Author of the publication

Towards Generalizable DEEPFAKE Face Forgery Detection with Semi-Supervised Learning and Knowledge Distillation.

, , , and . ICIP, page 576-580. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks., , and . WiCON, volume 317 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-98. Springer, (2019)Frame-parallel design strategy for high definition B-frame H.264/AVC encoder., , , , and . ISCAS, page 29-32. IEEE, (2008)WIDM at NTCIR-13 STC-2., , , and . NTCIR, National Institute of Informatics (NII), (2017)Low Power Cache Algorithm and Architecture Design for Fast Motion Estimation in H.264/AVC Encoder System., , , , and . ICASSP (2), page 97-100. IEEE, (2007)WebGIS-based surface 3D reconstruction of pipeline., , , and . IGARSS, page 3. IEEE, (2005)Lagrange multipliers and maximum information leakage in different observational models., and . PLAS, page 135-146. ACM, (2008)Leveraging heterogeneous information based on heterogeneous network and homophily theory for community recommendations., and . Electron. Commer. Res., 23 (4): 2463-2483 (December 2023)All-round Evaluation Method for Multi-media Teaching., , , and . J. Softw., 8 (3): 701-708 (2013)Tools and Applications for Large-Scale Display Walls., , , , , , , , , and 6 other author(s). IEEE Computer Graphics and Applications, 25 (4): 24-33 (2005)GEM: scalable and flexible gene-environment interaction analysis in millions of samples., , , , , , , , , and . Bioinform., 37 (20): 3514-3520 (2021)