Author of the publication

DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective soft computing technology based on belief-rule-base and particle swarm optimization for tipping paper permeability measurement., , , , , and . J. Ambient Intell. Humaniz. Comput., 10 (3): 841-850 (2019)R Type of Strong Connectivity in LL-fuzzy Topological Spaces.. ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1433-1439. (2009)A cooperative construction method for the measurement matrix and sensing dictionary used in compression sensing., , and . EURASIP J. Adv. Signal Process., 2020 (1): 10 (2020)3D–2D–0D Interface Profiling for Record Efficiency All‐Inorganic CsPbBrI2 Perovskite Solar Cells with Superior Stability, , , , , , , and . Advanced Energy Materials, (May 2018)Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation., , , , and . IEEE Trans. Mob. Comput., 17 (9): 2028-2040 (2018)All-inorganic cesium lead iodide perovskite solar cells with stabilized efficiency beyond 15%, , , , , , , , and . Nature Communications, 9 (1): 4544-- (2018)A Black-Box External Equivalent Method Using Tie-Line Power Mutation., , , , , and . IEEE Access, (2019)Reduction of seismic signal random noise based on grey filter., , and . IGARSS, page 3887-3890. IEEE, (2013)Brain-Cloud: A Generalized and Flexible Registration Framework for Brain MR Images., , , and . AE-CAI, volume 8090 of Lecture Notes in Computer Science, page 153-161. Springer, (2013)Dynamic Heuristics for Time and Cost Reduction in Grid Workflows., , and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 499-508. Springer, (2006)