Author of the publication

Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Does Techno-invasion Trigger Job Anxiety? Moderating Effects of Computer Self-efficacy and Perceived Organizational Support., , , and . WHICEB, page 42. Association for Information Systems, (2017)Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO., , , , and . Int. J. Commun. Netw. Syst. Sci., 3 (10): 811-815 (2010)Adaptive and fast image superpixel segmentation approach., and . Image Vis. Comput., (2021)Joint Load Balancing of Downlink and Uplink for eICIC in Heterogeneous Network., , , and . IEEE Trans. Veh. Technol., 66 (7): 6388-6398 (2017)An Analytical Model and Performance Evaluation of Multihomed Multilane VANETs., , , , , and . IEEE/ACM Trans. Netw., 29 (1): 346-359 (2021)Learning Relationship-Enhanced Semantic Graph for Fine-Grained Image-Text Matching., , , , and . IEEE Trans. Cybern., 54 (2): 948-961 (February 2024)Bionic Face Sketch Generator., , , and . IEEE Trans. Cybern., 50 (6): 2701-2714 (2020)FRNet: Factorized and Regular Blocks Network for Semantic Segmentation in Road Scene., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (4): 3522-3530 (2022)Hierarchical Forgery Classifier on Multi-Modality Face Forgery Clues., , , , , and . IEEE Trans. Multim., (2024)DeepFidelity: Perceptual Forgery Fidelity Assessment for Deepfake Detection., , , , , and . CoRR, (2023)