default search action
Chenhao Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. Comput. Secur. 142: 103855 (2024) - [j17]Qian Li, Chao Shen, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024) - [j16]Chenhao Lin, Tianle Song, Yingmao Miao, Jingyi He, Minghui Yang, Huan Wang, Chao Shen:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. IEEE Trans. Dependable Secur. Comput. 21(4): 2257-2272 (2024) - [j15]Jiwei Tian, Chao Shen, Buhong Wang, Xiaofang Xia, Meng Zhang, Chenhao Lin, Qian Li:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 4418-4432 (2024) - [j14]Yulong Yang, Chenhao Lin, Qian Li, Zhengyu Zhao, Haoran Fan, Dawei Zhou, Nannan Wang, Tongliang Liu, Chao Shen:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. IEEE Trans. Inf. Forensics Secur. 19: 3265-3278 (2024) - [j13]Yulong Yang, Haoran Fan, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. IEEE Trans. Inf. Forensics Secur. 19: 5880-5894 (2024) - [j12]Qian Li, Qingyuan Hu, Haoran Fan, Chenhao Lin, Chao Shen, Libing Wu:
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. IEEE Trans. Inf. Forensics Secur. 19: 8673-8684 (2024) - [j11]Chenhao Lin, Fangbin Yi, Hang Wang, Jingyi Deng, Zhengyu Zhao, Qian Li, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 8832-8844 (2024) - [j10]Aokang Pang, Huijun Liang, Chenhao Lin, Lei Yao:
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem. J. Supercomput. 80(8): 11261-11292 (2024) - [c19]Mengjie Wu, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang, Lina Wang:
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. AAAI 2024: 19965-19973 - [c18]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CVPR 2024: 24452-24461 - [c17]Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen:
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval. ICML 2024 - [c16]Zhoulin Ji, Chenhao Lin, Hang Wang, Chao Shen:
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis. IJCAI 2024: 413-421 - [i21]Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin:
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. CoRR abs/2401.00137 (2024) - [i20]Jiwei Tian, Chao Shen, Buhong Wang, Xiaofang Xia, Meng Zhang, Chenhao Lin, Qian Li:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. CoRR abs/2401.16001 (2024) - [i19]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CoRR abs/2403.17301 (2024) - [i18]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024) - [i17]Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang:
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study. CoRR abs/2407.09295 (2024) - [i16]Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen:
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication. CoRR abs/2407.10575 (2024) - 2023
- [j9]Sicong Han, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. ACM Comput. Surv. 55(14s): 328:1-328:38 (2023) - [j8]Chenhao Lin, Sicong Han, Jiongli Zhu, Qian Li, Chao Shen, Youwei Zhang, Xiaohong Guan:
Sensitive region-aware black-box adversarial attacks. Inf. Sci. 637: 118929 (2023) - [j7]Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j6]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023) - [j5]Qian Li, Qingyuan Hu, Chenhao Lin, Di Wu, Chao Shen:
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. IEEE Trans. Inf. Forensics Secur. 18: 5936-5949 (2023) - [c15]Jiajia Li, Chenhao Lin, Zikai Wang, Haitao Song, Feng Tan, Lun Hu, Pengwei Hu:
MLGL: Model-free Lesion Generation and Learning for Diabetic Retinopathy Diagnosis. BIBM 2023: 1266-1271 - [c14]Pengwei Hu, Chenhao Lin, Jiajia Li, Feng Tan, Xue Han, Xi Zhou, Lun Hu:
Making the Implicit Explicit: Depression Detection in Web across Posted Texts and Images. BIBM 2023: 4807-4811 - [c13]Chen Lu, Huijun Liang, Heng Xie, Chenhao Lin, Shuxin Lu:
A Surrogate-Based Optimization Method for Solving Economic Emission Dispatch Problems with Green Certificate Trading and Wind Power. BIC-TA (1) 2023: 29-43 - [c12]Bowen Pei, Jingyi Deng, Chenhao Lin, Pengwei Hu, Chao Shen:
Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization. ICAI (2) 2023: 202-213 - [c11]Zixuan Yang, Chenhao Lin, Pengwei Hu, Chao Shen:
DeepSensitive: A Fuzzing Test for Deep Neural Networks with Sensitive Neurons. ICAI (1) 2023: 351-362 - [c10]Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. ICICS 2023: 467-484 - [c9]Yingmao Miao, Qiwei Tian, Chenhao Lin, Tianle Song, Yajie Zhou, Junyi Zhao, Shuxin Gao, Minghui Yang, Chao Shen:
Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction. IJCAI 2023: 3029-3037 - [c8]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [i15]Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li:
End-to-end Face-swapping via Adaptive Latent Representation Learning. CoRR abs/2303.04186 (2023) - [i14]Yulong Yang, Chenhao Lin, Qian Li, Chao Shen, Dawei Zhou, Nannan Wang, Tongliang Liu:
Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths. CoRR abs/2305.05875 (2023) - [i13]Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang:
Hard Adversarial Example Mining for Improving Robust Fairness. CoRR abs/2308.01823 (2023) - [i12]Xiaobei Li, Changchun Yin, Liming Fang, Run Wang, Chenhao Lin:
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning. CoRR abs/2308.04673 (2023) - [i11]Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning. CoRR abs/2310.00626 (2023) - [i10]Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Jingyi Deng, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. CoRR abs/2310.04845 (2023) - [i9]Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen:
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning. CoRR abs/2310.09891 (2023) - [i8]Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval. CoRR abs/2312.07364 (2023) - 2022
- [i7]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - [i6]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - [i5]Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang:
Artificial Intelligence Security Competition (AISC). CoRR abs/2212.03412 (2022) - 2021
- [c7]Sicong Han, Chenhao Lin, Chao Shen, Qian Wang:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. ICICS (2) 2021: 73-89 - [i4]Hongbin Sun, Zhanghui Kuang, Xiaoyu Yue, Chenhao Lin, Wayne Zhang:
Spatial Dual-Modality Graph Reasoning for Key Information Extraction. CoRR abs/2103.14470 (2021) - 2020
- [c6]Chenhao Lin, Siwen Wang, Dongqi Xu, Yu Lu, Wayne Zhang:
Object Instance Mining for Weakly Supervised Object Detection. AAAI 2020: 11482-11489 - [c5]Xiaoyu Yue, Zhanghui Kuang, Chenhao Lin, Hongbin Sun, Wayne Zhang:
RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition. ECCV (19) 2020: 135-151 - [c4]Pengwei Hu, Chenhao Lin, Hui Su, Shaochun Li, Xue Han, Yuan Zhang, Jing Mei:
BlueMemo: Depression Analysis through Twitter Posts. IJCAI 2020: 5252-5254 - [c3]Chenhao Lin, Pengwei Hu, Hui Su, Shaochun Li, Jing Mei, Jie Zhou, Henry Leung:
SenseMood: Depression Detection on Social Media. ICMR 2020: 407-411 - [i3]Chenhao Lin, Siwen Wang, Dongqi Xu, Yu Lu, Wayne Zhang:
Object Instance Mining for Weakly Supervised Object Detection. CoRR abs/2002.01087 (2020) - [i2]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020) - [i1]Xiaoyu Yue, Zhanghui Kuang, Chenhao Lin, Hongbin Sun, Wayne Zhang:
RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition. CoRR abs/2007.07542 (2020)
2010 – 2019
- 2019
- [j4]Chenhao Lin, Ajay Kumar:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. IEEE Trans. Inf. Forensics Secur. 14(3): 662-676 (2019) - 2018
- [j3]Chenhao Lin, Ajay Kumar:
Tetrahedron Based Fast 3D Fingerprint Identification Using Colored LEDs Illumination. IEEE Trans. Pattern Anal. Mach. Intell. 40(12): 3022-3033 (2018) - [j2]Chenhao Lin, Ajay Kumar:
Contactless and partial 3D fingerprint recognition using multi-view deep representation. Pattern Recognit. 83: 314-327 (2018) - [j1]Chenhao Lin, Ajay Kumar:
Matching Contactless and Contact-Based Conventional Fingerprint Images for Biometrics Identification. IEEE Trans. Image Process. 27(4): 2008-2021 (2018) - 2017
- [c2]Chenhao Lin, Ajay Kumar:
Multi-Siamese networks to accurately match contactless to contact-based fingerprint images. IJCB 2017: 277-285 - 2016
- [c1]Chenhao Lin, Ajay Kumar:
Improving cross sensor interoperability for fingerprint identification. ICPR 2016: 943-948
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint