Detect and locate: Exposing face manipulation by semantic-and noise-level telltales C Kong, B Chen, H Li, S Wang, A Rocha, S Kwong IEEE Transactions on Information Forensics and Security 17, 1741-1756, 2022 | 41 | 2022 |
Rethinking Attention-Model Explainability through Faithfulness Violation Test Y Liu, H Li, Y Guo, C Kong, J Li, S Wang International Conference on Machine Learning, 2022 | 32 | 2022 |
Appearance matters, so does audio: Revealing the hidden face via cross-modality transfer C Kong, B Chen, W Yang, H Li, P Chen, S Wang IEEE Transactions on Circuits and Systems for Video Technology 32 (1), 423-436, 2021 | 29 | 2021 |
Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones C Kong, K Zheng, S Wang, A Rocha, H Li IEEE Transactions on Information Forensics and Security 17, 3238-3253, 2022 | 18 | 2022 |
Digital and physical face attacks: Reviewing and one step further C Kong, S Wang, H Li APSIPA Transactions on Signal and Information Processing 12 (1), 2022 | 15 | 2022 |
No-Reference Image Quality Assessment by Hallucinating Pristine Features B Chen, L Zhu, C Kong, H Zhu, S Wang, Z Li IEEE Transactions on Image Processing, 2022 | 12 | 2022 |
Faster super-resolution imaging with auto-correlation two-step deconvolution W Zhao, J Liu, C Kong, Y Zhao, C Guo, C Liu, X Ding, X Ding, J Tan, H Li arXiv preprint arXiv:1809.07410, 2018 | 12 | 2018 |
Beyond the prior forgery knowledge: Mining critical clues for general face forgery detection A Luo, C Kong, J Huang, Y Hu, X Kang, AC Kot IEEE Transactions on Information Forensics and Security 19, 1168-1182, 2023 | 10 | 2023 |
M FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System C Kong, K Zheng, Y Liu, S Wang, A Rocha, H Li IEEE Transactions on Dependable and Secure Computing, 2024 | 7 | 2024 |
Enhancing general face forgery detection via vision transformer with low-rank adaptation C Kong, H Li, S Wang 2023 IEEE 6th International Conference on Multimedia Information Processing …, 2023 | 6 | 2023 |
Accurate aberration correction in confocal microscopy based on modal sensorless method J Liu, W Zhao, C Liu, C Kong, Y Zhao, X Ding, J Tan Review of Scientific Instruments 90 (5), 2019 | 4 | 2019 |
Two-branch multi-scale deep neural network for generalized document recapture attack detection J Li, C Kong, S Wang, H Li ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 3 | 2023 |
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens R Cai, Z Yu, C Kong, H Li, C Chen, Y Hu, A Kot arXiv preprint arXiv:2309.04038, 2023 | 2 | 2023 |
Pixel-inconsistency modeling for image manipulation localization C Kong, A Luo, S Wang, H Li, A Rocha, AC Kot arXiv preprint arXiv:2310.00234, 2023 | 1 | 2023 |
Forgery-aware adaptive vision transformer for face forgery detection A Luo, R Cai, C Kong, X Kang, J Huang, AC Kot arXiv preprint arXiv:2309.11092, 2023 | 1 | 2023 |
MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection C Kong, A Luo, S Xia, Y Yu, H Li, AC Kot arXiv preprint arXiv:2404.08452, 2024 | | 2024 |
Echo-FAS: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones K Chenqi, LI Haoliang, W Shiqi, K ZHENG | | 2022 |
一種圖像真僞識別模型訓練方法, 應用方法和裝置 C Baoliang, K Chenqi, LI Haoliang, W Shiqi | | 2022 |
Artifact-free, penetration-adjustable elliptical-mirror-based TIRF microscopy J Liu, C Kong, Q Li, W Zhao, M Li, S Gao, C Liu, J Tan Optics Express 26 (20), 26065-26079, 2018 | | 2018 |