1 |
Cross-architecture distillation for face recognition
|
会议论文 |
Weisong Zhao;Xiangyu Zhu;Zhixiang He;Xiao-Yu Zhang;Zhen Lei |
2 |
Robust network traffic identification with graph matching
|
期刊论文 |
Wenhao Li;Xiao-Yu Zhang;Huaifeng Bao;Qiang Wang;Zhaoxuan Li |
3 |
Masked relation learning for deepfake detection
|
期刊论文 |
Ziming Yang;Jian Liang;Yuting Xu;Xiao-Yu Zhang;Ran He |
4 |
基于直推图的加密流量识别与分类方法及系统
|
专利 |
张晓宇;李文灏;刘峰 |
5 |
基于网络结构搜索和背景-动作增强的弱监督行为检测方法和装置
|
专利 |
张晓宇;张亚如 |
6 |
Masked face transformer
|
期刊论文 |
Weisong Zhao;Xiangyu Zhu;Kaiwen Guo;Haichao Shi;Xiao-Yu Zhang;Zhen Lei |
7 |
一种基于双级对比学习与噪声鲁棒的弱监督时序语言定位方法和装置
|
专利 |
张晓宇;张亚如;石海超 |
8 |
FA-GAN: face augmentation GAN for deformation-invariant face recognition
|
期刊论文 |
Mandi Luo;Jie Cao;Xin Ma;Xiaoyu Zhang;Ran He |
9 |
SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentation
|
期刊论文 |
Xiao-Yu Zhang;Yaru Zhang;Haichao Shi;Jing Dong |
10 |
Dynamic graph modeling for weakly-supervised temporal action localization
|
会议论文 |
Haichao Shi;Xiao-Yu Zhang;Changsheng Li;Lixing Gong;Yong Li;Yongjun Bao |
11 |
GBLNet: detecting intrusion traffic with multi-granularity BiLSTM
|
会议论文 |
Wenhao Li;Xiao-Yu Zhang |
12 |
一种基于身份-属性解耦合成的异质人脸识别方法及系统
|
专利 |
张晓宇;杨梓铭 |
13 |
一种基于可解释人工智能的实时入侵检测方法及系统
|
专利 |
张晓宇;李文灏;刘峰 |
14 |
Action shuffling for weakly supervised temporal localization
|
期刊论文 |
Xiao-Yu Zhang;Haichao Shi;Changsheng Li;Xinchu Shi |
15 |
Grouped knowledge distillation for deep face recognition
|
会议论文 |
Weisong Zhao;Xiangyu Zhu;Kaiwen Guo;Xiao-Yu Zhang;Zhen Lei |
16 |
Rumor detection with diverse counterfactual evidence
|
会议论文 |
Kaiwei Zhang;Junchi Yu;Haichao Shi;Jian Liang;Xiao-Yu Zhang |
17 |
Cyberbullying detection with side information: a real-world application of COVID-19 news comment in chinese language
|
会议论文 |
Jian Xing;Xiaoyu Zhang;Lin Chen;Yu Ding;Yaru Zhang;Wei Hu;Zhicheng Jin;Jingya Wang;Yaowei Chen;Yi Hong |
18 |
OW-TAL: learning unknown human activities for open-world temporal action localization
|
期刊论文 |
Yaru Zhang;Xiao-Yu Zhang;Haichao Shi |
19 |
Heterogeneous face recognition via face synthesis with identity-attribute disentanglement
|
期刊论文 |
Ziming Yang;Jian Liang;Chaoyou Fu;Mandi Luo;Xiao-Yu Zhang |
20 |
A glimpse of the whole: detecting few-shot android malware encrypted network traffic
|
会议论文 |
Wenhao Li;Xiao-Yu Zhang;Huaifeng Bao;Qiang Wang;Haichao Shi;Zhaoxuan Li |
21 |
基于对抗扰动的实时网络连接隐私保护方法和系统
|
专利 |
张晓宇;李文灏;刘峰 |
22 |
Spoof-guided image decomposition for face anti-spoofing
|
会议论文 |
Bin Zhang;Xiangyu Zhu;Xiaoyu Zhang;Shukai Chen;Peng Li;Zhen Lei |
23 |
Consistent sub-decision network for low-quality masked face recognition
|
期刊论文 |
Weisong Zhao;Xiangyu Zhu;Haichao Shi;Xiao-Yu Zhang;Zhen Lei |
24 |
一种基于动作片段排序的弱监督行为定位方法和装置
|
专利 |
张晓宇;石海超 |
25 |
基于图匹配的不同网络环境的加密流量分类方法及系统
|
专利 |
张晓宇;李文灏;刘峰 |
26 |
Modeling spoof noise by de-spoofing diffusion and its application in face anti-spoofing
|
会议论文 |
Bin Zhang;Xiangyu Zhu;Xiaoyu Zhang;Zhen Lei |
27 |
TwinNet: twin structured knowledge transfer network for weakly supervised action localization
|
期刊论文 |
Xiao-Yu Zhang;Hai-Chao Shi;Chang-Sheng Li;Li-Xin Duan |
28 |
AMDetector: detecting large-scale and novel android malware traffic with meta-learning
|
会议论文 |
Wenhao Li;Huaifeng Bao;Xiao-Yu Zhang;Lin Li |
29 |
Prism: Real-time privacy protection against temporal network traffic analyzers
|
期刊论文 |
Wenhao Li;Xiao-Yu Zhang;Huaifeng Bao;Binbin Yang;Zhaoxuan Li;Haichao Shi;Qiang Wang |
30 |
MetaTKG: learning evolutionary meta-knowledge for temporal knowledge graph reasoning
|
会议论文 |
Yuwei Xia;Mengqi Zhang;Qiang Liu;Shu Wu;Xiao-Yu Zhang |
31 |
Malware classification based on semi-supervised learning
|
会议论文 |
Yu Ding;XiaoYu Zhang;BinBin Li;Jian Xing;Qian Qiang;ZiSen Qi;MengHan Guo;SiYu Jia;HaiPing Wang |
32 |
ProGraph: robust network traffic identification with graph propagation
|
期刊论文 |
Wenhao Li;Xiao-Yu Zhang;Huaifeng Bao;Haichao Shi;Qiang Wang |
33 |
Weakly-supervised action localization via embedding-modeling iterative optimization
|
期刊论文 |
Xiao-Yu Zhang;Haichao Shi;Changsheng Li;Peng Li;Zekun Li;Peng Ren |
34 |
StochasticFormer: stochastic modeling for weakly supervised temporal action localization
|
期刊论文 |
Haichao Shi;Xiao-Yu Zhang;Changsheng Li |