Author of the publication

Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection.

, , , , , , and . IEEE Trans. Biom. Behav. Identity Sci., 4 (1): 71-84 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nest Detection Using Coarse-to-Fine Searching Strategy., , , , and . IFTC, volume 815 of Communications in Computer and Information Science, page 503-512. Springer, (2017)Real Time Compressed Video Object Segmentation., , , and . ICME, page 628-633. IEEE, (2019)Cascaded Residual Density Network for Crowd Counting., , , , and . ICIP, page 2199-2203. IEEE, (2019)A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning., and . Int. J. Image Graph., 7 (3): 481-496 (2007)Real Time Video Object Segmentation in Compressed Domain., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 31 (1): 175-188 (2021)Breaking row-column shuffle based image cipher., , and . ACM Multimedia, page 1097-1100. ACM, (2012)ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage., , , and . ICC, page 3448-3453. IEEE, (2022)Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift., and . SMC, page 3694-3698. IEEE, (2009)Towards More Powerful Multi-column Convolutional Network for Crowd Counting., , , , , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 381-392. Springer, (2021)Accelerating Huffman Encoding Using 512-Bit SIMD Instructions., , , and . IEEE Trans. Consumer Electron., 70 (1): 554-563 (February 2024)