Search Results for author: Wenbo Zhou

Found 24 papers, 13 papers with code

GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models

1 code implementation22 Aug 2024 Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu

By offering a realistic assessment and tailored reduction of gender biases, we hope that our GenderCARE can represent a significant step towards achieving fairness and equity in LLMs.

counterfactual Data Augmentation +2

Compromising Embodied Agents with Contextual Backdoor Attacks

no code implementations6 Aug 2024 Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, DaCheng Tao

To enable context-dependent behaviors in downstream agents, we implement a dual-modality activation strategy that controls both the generation and execution of program defects through textual and visual triggers.

Autonomous Driving Robot Manipulation +1

UniForensics: Face Forgery Detection via General Facial Representation

no code implementations26 Jul 2024 Ziyuan Fang, Hanqing Zhao, Tianyi Wei, Wenbo Zhou, Ming Wan, Zhanyi Wang, Weiming Zhang, Nenghai Yu

On the basis of the representation learned in the first stage, the second stage involves fine-tuning on face forgery detection dataset to build a deepfake detector.

Contrastive Learning DeepFake Detection +2

OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

no code implementations23 Jul 2024 Ke Sun, Jian Cao, Qi Wang, Linrui Tian, Xindi Zhang, Lian Zhuo, Bang Zhang, Liefeng Bo, Wenbo Zhou, Weiming Zhang, Daiheng Gao

Specifically, these models struggle to maintain a balance between control and consistency when generating images for virtual clothing trials.

Virtual Try-on

Rank-based No-reference Quality Assessment for Face Swapping

no code implementations4 Jun 2024 Xinghui Zhou, Wenbo Zhou, Tianyi Wei, Shen Chen, Taiping Yao, Shouhong Ding, Weiming Zhang, Nenghai Yu

Extensive experiments confirm the superiority of our method over existing general no-reference image quality assessment metrics and the latest metric of facial image quality assessment, making it well suited for evaluating face swapping images in real-world scenarios.

Face Swapping NR-IQA

Control Risk for Potential Misuse of Artificial Intelligence in Science

1 code implementation11 Dec 2023 Jiyan He, Weitao Feng, Yaosen Min, Jingwei Yi, Kunsheng Tang, Shuai Li, Jie Zhang, Kejiang Chen, Wenbo Zhou, Xing Xie, Weiming Zhang, Nenghai Yu, Shuxin Zheng

In this study, we aim to raise awareness of the dangers of AI misuse in science, and call for responsible AI development and use in this domain.

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World

no code implementations24 Oct 2023 Zhiling Zhang, Jie Zhang, Kui Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu

To address these concerns, researchers are actively exploring the concept of ``unlearnable examples", by adding imperceptible perturbation to data in the model training stage, which aims to prevent the model from learning discriminate features of the target face.

Face Recognition

HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending

1 code implementation ICCV 2023 Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Gang Hua, Nenghai Yu

Even though they can enable very fine-grained local control, such interaction modes are inefficient for the editing conditions that can be easily specified by language descriptions or reference images.

Attribute

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection

1 code implementation19 Feb 2023 Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, DaCheng Tao

In this paper, we take the first step toward the study of adversarial attacks targeted at X-ray prohibited item detection, and reveal the serious threats posed by such attacks in this safety-critical scenario.

Adversarial Attack

X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion

2 code implementations7 Dec 2022 Hanqing Zhao, Dianmo Sheng, Jianmin Bao, Dongdong Chen, Dong Chen, Fang Wen, Lu Yuan, Ce Liu, Wenbo Zhou, Qi Chu, Weiming Zhang, Nenghai Yu

We demonstrate for the first time that using a text2image model to generate images or zero-shot recognition model to filter noisily crawled images for different object categories is a feasible way to make Copy-Paste truly scalable.

Data Augmentation Instance Segmentation +5

Learning Convolutional Neural Networks in the Frequency Domain

2 code implementations14 Apr 2022 Hengyue Pan, Yixin Chen, Xin Niu, Wenbo Zhou, Dongsheng Li

The most important motivation of this research is that we can use the straightforward element-wise multiplication operation to replace the image convolution in the frequency domain based on the Cross-Correlation Theorem, which obviously reduces the computation complexity.

Self-supervised Transformer for Deepfake Detection

no code implementations2 Mar 2022 Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Weiming Zhang, Nenghai Yu

After pre-training with our method, the model will then be partially fine-tuned for deepfake detection task.

Contrastive Learning DeepFake Detection +3

Initiative Defense against Facial Manipulation

1 code implementation19 Dec 2021 Qidong Huang, Jie Zhang, Wenbo Zhou, WeimingZhang, Nenghai Yu

To this end, we first imitate the target manipulation model with a surrogate model, and then devise a poison perturbation generator to obtain the desired venom.

Attribute Face Reenactment

E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion

2 code implementations15 Apr 2021 Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Lu Yuan, Gang Hua, Nenghai Yu

This paper studies the problem of StyleGAN inversion, which plays an essential role in enabling the pretrained StyleGAN to be used for real image editing tasks.

Face Parsing

Multi-attentional Deepfake Detection

1 code implementation CVPR 2021 Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, Nenghai Yu

Most of them model deepfake detection as a vanilla binary classification problem, i. e, first use a backbone network to extract a global feature and then feed it into a binary classifier (real/fake).

Binary Classification Data Augmentation +2

Regularly Updated Deterministic Policy Gradient Algorithm

no code implementations1 Jul 2020 Shuai Han, Wenbo Zhou, Shuai Lü, Jiayu Yu

Deep Deterministic Policy Gradient (DDPG) algorithm is one of the most well-known reinforcement learning methods.

Q-Learning

Model Watermarking for Image Processing Networks

1 code implementation25 Feb 2020 Jie Zhang, Dong-Dong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, HAO CUI, Nenghai Yu

In this way, when the attacker trains one surrogate model by using the input-output pairs of the target model, the hidden watermark will be learned and extracted afterward.

Recruitment-imitation Mechanism for Evolutionary Reinforcement Learning

no code implementations13 Dec 2019 Shuai Lü, Shuai Han, Wenbo Zhou, Junwei Zhang

In this paper, we propose Recruitment-imitation Mechanism (RIM) for evolutionary reinforcement learning, a scalable framework that combines advantages of the three methods mentioned above.

Continuous Control Efficient Exploration +4

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense

1 code implementation ICCV 2019 Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu

We propose a Denoiser and UPsampler Network (DUP-Net) structure as defenses for 3D adversarial point cloud classification, where the two modules reconstruct surface smoothness by dropping or adding points.

Denoising Point Cloud Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.