Search

Your search keyword '"Yan, Diqun"' showing total 205 results

Search Constraints

Start Over You searched for: Author "Yan, Diqun" Remove constraint Author: "Yan, Diqun" Publication Type Periodicals Remove constraint Publication Type: Periodicals
205 results on '"Yan, Diqun"'

Search Results

1. Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation

2. Adversarial defense based on distribution transfer

3. Facial Data Minimization: Shallow Model as Your Privacy Filter

4. EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events

5. Breaking Speaker Recognition with PaddingBack

6. Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition

7. Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion

9. Semi-Supervised Semantic Segmentation with Cross Teacher Training

10. Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

11. Adversarial Privacy Protection on Speech Enhancement

12. Transferability of Adversarial Attacks on Synthetic Speech Detection

13. Residual-Guided Non-Intrusive Speech Quality Assessment

14. Adversarial Attacks on Machinery Fault Diagnosis

15. Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise

18. Identification of fake stereo audio

19. Physical Anti-copying Semi-robust Random Watermarking for QR Code

23. Identification of Synthetic Spoofed Speech with Deep Capsule Network

27. Efficient Generation of Speech Adversarial Examples with Generative Model

33. Detection of Operation Type and Order for Digital Speech

35. AAC Audio Compression Detection Based on QMDCT Coefficient

36. A Replay Voice Detection Algorithm Based on Multi-feature Fusion

42. Source Cell-Phone Identification Using Spectral Features of Device Self-noise

45. Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors

46. Audio Tampering Detection Based on Quantization Artifacts

47. Detecting Fake-Quality WAV Audio Based on Phase Differences

48. BadSQA: Stealthy Backdoor Attacks Using Presence Events as Triggers in Non-Intrusive Speech Quality Assessment

50. A Huffman Table Index Based Approach to Detect Double MP3 Compression

Catalog

Books, media, physical & digital resources