Search Results for author: Cunjian Chen

Found 16 papers, 8 papers with code

REHRSeg: Unleashing the Power of Self-Supervised Super-Resolution for Resource-Efficient 3D MRI Segmentation

no code implementations14 Oct 2024 Zhiyun Song, Yinjie Zhao, Xiaomin Li, Manman Fei, Xiangyu Zhao, Mengjun Liu, Cunjian Chen, Chung-Hsing Yeh, Qian Wang, Guoyan Zheng, Songtao Ai, Lichi Zhang

High-resolution (HR) 3D magnetic resonance imaging (MRI) can provide detailed anatomical structural information, enabling precise segmentation of regions of interest for various medical image analysis tasks.

Knowledge Distillation Medical Image Analysis +3

A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse

no code implementations20 Aug 2024 Zhongliang Guo, Lei Fang, Jingyu Lin, Yifei Qian, Shuai Zhao, Zeyu Wang, Junhao Dong, Cunjian Chen, Ognjen Arandjelović, Chun Pong Lau

Recent advancements in generative AI, particularly Latent Diffusion Models (LDMs), have revolutionized image synthesis and manipulation.

Image Generation

A Multi-task Adversarial Attack Against Face Authentication

1 code implementation15 Aug 2024 Hanrui Wang, Shuo Wang, Cunjian Chen, Massimo Tistarelli, Zhe Jin

In this paper, we propose a multi-task adversarial attack algorithm called MTADV that are adaptable for multiple users or systems.

Adversarial Attack Management

Cinemo: Consistent and Controllable Image Animation with Motion Diffusion Models

1 code implementation22 Jul 2024 Xin Ma, Yaohui Wang, Gengyun Jia, Xinyuan Chen, Yuan-Fang Li, Cunjian Chen, Yu Qiao

Diffusion models have achieved great progress in image animation due to powerful generative capabilities.

Image Animation

MTS-Net: Dual-Enhanced Positional Multi-Head Self-Attention for 3D CT Diagnosis of May-Thurner Syndrome

1 code implementation7 Jun 2024 Yixin Huang, Yiqi Jin, Ke Tao, Kaijian Xia, Jianfeng Gu, Lei Yu, Lan Du, Cunjian Chen

In this paper, we present a 3D-based deep learning approach called MTS-Net for diagnosing May-Thurner Syndrome using CT scans.

Skeleton-OOD: An End-to-End Skeleton-Based Model for Robust Out-of-Distribution Human Action Detection

2 code implementations31 May 2024 Jing Xu, Anqi Zhu, Jingyu Lin, Qiuhong Ke, Cunjian Chen

To address these challenges, we propose a novel end-to-end skeleton-based model called Skeleton-OOD, which is committed to improving the effectiveness of OOD tasks while ensuring the accuracy of ID recognition.

Action Recognition Skeleton Based Action Recognition +1

Iris Presentation Attack: Assessing the Impact of Combining Vanadium Dioxide Films with Artificial Eyes

no code implementations21 Nov 2023 Darshika Jauhari, Renu Sharma, Cunjian Chen, Nelson Sepulveda, Arun Ross

We observe that the addition of VO2 films on the surface of artificial eyes can cause the PA detection methods to misclassify them as bonafide eyes in some cases.

Iris Recognition

LAVIE: High-Quality Video Generation with Cascaded Latent Diffusion Models

2 code implementations26 Sep 2023 Yaohui Wang, Xinyuan Chen, Xin Ma, Shangchen Zhou, Ziqi Huang, Yi Wang, Ceyuan Yang, Yinan He, Jiashuo Yu, Peiqing Yang, Yuwei Guo, Tianxing Wu, Chenyang Si, Yuming Jiang, Cunjian Chen, Chen Change Loy, Bo Dai, Dahua Lin, Yu Qiao, Ziwei Liu

To this end, we propose LaVie, an integrated video generation framework that operates on cascaded video latent diffusion models, comprising a base T2V model, a temporal interpolation model, and a video super-resolution model.

Text-to-Video Generation Video Generation +1

Beyond the Visible: A Survey on Cross-spectral Face Recognition

no code implementations12 Jan 2022 David Anghelone, Cunjian Chen, Arun Ross, Antitza Dantcheva

Secondly, we discuss the appropriate spectral bands for face recognition and discuss recent CFR methods, placing emphasis on deep neural networks.

Face Recognition

Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition

1 code implementation11 Jan 2022 Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, Massimo Tistarell

This technique applies to both white-box and gray-box attacks against authentication systems that determine genuine or imposter users using the dissimilarity score.

Adversarial Attack Face Recognition

Attention-Guided Network for Iris Presentation Attack Detection

no code implementations23 Oct 2020 Cunjian Chen, Arun Ross

Two types of attention modules are independently appended on top of the last convolutional layer of the backbone network.

Position

Some Research Problems in Biometrics: The Future Beckons

no code implementations12 May 2019 Arun Ross, Sudipta Banerjee, Cunjian Chen, Anurag Chowdhury, Vahid Mirjalili, Renu Sharma, Thomas Swearingen, Shivangi Yadav

The need for reliably determining the identity of a person is critical in a number of different domains ranging from personal smartphones to border security; from autonomous vehicles to e-voting; from tracking child vaccinations to preventing human trafficking; from crime scene investigation to personalization of customer service.

Autonomous Vehicles

Matching Thermal to Visible Face Images Using a Semantic-Guided Generative Adversarial Network

no code implementations3 Mar 2019 Cunjian Chen, Arun Ross

Designing face recognition systems that are capable of matching face images obtained in the thermal spectrum with those obtained in the visible spectrum is a challenging problem.

Face Generation Face Parsing +2

Cannot find the paper you are looking for? You can Submit a new open access paper.