Alert button
Picture for Chun-Shien Lu

Chun-Shien Lu

Alert button

Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network

Add code
Bookmark button
Alert button
Dec 13, 2023
Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, ZhiYong Zhang, Lu Sun, Isao Echizen

Figure 1 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 2 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 3 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 4 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Viaarxiv icon

Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics

Add code
Bookmark button
Alert button
Apr 07, 2021
Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu

Figure 1 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 2 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 3 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 4 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Viaarxiv icon

Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation

Add code
Bookmark button
Alert button
Nov 28, 2020
Ching-Chia Kao, Jhe-Bang Ko, Chun-Shien Lu

Figure 1 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 2 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 3 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 4 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Viaarxiv icon

QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing

Add code
Bookmark button
Alert button
Oct 22, 2020
Gang-Xuan Lin, Shih-Wei Hu, Chun-Shien Lu

Figure 1 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 2 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 3 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 4 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Viaarxiv icon

Fast Binary Embedding via Circulant Downsampled Matrix -- A Data-Independent Approach

Add code
Bookmark button
Alert button
Jan 24, 2016
Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei

Figure 1 for Fast Binary Embedding via Circulant Downsampled Matrix -- A Data-Independent Approach
Figure 2 for Fast Binary Embedding via Circulant Downsampled Matrix -- A Data-Independent Approach
Figure 3 for Fast Binary Embedding via Circulant Downsampled Matrix -- A Data-Independent Approach
Figure 4 for Fast Binary Embedding via Circulant Downsampled Matrix -- A Data-Independent Approach
Viaarxiv icon

Fast Template Matching by Subsampled Circulant Matrix

Add code
Bookmark button
Alert button
Sep 16, 2015
Sung-Hsien Hsieh, Chun-Shien Lu, and Soo-Chang Pei

Figure 1 for Fast Template Matching by Subsampled Circulant Matrix
Figure 2 for Fast Template Matching by Subsampled Circulant Matrix
Viaarxiv icon