
Exploring Adversarial Fake Images on Face Manifold
Images synthesized by powerful generative adversarial network (GAN) base...
read it

Distributed Thompson Sampling
We study a cooperative multiagent multiarmed bandits with M agents and...
read it

MUSTGAN: Multilevel Statistics Transfer for Selfdriven Person Image Generation
Poseguided person image generation usually involves using paired source...
read it

TLIO: Tight Learned Inertial Odometry
In this work we propose a tightlycoupled Extended Kalman Filter framewo...
read it

Accelerating Nonconvex Learning via Replica Exchange Langevin Diffusion
Langevin diffusion is a powerful method for nonconvex optimization, whic...
read it

Spectral Gap of Replica Exchange Langevin Diffusion on Mixture Distributions
Langevin diffusion (LD) is one of the main workhorses for sampling probl...
read it

Learning Poseinvariant 3D Object Reconstruction from Singleview Images
Learning to reconstruct 3D shapes using 2D images is an active research ...
read it

Temporal Sparse Adversarial Attack on Gait Recognition
Gait recognition has a broad application in social security due to its a...
read it

Replica Exchange for NonConvex Optimization
Gradient descent (GD) is known to converge quickly for convex objective ...
read it

A New Ensemble Method for Concessively Targeted Multimodel Attack
It is well known that deep learning models are vulnerable to adversarial...
read it

AdapNet: Adaptability Decomposing EncoderDecoder Network for Weakly Supervised Action Recognition and Localization
The point process is a solid framework to model sequential data, such as...
read it

Statistical Inference for Model Parameters in Stochastic Gradient Descent via Batch Means
Statistical inference of true model parameters based on stochastic gradi...
read it

Efficient Inference and Exploration for Reinforcement Learning
Despite an ever growing literature on reinforcement learning algorithms ...
read it

miniSAM: A Flexible Factor Graph Nonlinear Least Squares Optimization Framework
Many problems in computer vision and robotics can be phrased as nonline...
read it

On the generalization of GAN image forensics
Recently the GAN generated face images are more and more realistic with ...
read it

Learning to Align Images using Weak Geometric Supervision
Image alignment tasks require accurate pixel correspondences, which are ...
read it

STEAP: simultaneous trajectory estimation and planning
We present a unified probabilistic framework for simultaneous trajectory...
read it

Deep Steganalysis: EndtoEnd Learning with Supervisory Information beyond Class Labels
Recently, deep learning has shown its power in steganalysis. However, th...
read it

DeepFirearm: Learning Discriminative Feature Representation for Finegrained Firearm Retrieval
There are great demands for automatically regulating inappropriate appea...
read it

The Cut and Dominating Set Problem in A Steganographer Network
A steganographer network corresponds to a graphic structure that the inv...
read it

Reversible Embedding to Covers Full of Boundaries
In reversible data embedding, to avoid overflow and underflow problem, b...
read it

Ensemble Reversible Data Hiding
The conventional reversible data hiding (RDH) algorithms often consider ...
read it

A Graphtheoretic Model to Steganography on Social Networks
Steganography aims to conceal the very fact that the communication takes...
read it

SSGAN: Secure Steganography Based on Generative Adversarial Networks
In this paper, a novel strategy of Secure Steganograpy based on Generati...
read it

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
Previous work has shown that feature maps of deep convolutional neural n...
read it

4D Crop Monitoring: SpatioTemporal Reconstruction for Agriculture
Autonomous crop monitoring at high spatial and temporal resolution is a ...
read it
Jing Dong
is this you? claim profile