Alert button
Picture for Zhihua Xia

Zhihua Xia

Alert button

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

Add code
Bookmark button
Alert button
Feb 23, 2024
Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao

Viaarxiv icon

Robust Retraining-free GAN Fingerprinting via Personalized Normalization

Add code
Bookmark button
Alert button
Nov 09, 2023
Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

Viaarxiv icon

Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs

Add code
Bookmark button
Alert button
Oct 25, 2023
Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

Viaarxiv icon

CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts

Add code
Bookmark button
Alert button
Apr 24, 2023
Peipeng Yu, Jiahan Chen, Xuan Feng, Zhihua Xia

Figure 1 for CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts
Figure 2 for CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts
Figure 3 for CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts
Figure 4 for CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts
Viaarxiv icon

Learning to mask: Towards generalized face forgery detection

Add code
Bookmark button
Alert button
Dec 29, 2022
Jianwei Fei, Yunshu Dai, Huaming Wang, Zhihua Xia

Figure 1 for Learning to mask: Towards generalized face forgery detection
Figure 2 for Learning to mask: Towards generalized face forgery detection
Figure 3 for Learning to mask: Towards generalized face forgery detection
Figure 4 for Learning to mask: Towards generalized face forgery detection
Viaarxiv icon

General GAN-generated image detection by data augmentation in fingerprint domain

Add code
Bookmark button
Alert button
Dec 27, 2022
Huaming Wang, Jianwei Fei, Yunshu Dai, Lingyun Leng, Zhihua Xia

Figure 1 for General GAN-generated image detection by data augmentation in fingerprint domain
Figure 2 for General GAN-generated image detection by data augmentation in fingerprint domain
Figure 3 for General GAN-generated image detection by data augmentation in fingerprint domain
Figure 4 for General GAN-generated image detection by data augmentation in fingerprint domain
Viaarxiv icon

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring

Add code
Bookmark button
Alert button
Nov 14, 2022
Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Zhihua Xia, Gerald Schaefer, Hui Fang

Figure 1 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 2 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 3 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Figure 4 for Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Viaarxiv icon

Learning Second Order Local Anomaly for General Face Forgery Detection

Add code
Bookmark button
Alert button
Sep 30, 2022
Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng

Figure 1 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 2 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 3 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 4 for Learning Second Order Local Anomaly for General Face Forgery Detection
Viaarxiv icon

Supervised GAN Watermarking for Intellectual Property Protection

Add code
Bookmark button
Alert button
Sep 07, 2022
Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni

Figure 1 for Supervised GAN Watermarking for Intellectual Property Protection
Figure 2 for Supervised GAN Watermarking for Intellectual Property Protection
Figure 3 for Supervised GAN Watermarking for Intellectual Property Protection
Figure 4 for Supervised GAN Watermarking for Intellectual Property Protection
Viaarxiv icon

Deniable Steganography

Add code
Bookmark button
Alert button
May 25, 2022
Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng

Figure 1 for Deniable Steganography
Figure 2 for Deniable Steganography
Figure 3 for Deniable Steganography
Figure 4 for Deniable Steganography
Viaarxiv icon