Author of the publication

An Edge-Aware Transformer Framework for Image Inpainting Detection.

, , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 648-660. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique., , , and . GlobalSIP, page 800-804. IEEE, (2015)Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)., , and . IEEE Trans. Serv. Comput., 14 (6): 1940-1953 (2021)Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 16773-16785 (2022)Privacy-preserving and verifiable deep learning inference based on secret sharing., , , and . Neurocomputing, (2022)Image Operation Chain Detection with Machine Translation Framework., , , , , and . IEEE Trans. Multim., (2023)Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision., , , , , and . CoRR, (2020)Robust Document Image Forgery Localization Against Image Blending., , , , and . TrustCom, page 810-817. IEEE, (2022)A Unified Environmental Network for Pedestrian Trajectory Prediction., , , , and . AAAI, page 4970-4978. AAAI Press, (2024)Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision., , , , , and . AAAI, page 2029-2037. AAAI Press, (2021)A Transformer based Approach for Image Manipulation Chain Detection., , , , , and . ACM Multimedia, page 3510-3517. ACM, (2021)