Search Results for author: Run Wang

Found 8 papers, 1 papers with code

A Novel Verifiable Fingerprinting Scheme for Generative Adversarial Networks

no code implementations19 Jun 2021 Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang

Our scheme constructs a composite deep learning model from the target GAN and a classifier.

Countering Malicious DeepFakes: Survey, Battleground, and Horizon

1 code implementation27 Feb 2021 Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu

The creation and the manipulation of facial appearance via deep generative approaches, known as DeepFake, have achieved significant progress and promoted a wide range of benign and malicious applications.

DeepFake Detection Face Swapping

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

no code implementations13 Jun 2020 Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

At this moment, GAN-based image generation methods are still imperfect, whose upsampling design has limitations in leaving some certain artifact patterns in the synthesized image.

DeepFake Detection Face Swapping +2

FakeLocator: Robust Localization of GAN-Based Face Manipulations

no code implementations27 Jan 2020 Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Xiaofei Xie, Lei Ma, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

To the best of our knowledge, this is the very first attempt to solve the GAN-based fake localization problem with a gray-scale fakeness prediction map that preserves more information of fake regions.

Face Generation Semantic Segmentation

Amora: Black-box Adversarial Morphing Attack

no code implementations9 Dec 2019 Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu

In this paper, we investigate and introduce a new type of adversarial attack to evade FR systems by manipulating facial content, called \textbf{\underline{a}dversarial \underline{mor}phing \underline{a}ttack} (a. k. a.

Adversarial Attack Dictionary Learning +3

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces

no code implementations13 Sep 2019 Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu

In recent years, generative adversarial networks (GANs) and its variants have achieved unprecedented success in image synthesis.

Face Detection Face Recognition +2

Towards a Robust Deep Neural Network in Texts: A Survey

no code implementations12 Feb 2019 Wenqi Wang, Run Wang, Lina Wang, Zhibo Wang, Aoshuang Ye

Recently, studies have revealed adversarial examples in the text domain, which could effectively evade various DNN-based text analyzers and further bring the threats of the proliferation of disinformation.

General Classification Image Classification +1

Prediction of the Yield of Enzymatic Synthesis of Betulinic Acid Ester Using Artificial Neural Networks and Support Vector Machine

no code implementations12 Nov 2015 Run Wang, Qiaoli Mo, Qian Zhang, Fudi Chen, Dazuo Yang

To simplify the number of times of optimization in experimental works, here, we use artificial neural network (ANN) and support vector machine (SVM) models for the prediction of yields of 3\b{eta}-O-phthalic ester of betulinic acid synthesized by betulinic acid and phthalic anhydride using lipase as biocatalyst.

Cannot find the paper you are looking for? You can Submit a new open access paper.