025

Latent Code Augmentation Based on Stable Diffusion for Data-Free Substitute Attacks.
IEEE Trans. Neural Networks Learn. Syst., June, 2025

Frequency-Aware Uncertainty Gaussian Splatting for Dynamic Scene Reconstruction.
IEEE Trans. Vis. Comput. Graph., May, 2025

Frequency Attacks Based on Invertible Neural Networks.
IEEE Trans. Artif. Intell., February, 2025

Prompt-guided and degradation prior supervised transformer for adverse weather image restoration.
Appl. Intell., January, 2025

Learning physical-aware diffusion priors for zero-shot restoration of scattering-affected images.
Pattern Recognit., 2025

BM-Edit: Background retention and motion consistency for zero-shot video editing.
Knowl. Based Syst., 2025

Video forgery detection based on multilocal feature and spatiotemporal fusion.
J. Electronic Imaging, 2025

DFDW: Distribution-aware Filter and Dynamic Weight for open-mixed-domain Test-time adaptation.
Image Vis. Comput., 2025

Controlling vision-language model for enhancing image restoration.
Image Vis. Comput., 2025

MirrorDiff: Prompt redescription for zero-shot grounded text-to-image generation with attention modulation.
Eng. Appl. Artif. Intell., 2025

Physical-aware uncertainty prompt learning for real-world blind image restoration.
Appl. Soft Comput., 2025

RestorGS: Depth-aware Gaussian Splatting for Efficient 3D Scene Restoration.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Advancing Few-Shot Black-Box Attack With Alternating Training.
IEEE Trans. Reliab., September, 2024

Dual stage black-box adversarial attack against vision transformer.
Int. J. Mach. Learn. Cybern., August, 2024

Boundary-Aware Spatial and Frequency Dual-Domain Transformer for Remote Sensing Urban Images Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2024

Background-focused contrastive learning for unpaired image-to-image translation.
J. Electronic Imaging, 2024

Deceptive deraining attack: a restorative adversarial attack by rain removal.
J. Electronic Imaging, 2024

Uncertainty-Aware Diffusion Model for Real-World Image Dehazing.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2024

Inter-Class Topology Alignment for Efficient Black-Box Substitute Attacks.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
An End-to-End Heart Rate Estimation Scheme Using Divided Space-Time Attention.
Neural Process. Lett., June, 2023

Data-free Black-box Attack based on Diffusion Model.
CoRR, 2023

2022
An image steganography scheme based on ResNet.
Multim. Tools Appl., November, 2022

A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net.
Secur. Commun. Networks, 2022

Reversible data hiding in encrypted images based on IWT and chaotic system.
Multim. Tools Appl., 2022

2021
An adaptive reversible watermarking in IWT domain.
Multim. Tools Appl., 2021

A data hiding scheme based on U-Net and wavelet transform.
Knowl. Based Syst., 2021

Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification.
Int. J. Digit. Crime Forensics, 2021


  Loading...