Author of the publication

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.

, , , , , , , , , , and . ACM Multimedia, page 7075-7084. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Optimized Low-Dissipation and Adaptive MUSCL Reconstruction Technique for Hyperbolic Conservation Laws., , , and . J. Sci. Comput., 77 (1): 552-578 (2018)Frequency Spectrum Prediction Method Based on EMD and SVR., , and . ISDA (3), page 39-44. IEEE Computer Society, (2008)A Data-Driven Response Virtual Sensor Technique with Partial Vibration Measurements Using Convolutional Neural Network., , , and . Sensors, 17 (12): 2888 (2017)Multiuser Efficient Ergodic Loading for OFDMA Systems., and . VTC Fall, IEEE, (2009)Efficient Ergodic Discrete Loading for OFDM Systems., and . GLOBECOM, page 4545-4549. IEEE, (2008)Correlated Matrix Factorization for Recommendation with Implicit Feedback., , and . IEEE Trans. Knowl. Data Eng., 31 (3): 451-464 (2019)Group mutual exclusion in linear time and space., , and . Theor. Comput. Sci., (2018)Read-Write Memory and k-Set Consensus as an Affine Task., , , and . OPODIS, volume 70 of LIPIcs, page 6:1-6:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Machine Learning-Friendly Biomedical Datasets for Equivalence and Subsumption Ontology Matching, , , , , and . The Semantic Web -- ISWC 2022, page 575--591. Cham, Springer International Publishing, (2022)UA-Miner: Deep Learning Systems for Expose Unprotected API Vulnerability in Source Code., , and . ICACI, page 378-384. IEEE, (2020)