default search action
Jing Dong 0003
Person information
- unicode name: 董晶
- affiliation (PhD 2010): Chinese Academy of Sciences, Institute of Automation, Center for Research on Intelligent Perception and Computing, Beijing, China
Other persons with the same name
- Jing Dong — disambiguation page
- Jing Dong 0001 — Nanjing Tech University, College of Electrical Engineering and Control Science, China (and 1 more)
- Jing Dong 0002 — Georgia Institute of Technology, Institute for Robotics and Intelligent Machines, USA
- Jing Dong 0004 — National University of Defense Technology, College of Aerospace Science and Engineering, Changsha, China
- Jing Dong 0005 — University of Texas at Dallas, Computer Science Department, Richardson, TX, USA (and 1 more)
- Jing Dong 0006 — Purdue University, West Lafayette, IN, USA
- Jing Dong 0007 — Columbia University, Business School, New York, NY, USA (and 1 more)
- Jing Dong 0008 — Chinese University of Hong Kong, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zheling Meng, Bo Peng, Jing Dong, Tieniu Tan, Haonan Cheng:
Artifact feature purification for cross-domain detection of AI-generated images. Comput. Vis. Image Underst. 247: 104078 (2024) - [j21]Yueming Lyu, Yue Jiang, Bo Peng, Jing Dong:
InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2070-2082 (2024) - [j20]Weinan Guan, Wei Wang, Jing Dong, Bo Peng:
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization. IEEE Trans. Inf. Forensics Secur. 19: 5345-5356 (2024) - [j19]Yueming Lyu, Peibin Chen, Jingna Sun, Bo Peng, Xu Wang, Jing Dong:
DRAN: Detailed Region-Adaptive Normalization for Conditional Image Synthesis. IEEE Trans. Multim. 26: 1969-1982 (2024) - [c70]Dongze Li, Kang Zhao, Wei Wang, Bo Peng, Yingya Zhang, Jing Dong, Tieniu Tan:
AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis. AAAI 2024: 3037-3045 - [c69]Songlin Yang, Wei Wang, Yushi Lan, Xiangyu Fan, Bo Peng, Lei Yang, Jing Dong:
Learning Dense Correspondence for NeRF-Based Face Reenactment. AAAI 2024: 6522-6530 - [c68]Dongze Li, Kang Zhao, Wei Wang, Yifeng Ma, Bo Peng, Yingya Zhang, Jing Dong:
S3D-NeRF: Single-Shot Speech-Driven Neural Radiance Field for High Fidelity Talking Head Synthesis. ECCV (10) 2024: 365-382 - [c67]Yang Li, Songlin Yang, Wei Wang, Ziwen He, Bo Peng, Jing Dong:
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts. ICME 2024: 1-6 - [c66]Yue Jiang, Yueming Lyu, Ziwen He, Bo Peng, Jing Dong:
Mitigating Social Biases in Text-to-Image Diffusion Models via Linguistic-Aligned Attention Guidance. ACM Multimedia 2024: 3391-3400 - [c65]Weinan Guan, Wei Wang, Bo Peng, Jing Dong, Tieniu Tan:
ST-SBV: Spatial-Temporal Self-Blended Videos for Deepfake Detection. PRCV (5) 2024: 274-288 - [i47]Xiaoxuan Han, Songlin Yang, Wei Wang, Ziwen He, Jing Dong:
Is It Possible to Backdoor Face Forgery Detection with Natural Triggers? CoRR abs/2401.00414 (2024) - [i46]Yang Li, Songlin Yang, Wei Wang, Jing Dong:
Beyond Inserting: Learning Identity Embedding for Semantic-Fidelity Personalized Diffusion Generation. CoRR abs/2402.00631 (2024) - [i45]Zheling Meng, Bo Peng, Jing Dong, Tieniu Tan:
Artifact Feature Purification for Cross-domain Detection of AI-generated Images. CoRR abs/2403.11172 (2024) - [i44]Zheling Meng, Bo Peng, Jing Dong:
Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space. CoRR abs/2404.00230 (2024) - [i43]Yang Li, Songlin Yang, Wei Wang, Ziwen He, Bo Peng, Jing Dong:
Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts. CoRR abs/2404.08341 (2024) - [i42]Xiaoxuan Han, Songlin Yang, Wei Wang, Yang Li, Jing Dong:
Probing Unlearned Diffusion Models: A Transferable Adversarial Attack Perspective. CoRR abs/2404.19382 (2024) - [i41]Dongze Li, Kang Zhao, Wei Wang, Yifeng Ma, Bo Peng, Yingya Zhang, Jing Dong:
S3D-NeRF: Single-Shot Speech-Driven Neural Radiance Field for High Fidelity Talking Head Synthesis. CoRR abs/2408.09347 (2024) - 2023
- [j18]Yueming Lyu, Yue Jiang, Ziwen He, Bo Peng, Yunfan Liu, Jing Dong:
3D-Aware Adversarial Makeup Generation for Facial Privacy Protection. IEEE Trans. Pattern Anal. Mach. Intell. 45(11): 13438-13453 (2023) - [j17]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Temporal sparse adversarial attack on sequence-based gait recognition. Pattern Recognit. 133: 109028 (2023) - [j16]Xiaoyu Zhang, Changsheng Li, Haichao Shi, Xiaobin Zhu, Peng Li, Jing Dong:
AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and Localization. IEEE Trans. Neural Networks Learn. Syst. 34(4): 1852-1863 (2023) - [c64]Tianxiang Ma, Bingchuan Li, Qian He, Jing Dong, Tieniu Tan:
Semantic 3D-Aware Portrait Synthesis and Manipulation Based on Compositional Neural Radiance Field. AAAI 2023: 1878-1886 - [c63]Tianxiang Ma, Bingchuan Li, Wei Liu, Miao Hua, Jing Dong, Tieniu Tan:
CFFT-GAN: Cross-Domain Feature Fusion Transformer for Exemplar-Based Image Translation. AAAI 2023: 1887-1895 - [c62]Songlin Yang, Wei Wang, Chenye Xu, Ziwen He, Bo Peng, Jing Dong:
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models. CVPR Workshops 2023: 1001-1010 - [c61]Songlin Yang, Wei Wang, Bo Peng, Jing Dong:
Designing A 3d-Aware Stylenerf Encoder for Face Editing. ICASSP 2023: 1-5 - [c60]Bo Peng, Xianyun Sun, Caiyong Wang, Wei Wang, Jing Dong, Zhenan Sun, Rongyu Zhang, Heng Cong, Lingzhi Fu, Hao Wang, Yusheng Zhang, Hanyuan Zhang, Xin Zhang, Boyuan Liu, Hefei Ling, Luka Dragar, Borut Batagelj, Peter Peer, Vitomir Struc, Xinghui Zhou, Kunlin Liu, Weitao Feng, Weiming Zhang, Haitao Wang, Wenxiu Diao:
DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment. IJCB 2023: 1-9 - [c59]Xianyun Sun, Beibei Dong, Caiyong Wang, Bo Peng, Jing Dong:
Visual Realism Assessment for Face-Swap Videos. ICIG (1) 2023: 415-426 - [c58]Songlin Yang, Wei Wang, Jun Ling, Bo Peng, Xu Tan, Jing Dong:
Context-Aware Talking-Head Video Editing. ACM Multimedia 2023: 7718-7727 - [e5]Huchuan Lu, Wanli Ouyang, Hui Huang, Jiwen Lu, Risheng Liu, Jing Dong, Min Xu:
Image and Graphics - 12th International Conference, ICIG 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14355, Springer 2023, ISBN 978-3-031-46304-4 [contents] - [e4]Huchuan Lu, Wanli Ouyang, Hui Huang, Jiwen Lu, Risheng Liu, Jing Dong, Min Xu:
Image and Graphics - 12th International Conference, ICIG 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14356, Springer 2023, ISBN 978-3-031-46307-5 [contents] - [e3]Huchuan Lu, Wanli Ouyang, Hui Huang, Jiwen Lu, Risheng Liu, Jing Dong, Min Xu:
Image and Graphics - 12th International Conference, ICIG 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14357, Springer 2023, ISBN 978-3-031-46310-5 [contents] - [e2]Huchuan Lu, Wanli Ouyang, Hui Huang, Jiwen Lu, Risheng Liu, Jing Dong, Min Xu:
Image and Graphics - 12th International Conference, ICIG 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14358, Springer 2023, ISBN 978-3-031-46313-6 [contents] - [e1]Huchuan Lu, Wanli Ouyang, Hui Huang, Jiwen Lu, Risheng Liu, Jing Dong, Min Xu:
Image and Graphics - 12th International Conference, ICIG 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14359, Springer 2023, ISBN 978-3-031-46316-7 [contents] - [i40]Xianyun Sun, Beibei Dong, Caiyong Wang, Bo Peng, Jing Dong:
Visual Realism Assessment for Face-swap Videos. CoRR abs/2302.00918 (2023) - [i39]Tianxiang Ma, Bingchuan Li, Qian He, Jing Dong, Tieniu Tan:
Semantic 3D-aware Portrait Synthesis and Manipulation Based on Compositional Neural Radiance Field. CoRR abs/2302.01579 (2023) - [i38]Tianxiang Ma, Bingchuan Li, Wei Liu, Miao Hua, Jing Dong, Tieniu Tan:
CFFT-GAN: Cross-domain Feature Fusion Transformer for Exemplar-based Image Translation. CoRR abs/2302.01608 (2023) - [i37]Songlin Yang, Wei Wang, Bo Peng, Jing Dong:
Designing a 3D-Aware StyleNeRF Encoder for Face Editing. CoRR abs/2302.09467 (2023) - [i36]Dongze Li, Wei Wang, Kang Zhao, Jing Dong, Tieniu Tan:
RiDDLE: Reversible and Diversified De-identification with Latent Encryptor. CoRR abs/2303.05171 (2023) - [i35]Yueming Lyu, Tianwei Lin, Fu Li, Dongliang He, Jing Dong, Tieniu Tan:
DeltaEdit: Exploring Text-free Training for Text-Driven Image Manipulation. CoRR abs/2303.06285 (2023) - [i34]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Collaborative Feature Learning for Fine-grained Facial Forgery Detection and Segmentation. CoRR abs/2304.08078 (2023) - [i33]Yueming Lyu, Yue Jiang, Ziwen He, Bo Peng, Yunfan Liu, Jing Dong:
3D-Aware Adversarial Makeup Generation for Facial Privacy Protection. CoRR abs/2306.14640 (2023) - [i32]Tianxiang Ma, Kang Zhao, Jianxin Sun, Jing Dong, Tieniu Tan:
Free-style and Fast 3D Portrait Synthesis. CoRR abs/2306.15419 (2023) - [i31]Yueming Lyu, Yue Jiang, Bo Peng, Jing Dong:
InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer. CoRR abs/2307.16227 (2023) - [i30]Tianxiang Ma, Bingchuan Li, Qian He, Jing Dong, Tieniu Tan:
GaFET: Learning Geometry-aware Facial Expression Translation from In-The-Wild Images. CoRR abs/2308.03413 (2023) - [i29]Yueming Lyu, Kang Zhao, Bo Peng, Yue Jiang, Yingya Zhang, Jing Dong:
DeltaSpace: A Semantic-aligned Feature Space for Flexible Text-guided Image Editing. CoRR abs/2310.08785 (2023) - [i28]Yue Jiang, Yueming Lyu, Tianxiang Ma, Bo Peng, Jing Dong:
RS-Corrector: Correcting the Racial Stereotypes in Latent Diffusion Models. CoRR abs/2312.04810 (2023) - [i27]Songlin Yang, Wei Wang, Yushi Lan, Xiangyu Fan, Bo Peng, Lei Yang, Jing Dong:
Learning Dense Correspondence for NeRF-Based Face Reenactment. CoRR abs/2312.10422 (2023) - [i26]Dongze Li, Kang Zhao, Wei Wang, Bo Peng, Yingya Zhang, Jing Dong, Tieniu Tan:
AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis. CoRR abs/2312.10921 (2023) - 2022
- [j15]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Revisiting ensemble adversarial attack. Signal Process. Image Commun. 107: 116747 (2022) - [j14]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Siwei Lyu:
A Unified Framework for High Fidelity Face Swap and Expression Reenactment. IEEE Trans. Circuits Syst. Video Technol. 32(6): 3673-3684 (2022) - [c57]Wenqi Zhuo, Wei Wang, Hui Zhang, Jing Dong:
IrisGuard: Image Forgery Detection for Iris Anti-spoofing. CCBR 2022: 602-612 - [c56]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Robust Face-Swap Detection Based on 3D Facial Shape Information. CICAI (1) 2022: 404-415 - [c55]Bo Peng, Wei Xiang, Yue Jiang, Wei Wang, Jing Dong, Zhenan Sun, Zhen Lei, Siwei Lyu:
DFGC 2022: The Second DeepFake Game Competition. IJCB 2022: 1-10 - [c54]Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong:
AdaDeId: Adjust Your Identity Attribute Freely. ICPR 2022: 210-216 - [c53]Dongze Li, Wenqi Zhuo, Wei Wang, Jing Dong:
Contrastive Knowledge Transfer for Deepfake Detection with Limited Data. ICPR 2022: 1945-1951 - [c52]Weinan Guan, Ziwen He, Wei Wang, Jing Dong, Bo Peng:
Defending Against Deepfakes with Ensemble Adversarial Perturbation. ICPR 2022: 1952-1958 - [c51]Binghao Zhao, Tianxiang Ma, Bo Peng, Jing Dong:
DesignerGAN: Sketch Your Own Photo. ICPR 2022: 3216-3223 - [c50]Ziwen He, Wei Wang, Weinan Guan, Jing Dong, Tieniu Tan:
Defeating DeepFakes via Adversarial Visual Reconstruction. ACM Multimedia 2022: 2464-2472 - [c49]Bo Peng, Siwei Lyu, Wei Wang, Jing Dong:
Counterfactual Image Enhancement for Explanation of Face Swap Deepfakes. PRCV (2) 2022: 492-508 - [i25]Songlin Yang, Wei Wang, Chenye Xu, Bo Peng, Jing Dong:
Exposing Fine-grained Adversarial Vulnerability of Face Anti-spoofing Models. CoRR abs/2205.14851 (2022) - [i24]Bo Peng, Wei Xiang, Yue Jiang, Wei Wang, Jing Dong, Zhenan Sun, Zhen Lei, Siwei Lyu:
DFGC 2022: The Second DeepFake Game Competition. CoRR abs/2206.15138 (2022) - 2021
- [j13]Xiaoyu Zhang, Yaru Zhang, Haichao Shi, Jing Dong:
SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentation. Comput. Vis. Image Underst. 210: 103256 (2021) - [j12]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Learning pose-invariant 3D object reconstruction from single-view images. Neurocomputing 423: 407-418 (2021) - [c48]Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong:
A Systematical Solution for Face De-identification. CCBR 2021: 20-30 - [c47]Dongze Li, Wei Wang, Hongxing Fan, Jing Dong:
Exploring Adversarial Fake Images on Face Manifold. CVPR 2021: 5789-5798 - [c46]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
MUST-GAN: Multi-Level Statistics Transfer for Self-Driven Person Image Generation. CVPR 2021: 13622-13631 - [c45]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang:
DFGC 2021: A DeepFake Game Competition. IJCB 2021: 1-8 - [c44]Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan:
SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer. ACM Multimedia 2021: 3601-3609 - [i23]Dongze Li, Wei Wang, Hongxing Fan, Jing Dong:
Exploring Adversarial Fake Images on Face Manifold. CoRR abs/2101.03272 (2021) - [i22]Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan:
SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer. CoRR abs/2104.10567 (2021) - [i21]Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan:
Robust Face-Swap Detection Based on 3D Facial Shape Information. CoRR abs/2104.13665 (2021) - [i20]Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong:
Face Anonymization by Manipulating Decoupled Identity Representation. CoRR abs/2105.11137 (2021) - [i19]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Transferable Sparse Adversarial Attack. CoRR abs/2105.14727 (2021) - [i18]Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang:
DFGC 2021: A DeepFake Game Competition. CoRR abs/2106.01217 (2021) - [i17]Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong:
A Systematical Solution for Face De-identification. CoRR abs/2107.08581 (2021) - [i16]Yueming Lyu, Peibin Chen, Jingna Sun, Xu Wang, Jing Dong, Tieniu Tan:
Detailed Region-Adaptive Normalization for Heavy Makeup Transfer. CoRR abs/2109.14525 (2021) - 2020
- [i15]Ziwen He, Wei Wang, Jing Dong, Tieniu Tan:
Temporal Sparse Adversarial Attack on Gait Recognition. CoRR abs/2002.09674 (2020) - [i14]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Learning Pose-invariant 3D Object Reconstruction from Single-view Images. CoRR abs/2004.01347 (2020) - [i13]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation. CoRR abs/2011.09084 (2020)
2010 – 2019
- 2019
- [j11]Chuan Qin, Qing Zhou, Fang Cao, Jing Dong, Xinpeng Zhang:
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting. IEEE Trans. Circuits Syst. Video Technol. 29(11): 3341-3355 (2019) - [c43]Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong:
Any-to-one Face Reenactment Based on Conditional Generative Adversarial Network. APSIPA 2019: 1657-1664 - [c42]Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong:
On the Generalization of GAN Image Forensics. CCBR 2019: 134-141 - [c41]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
New Graph-Theoretic Approach to Social Steganography. Media Watermarking, Security, and Forensics 2019 - [c40]Mingyun Bian, Bo Peng, Wei Wang, Jing Dong:
An Accurate LSTM Based Video Heart Rate Estimation Method. PRCV (3) 2019: 409-417 - [i12]Xinsheng Xuan, Bo Peng, Jing Dong, Wei Wang:
On the generalization of GAN image forensics. CoRR abs/1902.11153 (2019) - [i11]Xiaoyu Zhang, Changsheng Li, Haichao Shi, Xiaobin Zhu, Peng Li, Jing Dong:
AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and Localization. CoRR abs/1911.11961 (2019) - [i10]Ziwen He, Wei Wang, Xinsheng Xuan, Jing Dong, Tieniu Tan:
A New Ensemble Method for Concessively Targeted Multi-model Attack. CoRR abs/1912.10833 (2019) - [i9]Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong:
Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning. CoRR abs/1912.11082 (2019) - 2018
- [j10]Chuan Qin, Ping Ji, Chin-Chen Chang, Jing Dong, Xingming Sun:
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE Multim. 25(3): 36-48 (2018) - [j9]Chuan Qin, Zhihong He, Xiangyang Luo, Jing Dong:
Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf. Sci. 465: 285-304 (2018) - [j8]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Feature learning for steganalysis using convolutional neural networks. Multim. Tools Appl. 77(15): 19633-19657 (2018) - [j7]Hailiang Li, Qingxiao Guan, Haidong Wang, Jing Dong:
Deep-MATEM: TEM query image based cross-modal retrieval for material science literature. Multim. Tools Appl. 77(23): 30269-30290 (2018) - [j6]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Image Forensics Based on Planar Contact Constraints of 3D Objects. IEEE Trans. Inf. Forensics Secur. 13(2): 377-392 (2018) - [c39]Kui Ye, Jing Dong, Wei Wang, Bo Peng, Tieniu Tan:
Feature Pyramid Deep Matching and Localization Network for Image Forensics. APSIPA 2018: 1796-1802 - [c38]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. ICCCS (4) 2018: 404-415 - [c37]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. ICPR 2018: 2676-2681 - [c36]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval. ICPR 2018: 3335-3340 - [i8]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. CoRR abs/1801.04747 (2018) - [i7]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang:
Reversible Embedding to Covers Full of Boundaries. CoRR abs/1801.04752 (2018) - [i6]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang, Lizhi Xiong:
The Cut and Dominating Set Problem in A Steganographer Network. CoRR abs/1802.09333 (2018) - [i5]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval. CoRR abs/1806.02984 (2018) - [i4]Wei Wang, Jing Dong, Yinlong Qian, Tieniu Tan:
Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels. CoRR abs/1806.10443 (2018) - 2017
- [j5]Zairan Wang, Jing Dong, Wei Wang:
Quantization based watermarking methods against valumetric distortions. Int. J. Autom. Comput. 14(6): 672-685 (2017) - [j4]Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang:
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138: 280-293 (2017) - [j3]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Optimized 3D Lighting Environment Estimation for Image Forgery Detection. IEEE Trans. Inf. Forensics Secur. 12(2): 479-494 (2017) - [c35]Yonggwon Ri, Jing Dong, Wei Wang, Tieniu Tan:
High Capacity Reversible Data Hiding with Contrast Enhancement. CCCV (2) 2017: 284-294 - [c34]Kui Ye, Jing Dong, Wei Wang, Jindong Xu, Tieniu Tan:
Image Forgery Detection Based on Semantic Image Understanding. CCCV (1) 2017: 472-481 - [c33]Kui Ye, Xiaobo Sun, Jindong Xu, Jing Dong, Tieniu Tan:
Influence Evaluation for Image Tampering Using Saliency Mechanism. CCCV (1) 2017: 518-527 - [c32]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces. CVPR Workshops 2017: 1813-1821 - [c31]Chao Xia, Qingxiao Guan, Xianfeng Zhao, Jing Dong, Zhoujun Xu:
Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature. ICIP 2017: 515-519 - [c30]Jiedong Hao, Wei Wang, Jing Dong, Tieniu Tan:
MFC: A multi-scale fully convolutional approach for visual instance retrieval. ICME Workshops 2017: 513-518 - [c29]Yonggwon Ri, Jing Dong, Wei Wang, Tieniu Tan:
Adaptive Histogram Shifting Based Reversible Data Hiding. IIH-MSP (2) 2017: 42-50 - [c28]Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang:
SSGAN: Secure Steganography Based on Generative Adversarial Networks. PCM (1) 2017: 534-544 - [i3]Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang:
SSGAN: Secure Steganography Based on Generative Adversarial Networks. CoRR abs/1707.01613 (2017) - [i2]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
A Simply Study to Steganography on Social Networks. CoRR abs/1712.03621 (2017) - 2016
- [j2]Chuan Qin, Xueqin Chen, Jing Dong, Xinpeng Zhang:
Perceptual image hashing with selective sampling for salient structure features. Displays 45: 26-37 (2016) - [c27]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Learning and transferring representations for image steganalysis using convolutional neural network. ICIP 2016: 2752-2756 - [c26]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model. ICIP 2016: 3932-3936 - [i1]Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan:
What Is the Best Practice for CNNs Applied to Visual Instance Retrieval? CoRR abs/1611.01640 (2016) - 2015
- [c25]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Local correlation pattern for image steganalysis. ChinaSIP 2015: 468-472 - [c24]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Detection of computer generated faces in videos based on pulse signal. ChinaSIP 2015: 841-845 - [c23]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Robust steganalysis based on training set construction and ensemble classifiers weighting. ICIP 2015: 1498-1502 - [c22]Yinlong Qian, Jing Dong, Wei Wang, Tieniu Tan:
Deep learning for steganalysis via convolutional neural networks. Media Watermarking, Security, and Forensics 2015: 94090J - [c21]Bo Peng, Wei Wang, Jing Dong, Tieniu Tan:
Improved 3D lighting environment estimation for image forgery detection. WIFS 2015: 1-6 - 2014
- [j1]Wei Wang, Jing Dong, Tieniu Tan:
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. IEEE Trans. Inf. Forensics Secur. 9(10): 1653-1666 (2014) - [c20]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
An effective watermarking method against valumetric distortions. ICIP 2014: 5487-5491 - [c19]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
Improved Robust Watermarking Based on Rational Dither Modulation. IGTA 2014: 305-314 - [c18]Zairan Wang, Jing Dong, Wei Wang, Tieniu Tan:
Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. IWDW 2014: 174-186 - 2013
- [c17]Jing Dong, Wei Wang, Tieniu Tan:
CASIA Image Tampering Detection Evaluation Database. ChinaSIP 2013: 422-426 - [c16]Qingxiao Guan, Jing Dong, Tieniu Tan:
Two Notes from Experimental Study on Image Steganalysis. ICIC (1) 2013: 411-420 - [c15]Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan:
Video steganalysis based on the constraints of motion vectors. ICIP 2013: 4422-4426 - 2012
- [c14]Xikai Xu, Jing Dong, Tieniu Tan:
Universal spatial feature set for video steganalysis. ICIP 2012: 245-248 - 2011
- [c13]Qingxiao Guan, Jing Dong, Tieniu Tan:
An effective image steganalysis method based on neighborhood information of pixels. ICIP 2011: 2721-2724 - [c12]Wei Wang, Jing Dong, Tieniu Tan:
Exploring DCT coefficient quantization effect for image tampering localization. WIFS 2011: 1-6 - 2010
- [c11]Wei Wang, Jing Dong, Tieniu Tan:
Image tampering detection based on stationary distribution of Markov chain. ICIP 2010: 2101-2104 - [c10]Patchara Sutthiwan, Yun-Qing Shi, Jing Dong, Tieniu Tan, Tian-Tsong Ng:
New developments in color image tampering detection. ISCAS 2010: 3064-3067 - [c9]Wei Wang, Jing Dong, Tieniu Tan:
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. IWDW 2010: 120-133 - [c8]Qingxiao Guan, Jing Dong, Tieniu Tan:
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting. IWDW 2010: 266-279
2000 – 2009
- 2009
- [c7]Wei Wang, Jing Dong, Tieniu Tan:
Effective image splicing detection based on image chroma. ICIP 2009: 1257-1260 - [c6]Jing Dong, Wei Wang, Tieniu Tan:
Multi-class Blind Steganalysis Based on Image Run-Length Analysis. IWDW 2009: 199-210 - [c5]Wei Wang, Jing Dong, Tieniu Tan:
A Survey of Passive Image Tampering Detection. IWDW 2009: 308-322 - 2008
- [c4]Jing Dong, Tieniu Tan:
Effects of watermarking on iris recognition performance. ICARCV 2008: 1156-1161 - [c3]Jing Dong, Tieniu Tan:
Blind image steganalysis based on run-length histogram analysis. ICIP 2008: 2064-2067 - [c2]Jing Dong, Wei Wang, Tieniu Tan, Yun Q. Shi:
Run-Length and Edge Statistics Based Approach for Image Splicing Detection. IWDW 2008: 76-87 - 2007
- [c1]Jing Dong, Xiaochuan Chen, Lei Guo, Tieniu Tan:
Fusion Based Blind Image Steganalysis by Boosting Feature Selection. IWDW 2007: 87-98
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint