人工智能安全研究实验室·上海交通大学
人工智能安全研究实验室·上海交通大学
成员
事件
成果
科研指南
联系我们
浅色
深色
自动
journal
Lip Feature Disentanglement for Visual Speaker Authentication in Natural Scenes
Recent studies have shown that lip shape and movement can be used as an effective biometric feature for speaker authentication. By …
何怡
,
杨磊
,
王士林
Fine-Grained Lip Image Segmentation using Fuzzy Logic and Graph Reasoning
Fine-grained lip image segmentation plays a critical role in downstream tasks such as automatic lipreading, as it enables the accurate …
杨磊
,
王士林
PDF
Linear Functionality Equivalence Attack against Deep Neural Network Watermarks and a Defense Method by Neuron Mapping
As an ownership verification technique for deep neural networks, the white-box neural network watermark is being challenged by the …
李方圻
,
王士林
PDF
Exploiting Complementary Dynamic Incoherence for DeepFake Video Detection
Recently, manipulated videos based on DeepFake technology have spread widely on social media, causing concerns about the authenticity …
王晗亦
,
刘子涵
,
王士林
PDF
Online Intrusion Detection for IoT Systems with Full Bayesian Possibilistic Clustering and Ensembled Fuzzy Classifiers
The pervasive deployment of the internet of things (IoT) has significantly facilitated manufacturing and living. The diversity and …
李方圻
,
王士林
PDF
Preventing DeepFake Attacks on Speaker Authentication by Dynamic Lip Movement Analysis
Recent research has demonstrated that lip-based speaker authentication systems can not only achieve good authen- tication performance …
杨晨照
,
马骏
,
王士林
Lip image segmentation based on a fuzzy convolutional neural network
Research has shown that the human lip and its movements are a rich source of information related to speech content and speaker’s …
管成
,
王士林
A global and local context integration DCNN for adult image classification
With the wide availability of the Internet and the proliferation of pornographic images online, adult im- age detection and filtering …
程峰
,
王士林
,
王西子
DOI
Visual speaker authentication with random prompt texts by a dual-task CNN framework
Good authentication performance and liveness detection are two key requirements in many authentica- tion systems. To avoid replay …
程峰
,
王士林
DOI
Cite
×