Wenbo Zhou

Orcid: 0000-0002-1009-4544

According to our database1, Wenbo Zhou authored at least 71 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Image Matting With Sparse User Interactions.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024

ControlFace: Feature Disentangling for Controllable Face Swapping.
J. Imaging, January, 2024

Improving Deepfake Detection Generalization by Invariant Risk Minimization.
IEEE Trans. Multim., 2024

FaceRSA: RSA-Aware Facial Identity Cryptography Framework.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Measuring the Consistency and Diversity of 3D Face Generation.
IEEE J. Sel. Top. Signal Process., November, 2023

Deepfacelab: Integrated, flexible and extensible face-swapping framework.
Pattern Recognit., September, 2023

Transformer-Based Detection for Highly Mobile Coded OFDM Systems.
Entropy, June, 2023

An efficient local search algorithm for minimum positive influence dominating set problem.
Comput. Oper. Res., June, 2023

Entropy regularization methods for parameter space exploration.
Inf. Sci., April, 2023

Coherent adversarial deepfake video generation.
Signal Process., 2023

MAIN: Multibranch Attention Integration Network for Degraded Remote-Sensing Image Super-Resolution.
IEEE Geosci. Remote. Sens. Lett., 2023

Spectral-Learning-Based Transformer Network for the Spectral Super-Resolution of Remote-Sensing Degraded Images.
IEEE Geosci. Remote. Sens. Lett., 2023

A Robust Approach to Multimodal Deepfake Detection.
J. Imaging, 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Precise and Fast Segmentation of Sea Ice in High-Resolution Images Based on Multiscale and Knowledge Distillation.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023

It Wasn't Me: Irregular Identity in Deepfake Videos.
Proceedings of the IEEE International Conference on Image Processing, 2023

HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Improving Local Search for Pseudo Boolean Optimization by Fragile Scoring Function and Deep Optimization.
Proceedings of the 29th International Conference on Principles and Practice of Constraint Programming, 2023

2022
JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022

E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion.
IEEE Trans. Image Process., 2022

Amalgamation of Geometry Structure, Meteorological and Thermophysical Parameters for Intelligent Prediction of Temperature Fields in 3D Scenes.
Sensors, 2022

NROWAN-DQN: A stable noisy network with noise reduction and online weight adjustment for exploration.
Expert Syst. Appl., 2022

X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion.
CoRR, 2022

Learning Convolutional Neural Networks in the Frequency Domain.
CoRR, 2022

Self-supervised Transformer for Deepfake Detection.
CoRR, 2022

Sar Ship Detection Network Incorporating CFAR Preprocessing.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

Capturing the Lighting Inconsistency for Deepfake Detection.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

ADT: Anti-Deepfake Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

HairCLIP: Design Your Hair by Text and Reference Image.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Adversarial batch image steganography against CNN-based pooled steganalysis.
Signal Process., 2021

Regularly updated deterministic policy gradient algorithm.
Knowl. Based Syst., 2021

Recruitment-imitation mechanism for evolutionary reinforcement learning.
Inf. Sci., 2021

<i>CDAE</i>: Color decomposition-based adversarial examples for screen devices.
Inf. Sci., 2021

Adversarial defense via self-orthogonal randomization super-network.
Neurocomputing, 2021

Face Swapping Consistency Transfer with Neural Identity Carrier.
Future Internet, 2021

Evolutionary Generative Adversarial Networks based on New Fitness Function and Generic Crossover Operator.
CoRR, 2021

A Simple Baseline for StyleGAN Inversion.
CoRR, 2021

A new sEMG signal feature extraction method based on S transform.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

A Method for Automatic Counting and Labeling of Cells Stained with Microporous Membrane.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Multi-Attentional Deepfake Detection.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

A structure-agency integrative framework for information access disparity.
J. Documentation, 2020

NROWAN-DQN: A Stable Noisy Network with Noise Reduction and Online Weight Adjustment for Exploration.
CoRR, 2020

A Coloured Petri Nets Based Attack Tolerance Framework.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

Toward Formal Modeling and Verification of Resource Provisioning as a Service in Cloud.
IEEE Access, 2019

A Method of Automatically Evolving Feature Models of Software Product Lines.
IEEE Access, 2019

An Executable Specification of Map-Join-Reduce Using Haskell.
IEEE Access, 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Design and Implementation of the Online Computer-Assisted Instruction System Based on Object-Oriented Analysis Technology.
Int. J. Emerg. Technol. Learn., 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

SDAC: A model for analysis of the execution semantics of data processing framework in cloud.
Comput. Lang. Syst. Struct., 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

一种服务消息交互行为的元建模方法 (Meta-modeling Approach of Message Interaction in Service).
计算机科学, 2017

2016
Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016

2012
The Domain Decomposition Method in Land Surface Model.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012


  Loading...