Yunfeng Diao
Orcid: 0000-0002-9455-1510
According to our database1,
Yunfeng Diao
authored at least 28 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Boosting Active Defense Persistence: A Two-Stage Defense Framework Combining Interruption and Poisoning Against Deepfake.
CoRR, August, 2025
Bridging Semantic Logic Gaps: A Cognition-Inspired Multimodal Boundary-Preserving Network for Image Manipulation Localization.
CoRR, August, 2025
Beyond Fully Supervised Pixel Annotations: Scribble-Driven Weakly-Supervised Framework for Image Manipulation Localization.
CoRR, July, 2025
CoRR, July, 2025
DDL: A Dataset for Interpretable Deepfake Detection and Localization in Real-World Scenarios.
CoRR, June, 2025
Adversarially Robust AI-Generated Image Detection for Free: An Information Theoretic Perspective.
CoRR, May, 2025
Your Classifier Can Do More: Towards Bridging the Gaps in Classification, Robustness, and Generation.
CoRR, May, 2025
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks.
CoRR, May, 2025
CoRR, April, 2025
Domain Generalization for Face Anti-spoofing via Content-aware Composite Prompt Engineering.
CoRR, April, 2025
Inf. Fusion, 2025
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Understanding the vulnerability of skeleton-based Human Activity Recognition via black-box attack.
Pattern Recognit., 2024
CoRR, 2024
Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks.
CoRR, 2024
2023
Appl. Intell., June, 2023
Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
A large-scale container dataset and a baseline method for container hole localization.
J. Real Time Image Process., 2022
Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack.
CoRR, 2022
2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2019
Vision-based detection of container lock holes using a modified local sliding window method.
EURASIP J. Image Video Process., 2019