Search Results for author: Meiling Li

Found 6 papers, 1 papers with code

Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models

no code implementations3 Mar 2024 Meiling Li, Zhenxing Qian, Xinpeng Zhang

Comprehensive experiments reveal that (1) Our method can effectively attribute fake images to their source models, achieving comparable attribution performance with the state-of-the-art method; (2) Our method has high scalability ability, which is well adapted to real-world attribution scenarios.

Attribute

Object-oriented backdoor attack against image captioning

no code implementations5 Jan 2024 Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li

After training with the poisoned data, the attacked model behaves normally on benign images, but for poisoned images, the model will generate some sentences irrelevant to the given image.

Backdoor Attack Image Captioning +2

Towards Deep Network Steganography: From Networks to Networks

no code implementations7 Jul 2023 Guobiao Li, Sheng Li, Meiling Li, Zhenxing Qian, Xinpeng Zhang

In this paper, we propose deep network steganography for the covert communication of DNN models.

Steganography of Steganographic Networks

1 code implementation28 Feb 2023 Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian

We propose to disguise a steganographic network (termed as the secret DNN model) into a stego DNN model which performs an ordinary machine learning task (termed as the stego task).

Exploring Depth Information for Face Manipulation Detection

no code implementations29 Dec 2022 Haoyue Wang, Meiling Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang

As one of the important face features, the face depth map, which has shown to be effective in other areas such as the face recognition or face detection, is unfortunately paid little attention to in literature for detecting the manipulated face images.

Face Detection Face Recognition

Joint Vehicular Localization and Reflective Mapping Based on Team Channel-SLAM

no code implementations30 Jan 2022 Xinghe Chu, Zhaoming Lu, David Gesbert, Luhan Wang, Xiangming Wen, Muqing Wu, Meiling Li

This approach exploits an initial (e. g. GPS-based) vehicle position information and allows subsequent tracking of vehicles by exploiting the shared nature of virtual transmitters associated to the reflecting surfaces.

Position

Cannot find the paper you are looking for? You can Submit a new open access paper.