Wenbo Zhou

Orcid: 0000-0002-4703-4641

Affiliations:
  • University of Science and Technology of China, Hefei, Anhui, China


According to our database1, Wenbo Zhou authored at least 71 papers between 2016 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Improving adversarial transferability and imperceptibility with loss landscape and diffusion model.
Pattern Recognit., 2026

2025
FaceTracer: Unveiling Source Identities From Swapped Face Images and Videos for Fraud Prevention.
IEEE Trans. Pattern Anal. Mach. Intell., December, 2025

Revoking Amnesia: RL-based Trajectory Optimization to Resurrect Erased Concepts in Diffusion Models.
CoRR, October, 2025

PoseGuard: Pose-Guided Generation with Safety Guardrails.
CoRR, August, 2025

BURN: Backdoor Unlearning via Adversarial Boundary Analysis.
CoRR, July, 2025

Jailbreaking the Text-to-Video Generative Models.
CoRR, May, 2025

Audio-Visual Contrastive Pre-train for Face Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025

Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2025

ADA-FInfer: Inferring Face Representations From Adaptive Select Frames for High-Visual-Quality Deepfake Detection.
IEEE Trans. Dependable Secur. Comput., 2025

MES-RAG: Bringing Multi-modal, Entity-Storage, and Secure Enhancements to RAG.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2025, Albuquerque, New Mexico, USA, April 29, 2025

EraseAnything: Enabling Concept Erasure in Rectified Flow Transformers.
Proceedings of the Forty-second International Conference on Machine Learning, 2025

Beyond Sliders: Mastering the Art of Diffusion-based Image Manipulation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Deep Image Matting With Sparse User Interactions.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024

ControlFace: Feature Disentangling for Controllable Face Swapping.
J. Imaging, January, 2024

Improving Deepfake Detection Generalization by Invariant Risk Minimization.
IEEE Trans. Multim., 2024

EraseAnything: Enabling Concept Erasure in Rectified Flow Transformers.
CoRR, 2024

SafeBench: A Safety Evaluation Framework for Multimodal Large Language Models.
CoRR, 2024

Compromising Embodied Agents with Contextual Backdoor Attacks.
CoRR, 2024

UniForensics: Face Forgery Detection via General Facial Representation.
CoRR, 2024

OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person.
CoRR, 2024

Rank-based No-reference Quality Assessment for Face Swapping.
CoRR, 2024

Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Attribute-Aware Head Swapping Guided by 3d Modeling.
Proceedings of the IEEE International Conference on Acoustics, 2024

GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Temporal Optimization for Face Swapping Video based on Consistency Inheritance.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

FaceRSA: RSA-Aware Facial Identity Cryptography Framework.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Measuring the Consistency and Diversity of 3D Face Generation.
IEEE J. Sel. Top. Signal Process., November, 2023

Deepfacelab: Integrated, flexible and extensible face-swapping framework.
Pattern Recognit., September, 2023

Coherent adversarial deepfake video generation.
Signal Process., 2023

A Robust Approach to Multimodal Deepfake Detection.
J. Imaging, 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023

It Wasn't Me: Irregular Identity in Deepfake Videos.
Proceedings of the IEEE International Conference on Image Processing, 2023

HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022

E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion.
IEEE Trans. Image Process., 2022

X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion.
CoRR, 2022

Self-supervised Transformer for Deepfake Detection.
CoRR, 2022

Capturing the Lighting Inconsistency for Deepfake Detection.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

ADT: Anti-Deepfake Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

HairCLIP: Design Your Hair by Text and Reference Image.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Adversarial batch image steganography against CNN-based pooled steganalysis.
Signal Process., 2021

<i>CDAE</i>: Color decomposition-based adversarial examples for screen devices.
Inf. Sci., 2021

Adversarial defense via self-orthogonal randomization super-network.
Neurocomputing, 2021

Face Swapping Consistency Transfer with Neural Identity Carrier.
Future Internet, 2021

A Simple Baseline for StyleGAN Inversion.
CoRR, 2021

Multi-Attentional Deepfake Detection.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016


  Loading...