


default search action
Chenhao Lin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j30]Xiaoyu Zhang
, Weipeng Jiang
, Chao Shen
, Qi Li
, Qian Wang
, Chenhao Lin
, Xiaohong Guan
:
Deep Learning Library Testing: Definition, Methods and Challenges. ACM Comput. Surv. 57(7): 187:1-187:37 (2025)
[j29]Xiaoyu Zhang
, Chao Shen
, Shiqing Ma
, Juan Zhai
, Chenhao Lin
:
An Automated Monitoring and Repairing System for DNN Training. IEEE Trans. Dependable Secur. Comput. 22(2): 1655-1673 (2025)
[j28]Haotian Wu
, Zhe Peng
, Jiang Xiao
, Lei Xue
, Chenhao Lin
, Sai-Ho Chung
:
HeX: Encrypted Rich Queries With Forward and Backward Privacy Using Trusted Hardware. IEEE Trans. Dependable Secur. Comput. 22(4): 3751-3765 (2025)
[j27]Chenhao Lin
, Xiang Ji, Yulong Yang
, Qian Li
, Zhengyu Zhao
, Zhe Peng
, Run Wang
, Liming Fang
, Chao Shen
:
Hard Adversarial Example Mining for Improving Robust Fairness. IEEE Trans. Inf. Forensics Secur. 20: 350-363 (2025)
[j26]Bo Yang
, Hengwei Zhang
, Jindong Wang, Yulong Yang
, Chenhao Lin
, Chao Shen
, Zhengyu Zhao
:
Adversarial Example Soups: Improving Transferability and Stealthiness for Free. IEEE Trans. Inf. Forensics Secur. 20: 1882-1894 (2025)
[j25]Qian Li
, Di Wu
, Dawei Zhou
, Chenhao Lin
, Shuai Liu
, Cong Wang
, Chao Shen
:
Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity. IEEE Trans. Inf. Forensics Secur. 20: 6005-6018 (2025)
[j24]Yulong Yang
, Ruiqi Cao, Xiang Ji, Qiwei Tian
, Chenhao Lin
, Zhengyu Zhao
, Qian Li
, Le Yang
, Hongshan Yang
, Chao Shen
:
Data-Centric Robust Training for Defending Against Transfer-Based Adversarial Attacks. IEEE Trans. Inf. Forensics Secur. 20: 10275-10287 (2025)
[j23]Bohui Wang
, Chao Shen
, Chenhao Lin
, Chao Deng
, Yang Shi
:
Distributed Cooperative Control and Robust Optimization for Nonlinear Connected Automated Vehicles With Unknown Reaction Time Delays and Jerk Dynamics. IEEE Trans. Intell. Transp. Syst. 26(5): 6715-6733 (2025)
[j22]Haotian Wu
, Yuzhe Tang
, Zhaoyan Shen
, Jun Tao
, Chenhao Lin
, Zhe Peng
:
TELEX: Two-Level Learned Index for Rich Queries on Enclave-Based Blockchain Systems. IEEE Trans. Knowl. Data Eng. 37(7): 4299-4313 (2025)
[j21]Chenhao Lin, Ying Xu, Zhongkai Yi, Zhenghong Tu:
Energy Management for Rural Microgrid With Inaccurate Equipment Parameters: A KAN-Based Deep Reinforcement Learning Method. IEEE Trans. Smart Grid 16(6): 4808-4821 (2025)
[c31]Yuchen Ren
, Zhengyu Zhao, Chenhao Lin, Bo Yang
, Lu Zhou, Zhe Liu, Chao Shen:
Improving Integrated Gradient-based Transferable Adversarial Examples by Refining the Integration Path. AAAI 2025: 6731-6739
[c30]Yingmao Miao, Zhanpeng Huang, Rui Han, Zibin Wang, Chenhao Lin, Chao Shen:
Shining Yourself: High-Fidelity Ornaments Virtual Try-on with Diffusion Model. CVPR 2025: 359-368
[c29]Le Yang, Ziwei Zheng, Boxu Chen
, Zhengyu Zhao, Chenhao Lin, Chao Shen:
Nullu: Mitigating Object Hallucinations in Large Vision-Language Models via HalluSpace Projection. CVPR 2025: 14635-14645
[c28]Yuchen Ren, Zhengyu Zhao, Chenhao Lin, Bo Yang, Lu Zhou, Zhe Liu, Chao Shen:
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement. CVPR 2025: 25071-25080
[c27]Chenhao Lin, Yanjie Zhu, Yingmao Miao, Zhengyu Zhao, Shuai Liu, Chao Shen:
TGDrag: Adding Semantic Control into Point-based Image Editing via Text Guidance. ICASSP 2025: 1-5
[c26]Yingmao Miao, Chenhao Lin, Zhengyu Zhao, Hang Wang, Shuai Liu, Chao Shen, Xiaohong Guan:
One-Shot Face Avatar Generation in a Single Forward Pass with Identity Preservation. ICASSP 2025: 1-5
[c25]Zhengli Shi, Chenhao Lin, Zhengyu Zhao, Peter Peer, Chao Shen:
Evading Deepfake Detectors via Adversarially Degrading and Restoring Forged Images. ICME 2025: 1-6
[c24]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. SP 2025: 1713-1731
[c23]Zekun Sun, Zijian Liu, Shouling Ji, Chenhao Lin, Na Ruan:
Pretender: Universal Active Defense against Diffusion Finetuning Attacks. USENIX Security Symposium 2025: 1017-1036
[c22]Chenhao Lin, Chenyang Zhao, Shiwei Wang, Longtian Wang, Chao Shen, Zhengyu Zhao:
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks. USENIX Security Symposium 2025: 6359-6378
[d2]Chenhao Lin
, Chenyang Zhao
, Shiwei Wang
, Longtian Wang
, Chao Shen
, Zhengyu Zhao
:
TITIM-code: Code to implement the TITIM workflow and reproduce the results. Version 1. Zenodo, 2025 [all versions]
[d1]Chenhao Lin
, Chenyang Zhao
, Shiwei Wang
, Longtian Wang
, Chao Shen
, Zhengyu Zhao
:
TITIM: Code & datasets to implement the TITIM workflow and reproduce the results. Version 2. Zenodo, 2025 [all versions]
[i41]Chenhao Lin, Chenyang Zhao, Shiwei Wang, Longtian Wang, Chao Shen, Zhengyu Zhao:
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks. CoRR abs/2503.12058 (2025)
[i40]Yuchen Ren, Zhengyu Zhao, Chenhao Lin, Bo Yang, Lu Zhou, Zhe Liu, Chao Shen:
Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement. CoRR abs/2503.15404 (2025)
[i39]Yingmao Miao, Zhanpeng Huang, Rui Han, Zibin Wang, Chenhao Lin, Chao Shen:
Shining Yourself: High-Fidelity Ornaments Virtual Try-on with Diffusion Model. CoRR abs/2503.16065 (2025)
[i38]Darian Tomasevic, Fadi Boutros, Chenhao Lin, Naser Damer, Vitomir Struc, Peter Peer:
ID-Booth: Identity-consistent Face Generation with Diffusion Models. CoRR abs/2504.07392 (2025)
[i37]Hang Wang, Zhi-Qi Cheng
, Chenhao Lin, Chao Shen, Lei Zhang:
HCMA: Hierarchical Cross-model Alignment for Grounded Text-to-Image Generation. CoRR abs/2505.06512 (2025)
[i36]Bo Yang, Hengwei Zhang, Jindong Wang, Yuchen Ren, Chenhao Lin, Chao Shen, Zhengyu Zhao:
Use as Many Surrogates as You Want: Selective Ensemble Attack to Unleash Transferability without Sacrificing Resource Efficiency. CoRR abs/2505.12644 (2025)
[i35]Boxu Chen, Ziwei Zheng, Le Yang, Zeyu Geng, Zhengyu Zhao, Chenhao Lin, Chao Shen:
Seeing It or Not? Interpretable Vision-aware Latent Steering to Mitigate Object Hallucinations. CoRR abs/2505.17812 (2025)
[i34]Sicong Han, Chenhao Lin, Zhengyu Zhao, Xiyuan Wang, Xinlei He, Qian Li, Cong Wang, Qian Wang, Chao Shen:
Prediction Inconsistency Helps Achieve Generalizable Detection of Adversarial Examples. CoRR abs/2506.03765 (2025)
[i33]Chaoshuo Zhang, Chenhao Lin, Zhengyu Zhao, Le Yang, Qian Wang, Chao Shen:
Concept Unlearning by Modeling Key Steps of Diffusion Process. CoRR abs/2507.06526 (2025)
[i32]Junhao Zheng, Jiahao Sun, Chenhao Lin, Zhengyu Zhao, Chen Ma, Chong Zhang, Cong Wang, Qian Wang, Chao Shen:
Revisiting Adversarial Patch Defenses on Object Detectors: Unified Evaluation, Large-Scale Dataset, and New Insights. CoRR abs/2508.00649 (2025)
[i31]Chende Zheng, Ruiqi suo, Chenhao Lin, Zhengyu Zhao, Le Yang, Shuai Liu, Minghui Yang, Cong Wang, Chao Shen:
D3: Training-Free AI-Generated Video Detection Using Second-Order Features. CoRR abs/2508.00701 (2025)
[i30]Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Shuai Liu, Chao Shen:
Adversarial Video Promotion Against Text-to-Video Retrieval. CoRR abs/2508.06964 (2025)
[i29]Junjie Chu, Mingjie Li, Ziqing Yang, Ye Leng, Chenhao Lin, Chao Shen, Michael Backes, Yun Shen, Yang Zhang:
JADES: A Universal Framework for Jailbreak Assessment via Decompositional Scoring. CoRR abs/2508.20848 (2025)
[i28]Xiaoyu Zhang, Weipeng Jiang, Juan Zhai, Shiqing Ma, Qingshuang Bao, Chenhao Lin, Chao Shen, Tianlin Li, Yang Liu:
Rethinking Technology Stack Selection with AI Coding Proficiency. CoRR abs/2509.11132 (2025)- 2024
[j20]Xuanqi Gao, Chao Shen, Weipeng Jiang, Chenhao Lin, Qian Li, Qian Wang, Qi Li, Xiaohong Guan:
Fairness in machine learning: definition, testing, debugging, and application. Sci. China Inf. Sci. 67(9) (2024)
[j19]Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu
, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. Comput. Secur. 142: 103855 (2024)
[j18]Qian Li
, Chao Shen
, Qingyuan Hu, Chenhao Lin
, Xiang Ji, Saiyu Qi
:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. IEEE Trans. Dependable Secur. Comput. 21(2): 530-541 (2024)
[j17]Chenhao Lin
, Tianle Song
, Yingmao Miao
, Jingyi He
, Minghui Yang
, Huan Wang
, Chao Shen
:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. IEEE Trans. Dependable Secur. Comput. 21(4): 2257-2272 (2024)
[j16]Jiwei Tian
, Chao Shen
, Buhong Wang
, Xiaofang Xia
, Meng Zhang
, Chenhao Lin
, Qian Li
:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 4418-4432 (2024)
[j15]Jingyi Deng
, Chenhao Lin
, Pengbin Hu
, Chao Shen
, Qian Wang
, Qi Li
, Qiming Li
:
Towards Benchmarking and Evaluating Deepfake Detection. IEEE Trans. Dependable Secur. Comput. 21(6): 5112-5127 (2024)
[j14]Yulong Yang
, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Haoran Fan, Dawei Zhou
, Nannan Wang
, Tongliang Liu
, Chao Shen
:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. IEEE Trans. Inf. Forensics Secur. 19: 3265-3278 (2024)
[j13]Yulong Yang
, Haoran Fan
, Chenhao Lin
, Qian Li
, Zhengyu Zhao
, Chao Shen
:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. IEEE Trans. Inf. Forensics Secur. 19: 5880-5894 (2024)
[j12]Qian Li
, Qingyuan Hu, Haoran Fan
, Chenhao Lin
, Chao Shen
, Libing Wu
:
Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. IEEE Trans. Inf. Forensics Secur. 19: 8673-8684 (2024)
[j11]Chenhao Lin
, Fangbin Yi, Hang Wang
, Jingyi Deng
, Zhengyu Zhao
, Qian Li
, Chao Shen
:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 8832-8844 (2024)
[j10]Aokang Pang, Huijun Liang, Chenhao Lin, Lei Yao:
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem. J. Supercomput. 80(8): 11261-11292 (2024)
[c21]Mengjie Wu
, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang, Lina Wang:
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. AAAI 2024: 19965-19973
[c20]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CVPR 2024: 24452-24461
[c19]Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen:
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval. ICML 2024
[c18]Zhoulin Ji, Chenhao Lin, Hang Wang, Chao Shen:
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis. IJCAI 2024: 413-421
[c17]Shuai Liu, Yiming Zhao, Zhen Wang, Chenhao Lin, Chao Shen:
LITNT: A Target-Driven Trajectory Prediction Framework with Lane Change Intent Analysis. ITSC 2024: 1842-1849
[c16]Chende Zheng, Chenhao Lin, Zhengyu Zhao, Hang Wang, Xu Guo, Shuai Liu, Chao Shen:
Breaking Semantic Artifacts for Generalized AI-generated Image Detection. NeurIPS 2024
[i27]Qiannan Wang, Changchun Yin
, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin:
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. CoRR abs/2401.00137 (2024)
[i26]Jiwei Tian
, Chao Shen, Buhong Wang, Xiaofang Xia, Meng Zhang, Chenhao Lin, Qian Li:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. CoRR abs/2401.16001 (2024)
[i25]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CoRR abs/2403.17301 (2024)
[i24]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024)
[i23]Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang:
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study. CoRR abs/2407.09295 (2024)
[i22]Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen:
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication. CoRR abs/2407.10575 (2024)
[i21]Yulong Yang, Haoran Fan, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen, Xiaohong Guan:
A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations. CoRR abs/2411.07597 (2024)
[i20]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. CoRR abs/2411.17453 (2024)
[i19]Zhizhen Chen, Subrat Kishore Dutta, Zhengyu Zhao, Chenhao Lin, Chao Shen, Xiao Zhang:
Can Targeted Clean-Label Poisoning Attacks Generalize? CoRR abs/2412.03908 (2024)
[i18]Zhoulin Ji, Chenhao Lin, Hang Wang, Chao Shen:
Speech-Forensics: Towards Comprehensive Synthetic Speech Dataset Establishment and Analysis. CoRR abs/2412.09032 (2024)
[i17]Le Yang, Ziwei Zheng, Boxu Chen, Zhengyu Zhao, Chenhao Lin, Chao Shen:
Nullu: Mitigating Object Hallucinations in Large Vision-Language Models via HalluSpace Projection. CoRR abs/2412.13817 (2024)
[i16]Yuchen Ren, Zhengyu Zhao, Chenhao Lin, Bo Yang, Lu Zhou, Zhe Liu, Chao Shen:
Improving Integrated Gradient-based Transferable Adversarial Examples by Refining the Integration Path. CoRR abs/2412.18844 (2024)- 2023
[j9]Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. ACM Comput. Surv. 55(14s): 328:1-328:38 (2023)
[j8]Chenhao Lin, Sicong Han
, Jiongli Zhu, Qian Li, Chao Shen, Youwei Zhang, Xiaohong Guan:
Sensitive region-aware black-box adversarial attacks. Inf. Sci. 637: 118929 (2023)
[j7]Chenhao Lin
, Jingyi He
, Chao Shen
, Qi Li
, Qian Wang
:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023)
[j6]Kaidi Jin
, Tianwei Zhang
, Chao Shen
, Yufei Chen
, Ming Fan
, Chenhao Lin
, Ting Liu
:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023)
[j5]Qian Li
, Qingyuan Hu, Chenhao Lin
, Di Wu
, Chao Shen
:
Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. IEEE Trans. Inf. Forensics Secur. 18: 5936-5949 (2023)
[c15]Jiajia Li
, Chenhao Lin, Zikai Wang, Haitao Song, Feng Tan, Lun Hu, Pengwei Hu:
MLGL: Model-free Lesion Generation and Learning for Diabetic Retinopathy Diagnosis. BIBM 2023: 1266-1271
[c14]Pengwei Hu, Chenhao Lin, Jiajia Li
, Feng Tan, Xue Han, Xi Zhou, Lun Hu:
Making the Implicit Explicit: Depression Detection in Web across Posted Texts and Images. BIBM 2023: 4807-4811
[c13]Chen Lu
, Huijun Liang
, Heng Xie
, Chenhao Lin
, Shuxin Lu
:
A Surrogate-Based Optimization Method for Solving Economic Emission Dispatch Problems with Green Certificate Trading and Wind Power. BIC-TA (1) 2023: 29-43
[c12]Bowen Pei
, Jingyi Deng
, Chenhao Lin
, Pengwei Hu
, Chao Shen
:
Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization. ICAI (2) 2023: 202-213
[c11]Zixuan Yang, Chenhao Lin, Pengwei Hu, Chao Shen:
DeepSensitive: A Fuzzing Test for Deep Neural Networks with Sensitive Neurons. ICAI (1) 2023: 351-362
[c10]Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. ICICS 2023: 467-484
[c9]Yingmao Miao, Qiwei Tian
, Chenhao Lin, Tianle Song, Yajie Zhou, Junyi Zhao, Shuxin Gao, Minghui Yang, Chao Shen:
Learning Heuristically-Selected and Neurally-Guided Feature for Age Group Recognition Using Unconstrained Smartphone Interaction. IJCAI 2023: 3029-3037
[c8]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264
[i15]Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li:
End-to-end Face-swapping via Adaptive Latent Representation Learning. CoRR abs/2303.04186 (2023)
[i14]Yulong Yang, Chenhao Lin, Qian Li, Chao Shen, Dawei Zhou, Nannan Wang, Tongliang Liu:
Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths. CoRR abs/2305.05875 (2023)
[i13]Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang:
Hard Adversarial Example Mining for Improving Robust Fairness. CoRR abs/2308.01823 (2023)
[i12]Xiaobei Li, Changchun Yin
, Liming Fang, Run Wang, Chenhao Lin:
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning. CoRR abs/2308.04673 (2023)
[i11]Qiannan Wang, Changchun Yin
, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning. CoRR abs/2310.00626 (2023)
[i10]Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Jingyi Deng, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. CoRR abs/2310.04845 (2023)
[i9]Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian
, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen:
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning. CoRR abs/2310.09891 (2023)
[i8]Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval. CoRR abs/2312.07364 (2023)- 2022
[i7]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022)
[i6]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022)
[i5]Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang:
Artificial Intelligence Security Competition (AISC). CoRR abs/2212.03412 (2022)- 2021
[c7]Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang
:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. ICICS (2) 2021: 73-89
[i4]Hongbin Sun, Zhanghui Kuang, Xiaoyu Yue, Chenhao Lin, Wayne Zhang
:
Spatial Dual-Modality Graph Reasoning for Key Information Extraction. CoRR abs/2103.14470 (2021)- 2020
[c6]Chenhao Lin, Siwen Wang, Dongqi Xu, Yu Lu, Wayne Zhang:
Object Instance Mining for Weakly Supervised Object Detection. AAAI 2020: 11482-11489
[c5]Xiaoyu Yue
, Zhanghui Kuang
, Chenhao Lin, Hongbin Sun
, Wayne Zhang
:
RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition. ECCV (19) 2020: 135-151
[c4]Pengwei Hu, Chenhao Lin, Hui Su, Shaochun Li, Xue Han, Yuan Zhang, Jing Mei:
BlueMemo: Depression Analysis through Twitter Posts. IJCAI 2020: 5252-5254
[c3]Chenhao Lin, Pengwei Hu, Hui Su, Shaochun Li, Jing Mei, Jie Zhou, Henry Leung:
SenseMood: Depression Detection on Social Media. ICMR 2020: 407-411
[i3]Chenhao Lin, Siwen Wang, Dongqi Xu, Yu Lu, Wayne Zhang
:
Object Instance Mining for Weakly Supervised Object Detection. CoRR abs/2002.01087 (2020)
[i2]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020)
[i1]Xiaoyu Yue, Zhanghui Kuang, Chenhao Lin, Hongbin Sun, Wayne Zhang:
RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition. CoRR abs/2007.07542 (2020)
2010 – 2019
- 2019
[j4]Chenhao Lin
, Ajay Kumar
:
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints. IEEE Trans. Inf. Forensics Secur. 14(3): 662-676 (2019)- 2018
[j3]Chenhao Lin
, Ajay Kumar
:
Tetrahedron Based Fast 3D Fingerprint Identification Using Colored LEDs Illumination. IEEE Trans. Pattern Anal. Mach. Intell. 40(12): 3022-3033 (2018)
[j2]Chenhao Lin, Ajay Kumar
:
Contactless and partial 3D fingerprint recognition using multi-view deep representation. Pattern Recognit. 83: 314-327 (2018)
[j1]Chenhao Lin
, Ajay Kumar
:
Matching Contactless and Contact-Based Conventional Fingerprint Images for Biometrics Identification. IEEE Trans. Image Process. 27(4): 2008-2021 (2018)- 2017
[c2]Chenhao Lin, Ajay Kumar:
Multi-Siamese networks to accurately match contactless to contact-based fingerprint images. IJCB 2017: 277-285- 2016
[c1]Chenhao Lin, Ajay Kumar:
Improving cross sensor interoperability for fingerprint identification. ICPR 2016: 943-948
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-08 22:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






