Follow
Isao Echizen
Isao Echizen
National Institute of Informatics / University of Tokyo / SOKENDAI
Verified email at nii.ac.jp - Homepage
Title
Cited by
Cited by
Year
Mesonet: a compact facial video forgery detection network
D Afchar, V Nozick, J Yamagishi, I Echizen
2018 IEEE international workshop on information forensics and security (WIFS …, 2018
12802018
Capsule-forensics: Using capsule networks to detect forged images and videos
HH Nguyen, J Yamagishi, I Echizen
ICASSP 2019-2019 IEEE international conference on acoustics, speech and …, 2019
5712019
Multi-task learning for detecting and segmenting manipulated facial images and videos
HH Nguyen, F Fang, J Yamagishi, I Echizen
2019 IEEE 10th international conference on biometrics theory, applications …, 2019
4532019
Distinguishing computer graphics from natural images using convolution neural networks
N Rahmouni, V Nozick, J Yamagishi, I Echizen
2017 IEEE workshop on information forensics and security (WIFS), 1-6, 2017
3182017
Aspects of privacy for electronic health records
S Haas, S Wohlgemuth, I Echizen, N Sonehara, G Müller
International journal of medical informatics 80 (2), e26-e31, 2011
2532011
Use of a capsule network to detect fake images and videos
HH Nguyen, J Yamagishi, I Echizen
arXiv preprint arXiv:1910.12467, 2019
1952019
High-quality nonparallel voice conversion based on cycle-consistent adversarial network
F Fang, J Yamagishi, I Echizen, J Lorenzo-Trueba
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
1592018
Speaker anonymization using x-vector and neural waveform models
F Fang, X Wang, J Yamagishi, I Echizen, M Todisco, N Evans, ...
arXiv preprint arXiv:1905.13561, 2019
1292019
Generating sentiment-preserving fake online reviews using neural language models and their human-and machine-based detection
DI Adelani, H Mai, F Fang, HH Nguyen, J Yamagishi, I Echizen
Advanced information networking and applications: Proceedings of the 34th …, 2020
1282020
Method of authenticating digital-watermark pictures
K Nakano, J Taguchi, H Yoshiura, I Echizen, Y Kurosu
US Patent 6,418,232, 2002
1002002
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
S Shiota, F Villavicencio, J Yamagishi, N Ono, I Echizen, T Matsui
Sixteenth annual conference of the international speech communication …, 2015
992015
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data
J Lorenzo-Trueba, F Fang, X Wang, I Echizen, J Yamagishi, T Kinnunen
arXiv preprint arXiv:1803.00860, 2018
832018
Network system enabling transmission control
S Itoh, K Miyazaki, I Echizen
US Patent 7,047,407, 2006
652006
Method of extracting digital watermark information and method of judging bit value of digital watermark information
I Echizen, H Yoshiura, K Anzai, Y Kurosu
US Patent 6,563,935, 2003
652003
Modular convolutional neural network for discriminating between computer-generated images and photographic images
HH Nguyen, TND Tieu, HQ Nguyen-Son, V Nozick, J Yamagishi, ...
Proceedings of the 13th international conference on availability …, 2018
632018
Digital watermark data embedding method, and digital watermark data embeddability analyzing method
I Echizen, H Yoshiura, R Sasaki, S Harano, S Eikawa
US Patent 7,047,412, 2006
512006
Openforensics: Large-scale challenging dataset for multi-face forgery detection and segmentation in-the-wild
TN Le, HH Nguyen, J Yamagishi, I Echizen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
502021
Robust message hiding for QR code
TV Bui, NK Vu, TTP Nguyen, I Echizen, TD Nguyen
2014 Tenth International Conference on Intelligent Information Hiding and …, 2014
482014
Privacy visor: Method for preventing face image detection by using differences in human and device sensitivity
T Yamada, S Gohshi, I Echizen
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International …, 2013
482013
Isolation in cloud computing and privacy-enhancing technologies: suitability of privacy-enhancing technologies for separating data usage in business processes
N Sonehara, I Echizen, S Wohlgemuth
Business & information systems engineering 3, 155-162, 2011
442011
The system can't perform the operation now. Try again later.
Articles 1–20