no code implementations • 12 Apr 2024 • Chenqi Kong, Anwei Luo, Song Xia, Yi Yu, Haoliang Li, Alex C. Kot
Moreover, MoE-FFD leverages the expressivity of transformers and local priors of CNNs to simultaneously extract global and local forgery clues.
no code implementations • 30 Sep 2023 • Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, Alex C. Kot
Digital image forensics plays a crucial role in image authentication and manipulation localization.
no code implementations • 20 Sep 2023 • Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot
To circumvent these issues, we propose a novel Forgery-aware Adaptive Vision Transformer (FA-ViT).
2 code implementations • 7 Sep 2023 • Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng chen, Yongjian Hu, Alex Kot
Face Anti-Spoofing (FAS) aims to detect malicious attempts to invade a face recognition system by presenting spoofed faces.
no code implementations • 24 Apr 2023 • Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot
Face forgery detection is essential in combating malicious digital face attacks.
no code implementations • 2 Mar 2023 • Chenqi Kong, Haoliang Li, Shiqi Wang
Nowadays, forgery faces pose pressing security concerns over fake news, fraud, impersonation, etc.
1 code implementation • 30 Jan 2023 • Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li
Face presentation attacks (FPA), also known as face spoofing, have brought increasing concerns to the public through various malicious applications, such as financial fraud and privacy leakage.
1 code implementation • 30 Nov 2022 • Jiaxing Li, Chenqi Kong, Shiqi Wang, Haoliang Li
The image recapture attack is an effective image manipulation method to erase certain forensic traces, and when targeting on personal document images, it poses a great threat to the security of e-commerce and other web applications.
no code implementations • 29 Sep 2022 • Chenqi Kong, Shiqi Wang, Haoliang Li
With the rapid progress over the past five years, face authentication has become the most pervasive biometric recognition method.
1 code implementation • 28 Jan 2022 • Yibing Liu, Haoliang Li, Yangyang Guo, Chenqi Kong, Jing Li, Shiqi Wang
Attention mechanisms are dominating the explainability of deep models.
1 code implementation • 9 Aug 2021 • Baoliang Chen, Lingyu Zhu, Chenqi Kong, Hanwei Zhu, Shiqi Wang, Zhu Li
In this paper, we propose a no-reference (NR) image quality assessment (IQA) method via feature level pseudo-reference (PR) hallucination.
1 code implementation • 13 Jul 2021 • Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong
The technological advancements of deep learning have enabled sophisticated face manipulation schemes, raising severe trust issues and security concerns in modern society.
2 code implementations • 19 Sep 2018 • Weisong Zhao, Jian Liu, Chenqi Kong, Yixuan Zhao, Changliang Guo, Chen-Guang Liu, Xiangyan Ding, Xumin Ding, Jiubin Tan, Haoyu Li
Despite super-resolution fluorescence blinking microscopes break the diffraction limit, the intense phototoxic illumination and long-term image sequences thus far still pose to major challenges in visualizing live-organisms.
Optics