Search Results for author: Rui Shao

Found 16 papers, 11 papers with code

Enhancing Emotional Generation Capability of Large Language Models via Emotional Chain-of-Thought

no code implementations12 Jan 2024 Zaijing Li, Gongwei Chen, Rui Shao, Dongmei Jiang, Liqiang Nie

In this paper, we propose the Emotional Chain-of-Thought (ECoT), a plug-and-play prompting method that enhances the performance of LLMs on various emotional generation tasks by aligning with human emotional intelligence guidelines.

Emotional Intelligence Emotion Recognition +1

Robust Sequential DeepFake Detection

1 code implementation26 Sep 2023 Rui Shao, Tianxing Wu, Ziwei Liu

However, existing methods only focus on detecting one-step facial manipulation.

DeepFake Detection Face Swapping +1

Detecting and Grounding Multi-Modal Media Manipulation and Beyond

1 code implementation25 Sep 2023 Rui Shao, Tianxing Wu, Jianlong Wu, Liqiang Nie, Ziwei Liu

HAMMER performs 1) manipulation-aware contrastive learning between two uni-modal encoders as shallow manipulation reasoning, and 2) modality-aware cross-attention by multi-modal aggregator as deep manipulation reasoning.

Binary Classification Contrastive Learning +4

DeepFake-Adapter: Dual-Level Adapter for DeepFake Detection

1 code implementation1 Jun 2023 Rui Shao, Tianxing Wu, Liqiang Nie, Ziwei Liu

Unlike existing deepfake detection methods merely focusing on low-level forgery patterns, the forgery detection process of our model can be regularized by generalizable high-level semantics from a pre-trained ViT and adapted by global and local low-level forgeries of deepfake data.

DeepFake Detection Face Swapping

Detecting and Grounding Multi-Modal Media Manipulation

1 code implementation CVPR 2023 Rui Shao, Tianxing Wu, Ziwei Liu

In this paper, we highlight a new research problem for multi-modal fake media, namely Detecting and Grounding Multi-Modal Media Manipulation (DGM^4).

Binary Classification Contrastive Learning +4

Mixup for Test-Time Training

no code implementations4 Oct 2022 Bochao Zhang, Rui Shao, Jingda Du, PC Yuen

Firstly, it will lead to overfitting to the test-time procedure thus hurt the performance on the main task.

Detecting and Recovering Sequential DeepFake Manipulation

1 code implementation5 Jul 2022 Rui Shao, Tianxing Wu, Ziwei Liu

Moreover, we build a comprehensive benchmark and set up rigorous evaluation protocols and metrics for this new research problem.

DeepFake Detection Face Swapping +2

Open-set Adversarial Defense with Clean-Adversarial Mutual Learning

1 code implementation12 Feb 2022 Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

This paper proposes an Open-Set Defense Network with Clean-Adversarial Mutual Learning (OSDN-CAML) as a solution to the OSAD problem.

Adversarial Defense Denoising +2

Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation

no code implementations25 Oct 2021 Rui Shao, Bochao Zhang, Pong C. Yuen, Vishal M. Patel

The generalization ability of face presentation attack detection models to unseen attacks has become a key issue for real-world deployment, which can be improved when models are trained with face images from different input distributions and different types of spoof attacks.

Face Presentation Attack Detection Face Recognition +2

Federated Generalized Face Presentation Attack Detection

no code implementations14 Apr 2021 Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

A face presentation attack detection model with good generalization can be obtained when it is trained with face images from different input distributions and different types of spoof attacks.

Disentanglement Face Presentation Attack Detection +2

Open-set Adversarial Defense

1 code implementation ECCV 2020 Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

In this paper, we show that open-set recognition systems are vulnerable to adversarial attacks.

Adversarial Defense Denoising +1

Federated Face Presentation Attack Detection

no code implementations29 May 2020 Rui Shao, Pramuditha Perera, Pong C. Yuen, Vishal M. Patel

A face presentation attack detection model with good generalization can be obtained when it is trained with face images from different input distributions and different types of spoof attacks.

Face Anti-Spoofing Face Presentation Attack Detection +2

Regularized Fine-grained Meta Face Anti-spoofing

1 code implementation25 Nov 2019 Rui Shao, Xiangyuan Lan, Pong C. Yuen

Besides, to further enhance the generalization ability of our model, the proposed framework adopts a fine-grained learning strategy that simultaneously conducts meta-learning in a variety of domain shift scenarios in each iteration.

Domain Generalization Face Anti-Spoofing +2

Cannot find the paper you are looking for? You can Submit a new open access paper.