Search Results for author: Jing Dong

Found 73 papers, 24 papers with code

Counterfactual Explanations for Face Forgery Detection via Adversarial Removal of Artifacts

2 code implementations12 Apr 2024 Yang Li, Songlin Yang, Wei Wang, Ziwen He, Bo Peng, Jing Dong

We verify the effectiveness of the proposed explanations from two aspects: (1) Counterfactual Trace Visualization: the enhanced forgery images are useful to reveal artifacts by visually contrasting the original images and two different visualization methods; (2) Transferable Adversarial Attacks: the adversarial forgery images generated by attacking the detection model are able to mislead other detection models, implying the removed artifacts are general.

Adversarial Attack counterfactual

Convergence to Nash Equilibrium and No-regret Guarantee in (Markov) Potential Games

no code implementations4 Apr 2024 Jing Dong, Baoxiang Wang, YaoLiang Yu

Our algorithm simultaneously achieves a Nash regret and a regret bound of $O(T^{4/5})$ for potential games, which matches the best available result, without using additional projection steps.

Artifact Feature Purification for Cross-domain Detection of AI-generated Images

no code implementations17 Mar 2024 Zheling Meng, Bo Peng, Jing Dong, Tieniu Tan

We also find that the artifact features APN focuses on across generators and scenes are global and diverse.

Mutual Information Estimation

Beyond Inserting: Learning Identity Embedding for Semantic-Fidelity Personalized Diffusion Generation

no code implementations31 Jan 2024 Yang Li, Songlin Yang, Wei Wang, Jing Dong

The previous methods either failed to accurately fit the face region or lost the interactive generative ability with other existing concepts in T2I models.

Image Generation

Is It Possible to Backdoor Face Forgery Detection with Natural Triggers?

no code implementations31 Dec 2023 Xiaoxuan Han, Songlin Yang, Wei Wang, Ziwen He, Jing Dong

To further investigate natural triggers, we propose a novel analysis-by-synthesis backdoor attack against face forgery detection models, which embeds natural triggers in the latent space.

Backdoor Attack backdoor defense

AE-NeRF: Audio Enhanced Neural Radiance Field for Few Shot Talking Head Synthesis

no code implementations18 Dec 2023 Dongze Li, Kang Zhao, Wei Wang, Bo Peng, Yingya Zhang, Jing Dong, Tieniu Tan

Audio-driven talking head synthesis is a promising topic with wide applications in digital human, film making and virtual reality.

Talking Head Generation

Learning Dense Correspondence for NeRF-Based Face Reenactment

no code implementations16 Dec 2023 Songlin Yang, Wei Wang, Yushi Lan, Xiangyu Fan, Bo Peng, Lei Yang, Jing Dong

Therefore, we are inspired to ask: Can we learn the dense correspondence between different NeRF-based face representations without a 3D parametric model prior?

Face Reenactment

RS-Corrector: Correcting the Racial Stereotypes in Latent Diffusion Models

no code implementations8 Dec 2023 Yue Jiang, Yueming Lyu, Tianxiang Ma, Bo Peng, Jing Dong

Extensive empirical evaluations demonstrate that the introduced \themodel effectively corrects the racial stereotypes of the well-trained Stable Diffusion model while leaving the original model unchanged.

Image Generation

Ego-Exo4D: Understanding Skilled Human Activity from First- and Third-Person Perspectives

no code implementations30 Nov 2023 Kristen Grauman, Andrew Westbury, Lorenzo Torresani, Kris Kitani, Jitendra Malik, Triantafyllos Afouras, Kumar Ashutosh, Vijay Baiyya, Siddhant Bansal, Bikram Boote, Eugene Byrne, Zach Chavis, Joya Chen, Feng Cheng, Fu-Jen Chu, Sean Crane, Avijit Dasgupta, Jing Dong, Maria Escobar, Cristhian Forigua, Abrham Gebreselasie, Sanjay Haresh, Jing Huang, Md Mohaiminul Islam, Suyog Jain, Rawal Khirodkar, Devansh Kukreja, Kevin J Liang, Jia-Wei Liu, Sagnik Majumder, Yongsen Mao, Miguel Martin, Effrosyni Mavroudi, Tushar Nagarajan, Francesco Ragusa, Santhosh Kumar Ramakrishnan, Luigi Seminara, Arjun Somayazulu, Yale Song, Shan Su, Zihui Xue, Edward Zhang, Jinxu Zhang, Angela Castillo, Changan Chen, Xinzhu Fu, Ryosuke Furuta, Cristina Gonzalez, Prince Gupta, Jiabo Hu, Yifei HUANG, Yiming Huang, Weslie Khoo, Anush Kumar, Robert Kuo, Sach Lakhavani, Miao Liu, Mi Luo, Zhengyi Luo, Brighid Meredith, Austin Miller, Oluwatumininu Oguntola, Xiaqing Pan, Penny Peng, Shraman Pramanick, Merey Ramazanova, Fiona Ryan, Wei Shan, Kiran Somasundaram, Chenan Song, Audrey Southerland, Masatoshi Tateno, Huiyu Wang, Yuchen Wang, Takuma Yagi, Mingfei Yan, Xitong Yang, Zecheng Yu, Shengxin Cindy Zha, Chen Zhao, Ziwei Zhao, Zhifan Zhu, Jeff Zhuo, Pablo Arbelaez, Gedas Bertasius, David Crandall, Dima Damen, Jakob Engel, Giovanni Maria Farinella, Antonino Furnari, Bernard Ghanem, Judy Hoffman, C. V. Jawahar, Richard Newcombe, Hyun Soo Park, James M. Rehg, Yoichi Sato, Manolis Savva, Jianbo Shi, Mike Zheng Shou, Michael Wray

We present Ego-Exo4D, a diverse, large-scale multimodal multiview video dataset and benchmark challenge.

Video Understanding

DeltaSpace: A Semantic-aligned Feature Space for Flexible Text-guided Image Editing

1 code implementation12 Oct 2023 Yueming Lyu, Kang Zhao, Bo Peng, Yue Jiang, Yingya Zhang, Jing Dong

Based on DeltaSpace, we propose a novel framework called DeltaEdit, which maps the CLIP visual feature differences to the latent space directions of a generative model during the training phase, and predicts the latent space directions from the CLIP textual feature differences during the inference phase.

text-guided-image-editing

DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment

1 code implementation journal 2023 Bo Peng, Xianyun Sun, Caiyong Wang, Wei Wang1, Jing Dong, Zhenan Sun

This paper presents the summary report on the DeepFake Game Competition on Visual Realism Assessment (DFGCVRA).

Face Swapping

GaFET: Learning Geometry-aware Facial Expression Translation from In-The-Wild Images

no code implementations ICCV 2023 Tianxiang Ma, Bingchuan Li, Qian He, Jing Dong, Tieniu Tan

In this paper, we introduce a novel Geometry-aware Facial Expression Translation (GaFET) framework, which is based on parametric 3D facial representations and can stably decoupled expression.

Facial Expression Translation

InfoStyler: Disentanglement Information Bottleneck for Artistic Style Transfer

no code implementations30 Jul 2023 Yueming Lyu, Yue Jiang, Bo Peng, Jing Dong

InfoStyler formulates the disentanglement representation learning as an information compression problem by eliminating style statistics from the content image and removing the content structure from the style image.

Disentanglement Style Transfer

Freestyle 3D-Aware Portrait Synthesis Based on Compositional Generative Priors

no code implementations27 Jun 2023 Tianxiang Ma, Kang Zhao, Jianxin Sun, Yingya Zhang, Jing Dong

Efficiently generating a freestyle 3D portrait with high quality and 3D-consistency is a promising yet challenging task.

3D-Aware Adversarial Makeup Generation for Facial Privacy Protection

no code implementations26 Jun 2023 Yueming Lyu, Yue Jiang, Ziwen He, Bo Peng, Yunfan Liu, Jing Dong

The privacy and security of face data on social media are facing unprecedented challenges as it is vulnerable to unauthorized access and identification.

Face Recognition Face Verification

Taming the Exponential Action Set: Sublinear Regret and Fast Convergence to Nash Equilibrium in Online Congestion Games

no code implementations19 Jun 2023 Jing Dong, Jingyu Wu, Siwei Wang, Baoxiang Wang, Wei Chen

The congestion game is a powerful model that encompasses a range of engineering systems such as traffic networks and resource allocation.

Decentralization and Acceleration Enables Large-Scale Bundle Adjustment

1 code implementation11 May 2023 Taosha Fan, Joseph Ortiz, Ming Hsiao, Maurizio Monge, Jing Dong, Todd Murphey, Mustafa Mukadam

In this paper, we present a fully decentralized method that alleviates computation and communication bottlenecks to solve arbitrarily large bundle adjustment problems.

DeltaEdit: Exploring Text-free Training for Text-Driven Image Manipulation

1 code implementation CVPR 2023 Yueming Lyu, Tianwei Lin, Fu Li, Dongliang He, Jing Dong, Tieniu Tan

Our key idea is to investigate and identify a space, namely delta image and text space that has well-aligned distribution between CLIP visual feature differences of two images and CLIP textual embedding differences of source and target texts.

Image Manipulation

RiDDLE: Reversible and Diversified De-identification with Latent Encryptor

1 code implementation CVPR 2023 Dongze Li, Wei Wang, Kang Zhao, Jing Dong, Tieniu Tan

This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor, to protect the identity information of people from being misused.

De-identification

Designing a 3D-Aware StyleNeRF Encoder for Face Editing

no code implementations19 Feb 2023 Songlin Yang, Wei Wang, Bo Peng, Jing Dong

For more flexible face manipulation, we then design a dual-branch StyleFlow module to transfer the StyleNeRF codes with disentangled geometry and texture flows.

Attribute Face Model +1

Semantic 3D-aware Portrait Synthesis and Manipulation Based on Compositional Neural Radiance Field

1 code implementation3 Feb 2023 Tianxiang Ma, Bingchuan Li, Qian He, Jing Dong, Tieniu Tan

CNeRF divides the image by semantic regions and learns an independent neural radiance field for each region, and finally fuses them and renders the complete image.

CFFT-GAN: Cross-domain Feature Fusion Transformer for Exemplar-based Image Translation

no code implementations3 Feb 2023 Tianxiang Ma, Bingchuan Li, Wei Liu, Miao Hua, Jing Dong, Tieniu Tan

In this paper, we propose a more general learning approach by considering two domain features as a whole and learning both inter-domain correspondence and intra-domain potential information interactions.

Translation

Visual Realism Assessment for Face-swap Videos

1 code implementation2 Feb 2023 Xianyun Sun, Beibei Dong, Caiyong Wang, Bo Peng, Jing Dong

Visual realism assessment, or VRA, is essential for assessing the potential impact that may be brought by a specific face-swap video, and it is also important as a quality assessment metric to compare different face-swap methods.

DeepFake Detection Face Swapping

Online Policy Optimization for Robust MDP

no code implementations28 Sep 2022 Jing Dong, Jingwei Li, Baoxiang Wang, Jingzhao Zhang

Reinforcement learning (RL) has exceeded human performance in many synthetic settings such as video games and Go.

Reinforcement Learning (RL)

Theseus: A Library for Differentiable Nonlinear Optimization

1 code implementation19 Jul 2022 Luis Pineda, Taosha Fan, Maurizio Monge, Shobha Venkataraman, Paloma Sodhi, Ricky T. Q. Chen, Joseph Ortiz, Daniel DeTone, Austin Wang, Stuart Anderson, Jing Dong, Brandon Amos, Mustafa Mukadam

We present Theseus, an efficient application-agnostic open source library for differentiable nonlinear least squares (DNLS) optimization built on PyTorch, providing a common framework for end-to-end structured learning in robotics and vision.

Learning to Control under Time-Varying Environment

no code implementations6 Jun 2022 Yuzhen Han, Ruben Solozabal, Jing Dong, Xingyu Zhou, Martin Takac, Bin Gu

To the best of our knowledge, our study establishes the first model-based online algorithm with regret guarantees under LTV dynamical systems.

Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models

no code implementations30 May 2022 Songlin Yang, Wei Wang, Chenye Xu, Ziwen He, Bo Peng, Jing Dong

These fine-grained adversarial examples can be used for selecting robust backbone networks and auxiliary features.

Adversarial Attack Adversarial Robustness +1

Can We Do Better Than Random Start? The Power of Data Outsourcing

no code implementations17 May 2022 Yi Chen, Jing Dong, Xin T. Tong

Based on three different scenarios, we propose simulation-based algorithms that can utilize a small amount of outsourced data to find good initial points accordingly.

Algorithms and Theory for Supervised Gradual Domain Adaptation

no code implementations25 Apr 2022 Jing Dong, Shiji Zhou, Baoxiang Wang, Han Zhao

We thus study the problem of supervised gradual domain adaptation, where labeled data from shifting distributions are available to the learner along the trajectory, and we aim to learn a classifier on a target data distribution of interest.

Domain Adaptation

Provably Efficient Convergence of Primal-Dual Actor-Critic with Nonlinear Function Approximation

no code implementations28 Feb 2022 Jing Dong, Li Shen, Yinggan Xu, Baoxiang Wang

We study the convergence of the actor-critic algorithm with nonlinear function approximation under a nonconvex-nonconcave primal-dual formulation.

Continuous Control OpenAI Gym +1

Stochastic Gradient Descent with Dependent Data for Offline Reinforcement Learning

no code implementations6 Feb 2022 Jing Dong, Xin T. Tong

The policy evaluation algorithm is then combined with the policy iteration algorithm to learn the optimal policy.

Q-Learning reinforcement-learning +2

DRAN: Detailed Region-Adaptive Normalization for Conditional Image Synthesis

1 code implementation29 Sep 2021 Yueming Lyu, Peibin Chen, Jingna Sun, Bo Peng, Xu Wang, Jing Dong

To evaluate the effectiveness and show the general use of our method, we conduct a set of experiments on makeup transfer and semantic image synthesis.

Facial Makeup Transfer Image Generation +2

Incentivizing an Unknown Crowd

no code implementations9 Sep 2021 Jing Dong, Shuai Li, Baoxiang Wang

Motivated by the common strategic activities in crowdsourcing labeling, we study the problem of sequential eliciting information without verification (EIWV) for workers with a heterogeneous and unknown crowd.

reinforcement-learning Reinforcement Learning (RL)

A Systematical Solution for Face De-identification

no code implementations19 Jul 2021 Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong

Through this, we can construct unrestricted adversarial image to decrease ID similarity recognized by model.

Attribute De-identification +2

Transferable Sparse Adversarial Attack

2 code implementations CVPR 2022 Ziwen He, Wei Wang, Jing Dong, Tieniu Tan

The experiment shows that our method has improved the transferability by a large margin under a similar sparsity setting compared with state-of-the-art methods.

Adversarial Attack Quantization

CFA-Net: Controllable Face Anonymization Network with Identity Representation Manipulation

no code implementations24 May 2021 Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong

We propose a Controllable Face Anonymization Network (CFA-Net), a novel approach that can anonymize the identity of given faces in images and videos, based on a generator that can disentangle face identity from other image contents.

De-identification Face Anonymization

Cascading Bandit under Differential Privacy

no code implementations24 May 2021 Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao

This paper studies \emph{differential privacy (DP)} and \emph{local differential privacy (LDP)} in cascading bandits.

Robust Face-Swap Detection Based on 3D Facial Shape Information

no code implementations28 Apr 2021 Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan

Maliciously-manipulated images or videos - so-called deep fakes - especially face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.

SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer

no code implementations21 Apr 2021 Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan

Since human faces are symmetrical in the UV space, we can conveniently remove the undesired shadow and occlusion from the reference image by carefully designing a Flip Attention Module (FAM).

Face Model Facial Makeup Transfer

Combinatorial Bandits under Strategic Manipulations

1 code implementation25 Feb 2021 Jing Dong, Ke Li, Shuai Li, Baoxiang Wang

Strategic behavior against sequential learning methods, such as "click framing" in real recommendation systems, have been widely observed.

Multi-Armed Bandits Recommendation Systems

On the SRPT Scheduling Discipline in Many-Server Queues with Impatient Customers

no code implementations11 Feb 2021 Jing Dong, Rouba Ibrahim

The shortest-remaining-processing-time (SRPT) scheduling policy has been extensively studied, for more than 50 years, in single-server queues with infinitely patient jobs.

Probability 60K25, 68M20, 90B22

A Primal-Dual Approach to Constrained Markov Decision Processes

no code implementations26 Jan 2021 Yi Chen, Jing Dong, Zhaoran Wang

In many operations management problems, we need to make decisions sequentially to minimize the cost while satisfying certain constraints.

Optimization and Control

Exploring Adversarial Fake Images on Face Manifold

no code implementations CVPR 2021 Dongze Li, Wei Wang, Hongxing Fan, Jing Dong

Then, the generated fake images driven by the adversarial latent vectors with the help of GANs can defeat main-stream forensic models.

Adversarial Attack DeepFake Detection +2

Distributed Thompson Sampling

no code implementations3 Dec 2020 Jing Dong, Tan Li, Shaolei Ren, Linqi Song

To further improve the performance of distributed Thompson Sampling, we propose a distributed Elimination based Thompson Sampling algorithm that allow the agents to learn collaboratively.

Multi-Armed Bandits Thompson Sampling

MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation

1 code implementation CVPR 2021 Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong

To deal with this problem, we propose a novel multi-level statistics transfer model, which disentangles and transfers multi-level appearance features from person images and merges them with pose features to reconstruct the source person images themselves.

Pose Transfer Style Transfer

TLIO: Tight Learned Inertial Odometry

no code implementations6 Jul 2020 Wenxin Liu, David Caruso, Eddy Ilg, Jing Dong, Anastasios I. Mourikis, Kostas Daniilidis, Vijay Kumar, Jakob Engel

We show that our network, trained with pedestrian data from a headset, can produce statistically consistent measurement and uncertainty to be used as the update step in the filter, and the tightly-coupled system outperforms velocity integration approaches in position estimates, and AHRS attitude filter in orientation estimates.

Position

Accelerating Nonconvex Learning via Replica Exchange Langevin Diffusion

no code implementations ICLR 2019 Yi Chen, Jinglin Chen, Jing Dong, Jian Peng, Zhaoran Wang

To attain the advantages of both regimes, we propose to use replica exchange, which swaps between two Langevin diffusions with different temperatures.

Learning Pose-invariant 3D Object Reconstruction from Single-view Images

1 code implementation3 Apr 2020 Bo Peng, Wei Wang, Jing Dong, Tieniu Tan

Learning to reconstruct 3D shapes using 2D images is an active research topic, with benefits of not requiring expensive 3D data.

3D Object Reconstruction Domain Adaptation

Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition

no code implementations22 Feb 2020 Ziwen He, Wei Wang, Jing Dong, Tieniu Tan

In this paper, we demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.

Adversarial Attack Gait Recognition +1

Replica Exchange for Non-Convex Optimization

no code implementations23 Jan 2020 Jing Dong, Xin T. Tong

Gradient descent (GD) is known to converge quickly for convex objective functions, but it can be trapped at local minima.

A New Ensemble Method for Concessively Targeted Multi-model Attack

no code implementations19 Dec 2019 Ziwen He, Wei Wang, Xinsheng Xuan, Jing Dong, Tieniu Tan

Thus, in this paper, we propose a new attack mechanism which performs the non-targeted attack when the targeted attack fails.

Image Classification

Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning

no code implementations10 Dec 2019 Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong

The new types of generated images are emerging one after another, and the existing detection methods cannot cope well.

General Classification Image Classification +2

On Constructing Confidence Region for Model Parameters in Stochastic Gradient Descent via Batch Means

no code implementations4 Nov 2019 Yi Zhu, Jing Dong

In this paper, we study a simple algorithm to construct asymptotically valid confidence regions for model parameters using the batch means method.

valid

Uncertainty Quantification and Exploration for Reinforcement Learning

no code implementations ICLR 2020 YI Zhu, Jing Dong, Henry Lam

We investigate statistical uncertainty quantification for reinforcement learning (RL) and its implications in exploration policy.

reinforcement-learning Reinforcement Learning (RL) +2

miniSAM: A Flexible Factor Graph Non-linear Least Squares Optimization Framework

1 code implementation3 Sep 2019 Jing Dong, Zhaoyang Lv

Many problems in computer vision and robotics can be phrased as non-linear least squares optimization problems represented by factor graphs, for example, simultaneous localization and mapping (SLAM), structure from motion (SfM), motion planning, and control.

Benchmarking Motion Planning +1

On the generalization of GAN image forensics

no code implementations27 Feb 2019 Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong

Recently the GAN generated face images are more and more realistic with high-quality, even hard for human eyes to detect.

GAN image forensics Image Forensics

Learning to Align Images using Weak Geometric Supervision

no code implementations4 Aug 2018 Jing Dong, Byron Boots, Frank Dellaert, Ranveer Chandra, Sudipta N. Sinha

Such descriptors are often derived using supervised learning on existing datasets with ground truth correspondences.

Video Alignment

DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval

1 code implementation8 Jun 2018 Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan

There are great demands for automatically regulating inappropriate appearance of shocking firearm images in social media or identifying firearm types in forensics.

Image Retrieval Retrieval

Continuous-Time Gaussian Process Motion Planning via Probabilistic Inference

1 code implementation24 Jul 2017 Mustafa Mukadam, Jing Dong, Xinyan Yan, Frank Dellaert, Byron Boots

We benchmark our algorithms against several sampling-based and trajectory optimization-based motion planning algorithms on planning problems in multiple environments.

Robotics

SSGAN: Secure Steganography Based on Generative Adversarial Networks

no code implementations6 Jul 2017 Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiao-Yu Zhang

Furthermore, a sophisticated steganalysis network is reconstructed for the discriminative network, and the network can better evaluate the performance of the generated images.

Steganalysis

Sparse Gaussian Processes for Continuous-Time Trajectory Estimation on Matrix Lie Groups

2 code implementations17 May 2017 Jing Dong, Byron Boots, Frank Dellaert

Continuous-time trajectory representations are a powerful tool that can be used to address several issues in many practical simultaneous localization and mapping (SLAM) scenarios, like continuously collected measurements distorted by robot motion, or during with asynchronous sensor measurements.

Robotics

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?

1 code implementation5 Nov 2016 Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan

Based on the evaluation results, we also identify the best choices for different factors and propose a new multi-scale image feature representation method to encode the image effectively.

Image Retrieval Retrieval

4D Crop Monitoring: Spatio-Temporal Reconstruction for Agriculture

no code implementations8 Oct 2016 Jing Dong, John Gary Burnham, Byron Boots, Glen C. Rains, Frank Dellaert

Autonomous crop monitoring at high spatial and temporal resolution is a critical problem in precision agriculture.

4D reconstruction

Cannot find the paper you are looking for? You can Submit a new open access paper.