Alert button
Picture for Jian Weng

Jian Weng

Alert button

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

Feb 23, 2024
Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao

Viaarxiv icon

Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

Sep 20, 2023
Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han

Figure 1 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 2 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 3 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 4 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Viaarxiv icon

A Survey of Secure Computation Using Trusted Execution Environments

Feb 23, 2023
Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng

Figure 1 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 2 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 3 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 4 for A Survey of Secure Computation Using Trusted Execution Environments
Viaarxiv icon

Enhancing Deep Knowledge Tracing with Auxiliary Tasks

Feb 14, 2023
Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng

Figure 1 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 2 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 3 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 4 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Viaarxiv icon

Learning Second Order Local Anomaly for General Face Forgery Detection

Sep 30, 2022
Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng

Figure 1 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 2 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 3 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 4 for Learning Second Order Local Anomaly for General Face Forgery Detection
Viaarxiv icon

Towards Target Sequential Rules

Jun 09, 2022
Wensheng Gan, Gengsen Huang, Jian Weng, Tianlong Gu, Philip S. Yu

Figure 1 for Towards Target Sequential Rules
Figure 2 for Towards Target Sequential Rules
Figure 3 for Towards Target Sequential Rules
Figure 4 for Towards Target Sequential Rules
Viaarxiv icon

Deniable Steganography

May 25, 2022
Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng

Figure 1 for Deniable Steganography
Figure 2 for Deniable Steganography
Figure 3 for Deniable Steganography
Figure 4 for Deniable Steganography
Viaarxiv icon

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network

Mar 10, 2022
Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu

Figure 1 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 2 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 3 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 4 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Viaarxiv icon

A Robust Document Image Watermarking Scheme using Deep Neural Network

Feb 26, 2022
Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng

Figure 1 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 2 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 3 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 4 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Viaarxiv icon

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing

Jan 23, 2022
Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu

Figure 1 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 2 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 3 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 4 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Viaarxiv icon