Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chenhao Lin
@article{DBLP:journals/tdsc/LiSHLJQ24, author = {Qian Li and Chao Shen and Qingyuan Hu and Chenhao Lin and Xiang Ji and Saiyu Qi}, title = {Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {530--541}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2022.3184594}, doi = {10.1109/TDSC.2022.3184594}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSHLJQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLLZFZWLS24, author = {Yulong Yang and Chenhao Lin and Qian Li and Zhengyu Zhao and Haoran Fan and Dawei Zhou and Nannan Wang and Tongliang Liu and Chao Shen}, title = {Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3265--3278}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3360891}, doi = {10.1109/TIFS.2024.3360891}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLLZFZWLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/WuMWZLLL0024, author = {Mengjie Wu and Jingui Ma and Run Wang and Sidan Zhang and Ziyou Liang and Boheng Li and Chenhao Lin and Liming Fang and Lina Wang}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {19965--19973}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i18.29973}, doi = {10.1609/AAAI.V38I18.29973}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/WuMWZLLL0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-00137, author = {Qiannan Wang and Changchun Yin and Liming Fang and Lu Zhou and Zhe Liu and Run Wang and Chenhao Lin}, title = {{SSL-OTA:} Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection}, journal = {CoRR}, volume = {abs/2401.00137}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.00137}, doi = {10.48550/ARXIV.2401.00137}, eprinttype = {arXiv}, eprint = {2401.00137}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-00137.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-16001, author = {Jiwei Tian and Chao Shen and Buhong Wang and Xiaofang Xia and Meng Zhang and Chenhao Lin and Qian Li}, title = {{LESSON:} Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection}, journal = {CoRR}, volume = {abs/2401.16001}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.16001}, doi = {10.48550/ARXIV.2401.16001}, eprinttype = {arXiv}, eprint = {2401.16001}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-16001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17301, author = {Junhao Zheng and Chenhao Lin and Jiahao Sun and Zhengyu Zhao and Qian Li and Chao Shen}, title = {Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving}, journal = {CoRR}, volume = {abs/2403.17301}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17301}, doi = {10.48550/ARXIV.2403.17301}, eprinttype = {arXiv}, eprint = {2403.17301}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17301.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HanL00G23, author = {Sicong Han and Chenhao Lin and Chao Shen and Qian Wang and Xiaohong Guan}, title = {Interpreting Adversarial Examples in Deep Learning: {A} Review}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {14s}, pages = {328:1--328:38}, year = {2023}, url = {https://doi.org/10.1145/3594869}, doi = {10.1145/3594869}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HanL00G23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LinHZLSZG23, author = {Chenhao Lin and Sicong Han and Jiongli Zhu and Qian Li and Chao Shen and Youwei Zhang and Xiaohong Guan}, title = {Sensitive region-aware black-box adversarial attacks}, journal = {Inf. Sci.}, volume = {637}, pages = {118929}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.04.008}, doi = {10.1016/J.INS.2023.04.008}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LinHZLSZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LinHSLW23, author = {Chenhao Lin and Jingyi He and Chao Shen and Qi Li and Qian Wang}, title = {CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2314--2327}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3179603}, doi = {10.1109/TDSC.2022.3179603}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LinHSLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinZSCFLL23, author = {Kaidi Jin and Tianwei Zhang and Chao Shen and Yufei Chen and Ming Fan and Chenhao Lin and Ting Liu}, title = {Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {2867--2881}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3194642}, doi = {10.1109/TDSC.2022.3194642}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JinZSCFLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHLWS23, author = {Qian Li and Qingyuan Hu and Chenhao Lin and Di Wu and Chao Shen}, title = {Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5936--5949}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3289000}, doi = {10.1109/TIFS.2023.3289000}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHLWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/LiLWSTHH23, author = {Jiajia Li and Chenhao Lin and Zikai Wang and Haitao Song and Feng Tan and Lun Hu and Pengwei Hu}, editor = {Xingpeng Jiang and Haiying Wang and Reda Alhajj and Xiaohua Hu and Felix Engel and Mufti Mahmud and Nadia Pisanti and Xuefeng Cui and Hong Song}, title = {{MLGL:} Model-free Lesion Generation and Learning for Diabetic Retinopathy Diagnosis}, booktitle = {{IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2023, Istanbul, Turkiye, December 5-8, 2023}, pages = {1266--1271}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BIBM58861.2023.10385724}, doi = {10.1109/BIBM58861.2023.10385724}, timestamp = {Thu, 14 Mar 2024 16:59:09 +0100}, biburl = {https://dblp.org/rec/conf/bibm/LiLWSTHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibm/HuLLTHZH23, author = {Pengwei Hu and Chenhao Lin and Jiajia Li and Feng Tan and Xue Han and Xi Zhou and Lun Hu}, editor = {Xingpeng Jiang and Haiying Wang and Reda Alhajj and Xiaohua Hu and Felix Engel and Mufti Mahmud and Nadia Pisanti and Xuefeng Cui and Hong Song}, title = {Making the Implicit Explicit: Depression Detection in Web across Posted Texts and Images}, booktitle = {{IEEE} International Conference on Bioinformatics and Biomedicine, {BIBM} 2023, Istanbul, Turkiye, December 5-8, 2023}, pages = {4807--4811}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BIBM58861.2023.10385590}, doi = {10.1109/BIBM58861.2023.10385590}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibm/HuLLTHZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiangSLWSG23, author = {Weipeng Jiang and Chao Shen and Chenhao Lin and Jingyi Wang and Jun Sun and Xuanqi Gao}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Black-Box Fairness Testing with Shadow Models}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {467--484}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_28}, doi = {10.1007/978-981-99-7356-9\_28}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/JiangSLWSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/MiaoTLSZZGY023, author = {Yingmao Miao and Qiwei Tian and Chenhao Lin and Tianle Song and Yajie Zhou and Junyi Zhao and Shuxin Gao and Minghui Yang and Chao Shen}, title = {Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction}, booktitle = {Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, {IJCAI} 2023, 19th-25th August 2023, Macao, SAR, China}, pages = {3029--3037}, publisher = {ijcai.org}, year = {2023}, url = {https://doi.org/10.24963/ijcai.2023/338}, doi = {10.24963/IJCAI.2023/338}, timestamp = {Mon, 28 Aug 2023 17:23:07 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/MiaoTLSZZGY023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuM0L00R23, author = {Xinghui Wu and Shiqing Ma and Chao Shen and Chenhao Lin and Qian Wang and Qi Li and Yuan Rao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{KENKU:} Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {247--264}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-xinghui}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuM0L00R23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04186, author = {Chenhao Lin and Pengbin Hu and Chao Shen and Qian Li}, title = {End-to-end Face-swapping via Adaptive Latent Representation Learning}, journal = {CoRR}, volume = {abs/2303.04186}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04186}, doi = {10.48550/ARXIV.2303.04186}, eprinttype = {arXiv}, eprint = {2303.04186}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05875, author = {Yulong Yang and Chenhao Lin and Qian Li and Chao Shen and Dawei Zhou and Nannan Wang and Tongliang Liu}, title = {Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths}, journal = {CoRR}, volume = {abs/2305.05875}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05875}, doi = {10.48550/ARXIV.2305.05875}, eprinttype = {arXiv}, eprint = {2305.05875}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-01823, author = {Chenhao Lin and Xiang Ji and Yulong Yang and Qian Li and Chao Shen and Run Wang and Liming Fang}, title = {Hard Adversarial Example Mining for Improving Robust Fairness}, journal = {CoRR}, volume = {abs/2308.01823}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.01823}, doi = {10.48550/ARXIV.2308.01823}, eprinttype = {arXiv}, eprint = {2308.01823}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-01823.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-04673, author = {Xiaobei Li and Changchun Yin and Liming Fang and Run Wang and Chenhao Lin}, title = {SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning}, journal = {CoRR}, volume = {abs/2308.04673}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.04673}, doi = {10.48550/ARXIV.2308.04673}, eprinttype = {arXiv}, eprint = {2308.04673}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-04673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00626, author = {Qiannan Wang and Changchun Yin and Zhe Liu and Liming Fang and Run Wang and Chenhao Lin}, title = {GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning}, journal = {CoRR}, volume = {abs/2310.00626}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00626}, doi = {10.48550/ARXIV.2310.00626}, eprinttype = {arXiv}, eprint = {2310.00626}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04845, author = {Chenhao Lin and Fangbin Yi and Hang Wang and Qian Li and Jingyi Deng and Chao Shen}, title = {Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection}, journal = {CoRR}, volume = {abs/2310.04845}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04845}, doi = {10.48550/ARXIV.2310.04845}, eprinttype = {arXiv}, eprint = {2310.04845}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04845.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09891, author = {Yulong Yang and Chenhao Lin and Xiang Ji and Qiwei Tian and Qian Li and Hongshan Yang and Zhibo Wang and Chao Shen}, title = {Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning}, journal = {CoRR}, volume = {abs/2310.09891}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09891}, doi = {10.48550/ARXIV.2310.09891}, eprinttype = {arXiv}, eprint = {2310.09891}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09891.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07364, author = {Qiwei Tian and Chenhao Lin and Qian Li and Zhengyu Zhao and Chao Shen}, title = {Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval}, journal = {CoRR}, volume = {abs/2312.07364}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07364}, doi = {10.48550/ARXIV.2312.07364}, eprinttype = {arXiv}, eprint = {2312.07364}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-02115, author = {Chenhao Lin and Jingyi Deng and Pengbin Hu and Chao Shen and Qian Wang and Qi Li}, title = {Towards Benchmarking and Evaluating Deepfake Detection}, journal = {CoRR}, volume = {abs/2203.02115}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.02115}, doi = {10.48550/ARXIV.2203.02115}, eprinttype = {arXiv}, eprint = {2203.02115}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-02115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07809, author = {Run Wang and Jixing Ren and Boheng Li and Tianyi She and Chenhao Lin and Liming Fang and Jing Chen and Chao Shen and Lina Wang}, title = {Free Fine-tuning: {A} Plug-and-Play Watermarking Scheme for Deep Neural Networks}, journal = {CoRR}, volume = {abs/2210.07809}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07809}, doi = {10.48550/ARXIV.2210.07809}, eprinttype = {arXiv}, eprint = {2210.07809}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03412, author = {Yinpeng Dong and Peng Chen and Senyou Deng and Lianji L and Yi Sun and Hanyu Zhao and Jiaxing Li and Yunteng Tan and Xinyu Liu and Yangyi Dong and Enhui Xu and Jincai Xu and Shu Xu and Xuelin Fu and Changfeng Sun and Haoliang Han and Xuchong Zhang and Shen Chen and Zhimin Sun and Junyi Cao and Taiping Yao and Shouhong Ding and Yu Wu and Jian Lin and Tianpeng Wu and Ye Wang and Yu Fu and Lin Feng and Kangkang Gao and Zeyu Liu and Yuanzhe Pang and Chengqi Duan and Huipeng Zhou and Yajie Wang and Yuhang Zhao and Shangbo Wu and Haoran Lyu and Zhiyu Lin and Yifei Gao and Shuang Li and Haonan Wang and Jitao Sang and Chen Ma and Junhao Zheng and Yijia Li and Chao Shen and Chenhao Lin and Zhichao Cui and Guoshuai Liu and Huafeng Shi and Kun Hu and Mengxin Zhang}, title = {Artificial Intelligence Security Competition {(AISC)}}, journal = {CoRR}, volume = {abs/2212.03412}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03412}, doi = {10.48550/ARXIV.2212.03412}, eprinttype = {arXiv}, eprint = {2212.03412}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HanLSW21, author = {Sicong Han and Chenhao Lin and Chao Shen and Qian Wang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Rethinking Adversarial Examples Exploiting Frequency-Based Analysis}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {73--89}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_5}, doi = {10.1007/978-3-030-88052-1\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HanLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14470, author = {Hongbin Sun and Zhanghui Kuang and Xiaoyu Yue and Chenhao Lin and Wayne Zhang}, title = {Spatial Dual-Modality Graph Reasoning for Key Information Extraction}, journal = {CoRR}, volume = {abs/2103.14470}, year = {2021}, url = {https://arxiv.org/abs/2103.14470}, eprinttype = {arXiv}, eprint = {2103.14470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/LinWXLZ20, author = {Chenhao Lin and Siwen Wang and Dongqi Xu and Yu Lu and Wayne Zhang}, title = {Object Instance Mining for Weakly Supervised Object Detection}, booktitle = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA, February 7-12, 2020}, pages = {11482--11489}, publisher = {{AAAI} Press}, year = {2020}, url = {https://doi.org/10.1609/aaai.v34i07.6813}, doi = {10.1609/AAAI.V34I07.6813}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/LinWXLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/YueKLSZ20, author = {Xiaoyu Yue and Zhanghui Kuang and Chenhao Lin and Hongbin Sun and Wayne Zhang}, editor = {Andrea Vedaldi and Horst Bischof and Thomas Brox and Jan{-}Michael Frahm}, title = {RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition}, booktitle = {Computer Vision - {ECCV} 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part {XIX}}, series = {Lecture Notes in Computer Science}, volume = {12364}, pages = {135--151}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58529-7\_9}, doi = {10.1007/978-3-030-58529-7\_9}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/YueKLSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/HuLSLHZM20, author = {Pengwei Hu and Chenhao Lin and Hui Su and Shaochun Li and Xue Han and Yuan Zhang and Jing Mei}, editor = {Christian Bessiere}, title = {BlueMemo: Depression Analysis through Twitter Posts}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {5252--5254}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/760}, doi = {10.24963/IJCAI.2020/760}, timestamp = {Mon, 20 Jul 2020 12:38:52 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/HuLSLHZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mir/LinHSLM0L20, author = {Chenhao Lin and Pengwei Hu and Hui Su and Shaochun Li and Jing Mei and Jie Zhou and Henry Leung}, editor = {Cathal Gurrin and Bj{\"{o}}rn {\TH}{\'{o}}r J{\'{o}}nsson and Noriko Kando and Klaus Sch{\"{o}}ffmann and Yi{-}Ping Phoebe Chen and Noel E. O'Connor}, title = {SenseMood: Depression Detection on Social Media}, booktitle = {Proceedings of the 2020 on International Conference on Multimedia Retrieval, {ICMR} 2020, Dublin, Ireland, June 8-11, 2020}, pages = {407--411}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372278.3391932}, doi = {10.1145/3372278.3391932}, timestamp = {Sun, 14 Jun 2020 12:18:46 +0200}, biburl = {https://dblp.org/rec/conf/mir/LinHSLM0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-01087, author = {Chenhao Lin and Siwen Wang and Dongqi Xu and Yu Lu and Wayne Zhang}, title = {Object Instance Mining for Weakly Supervised Object Detection}, journal = {CoRR}, volume = {abs/2002.01087}, year = {2020}, url = {https://arxiv.org/abs/2002.01087}, eprinttype = {arXiv}, eprint = {2002.01087}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-01087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14871, author = {Kaidi Jin and Tianwei Zhang and Chao Shen and Yufei Chen and Ming Fan and Chenhao Lin and Ting Liu}, title = {A Unified Framework for Analyzing and Detecting Malicious Examples of {DNN} Models}, journal = {CoRR}, volume = {abs/2006.14871}, year = {2020}, url = {https://arxiv.org/abs/2006.14871}, eprinttype = {arXiv}, eprint = {2006.14871}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-07542, author = {Xiaoyu Yue and Zhanghui Kuang and Chenhao Lin and Hongbin Sun and Wayne Zhang}, title = {RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition}, journal = {CoRR}, volume = {abs/2007.07542}, year = {2020}, url = {https://arxiv.org/abs/2007.07542}, eprinttype = {arXiv}, eprint = {2007.07542}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-07542.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinK19, author = {Chenhao Lin and Ajay Kumar}, title = {A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {3}, pages = {662--676}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2854765}, doi = {10.1109/TIFS.2018.2854765}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LinK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/LinK18, author = {Chenhao Lin and Ajay Kumar}, title = {Tetrahedron Based Fast 3D Fingerprint Identification Using Colored LEDs Illumination}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {40}, number = {12}, pages = {3022--3033}, year = {2018}, url = {https://doi.org/10.1109/TPAMI.2017.2771292}, doi = {10.1109/TPAMI.2017.2771292}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/LinK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/LinK18, author = {Chenhao Lin and Ajay Kumar}, title = {Contactless and partial 3D fingerprint recognition using multi-view deep representation}, journal = {Pattern Recognit.}, volume = {83}, pages = {314--327}, year = {2018}, url = {https://doi.org/10.1016/j.patcog.2018.05.004}, doi = {10.1016/J.PATCOG.2018.05.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/LinK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LinK18, author = {Chenhao Lin and Ajay Kumar}, title = {Matching Contactless and Contact-Based Conventional Fingerprint Images for Biometrics Identification}, journal = {{IEEE} Trans. Image Process.}, volume = {27}, number = {4}, pages = {2008--2021}, year = {2018}, url = {https://doi.org/10.1109/TIP.2017.2788866}, doi = {10.1109/TIP.2017.2788866}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/LinK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/LinK17, author = {Chenhao Lin and Ajay Kumar}, title = {Multi-Siamese networks to accurately match contactless to contact-based fingerprint images}, booktitle = {2017 {IEEE} International Joint Conference on Biometrics, {IJCB} 2017, Denver, CO, USA, October 1-4, 2017}, pages = {277--285}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BTAS.2017.8272708}, doi = {10.1109/BTAS.2017.8272708}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icb/LinK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/LinK16, author = {Chenhao Lin and Ajay Kumar}, title = {Improving cross sensor interoperability for fingerprint identification}, booktitle = {23rd International Conference on Pattern Recognition, {ICPR} 2016, Canc{\'{u}}n, Mexico, December 4-8, 2016}, pages = {943--948}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICPR.2016.7899757}, doi = {10.1109/ICPR.2016.7899757}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/LinK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.