Alert button
Picture for Huy H. Nguyen

Huy H. Nguyen

Alert button

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

Add code
Bookmark button
Alert button
Feb 13, 2024
AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

Figure 1 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 2 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 3 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 4 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Viaarxiv icon

Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis

Add code
Bookmark button
Alert button
Jan 16, 2024
Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen

Viaarxiv icon

Cross-Attention Watermarking of Large Language Models

Add code
Bookmark button
Alert button
Jan 12, 2024
Folco Bertini Baldassini, Huy H. Nguyen, Ching-Chung Chang, Isao Echizen

Viaarxiv icon

Surface Normal Estimation with Transformers

Add code
Bookmark button
Alert button
Jan 11, 2024
Barry Shichen Hu, Siyun Liang, Johannes Paetzold, Huy H. Nguyen, Isao Echizen, Jiapeng Tang

Viaarxiv icon

Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network

Add code
Bookmark button
Alert button
Dec 13, 2023
Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, ZhiYong Zhang, Lu Sun, Isao Echizen

Figure 1 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 2 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 3 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Figure 4 for Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network
Viaarxiv icon

How Close are Other Computer Vision Tasks to Deepfake Detection?

Add code
Bookmark button
Alert button
Oct 02, 2023
Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

Figure 1 for How Close are Other Computer Vision Tasks to Deepfake Detection?
Figure 2 for How Close are Other Computer Vision Tasks to Deepfake Detection?
Figure 3 for How Close are Other Computer Vision Tasks to Deepfake Detection?
Figure 4 for How Close are Other Computer Vision Tasks to Deepfake Detection?
Viaarxiv icon

Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection

Add code
Bookmark button
Alert button
Sep 27, 2023
Lukas Strack, Futa Waseda, Huy H. Nguyen, Yinqiang Zheng, Isao Echizen

Figure 1 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 2 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 3 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 4 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Viaarxiv icon

Face Forgery Detection Based on Facial Region Displacement Trajectory Series

Add code
Bookmark button
Alert button
Dec 07, 2022
YuYang Sun, ZhiYong Zhang, Isao Echizen, Huy H. Nguyen, ChangZhen Qiu, Lu Sun

Figure 1 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 2 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 3 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 4 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Viaarxiv icon

Analysis of Master Vein Attacks on Finger Vein Recognition Systems

Add code
Bookmark button
Alert button
Oct 18, 2022
Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen

Figure 1 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 2 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 3 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 4 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Viaarxiv icon

Rethinking Adversarial Examples for Location Privacy Protection

Add code
Bookmark button
Alert button
Jun 28, 2022
Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen

Figure 1 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 2 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 3 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 4 for Rethinking Adversarial Examples for Location Privacy Protection
Viaarxiv icon