default search action
Run Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. Comput. Secur. 142: 103855 (2024) - [j30]Run Wang:
Remote Intelligent Medical Monitoring Data Transmission Network Optimization based on Deep Learning. Scalable Comput. Pract. Exp. 25(3): 1748-1756 (2024) - [j29]Run Wang, Peng Song, Shaokai Li, Liang Ji, Wenming Zheng:
Common Latent Embedding Space for Cross-Domain Facial Expression Recognition. IEEE Trans. Comput. Soc. Syst. 11(2): 2046-2056 (2024) - [j28]Run Wang, Peng Song, Wenming Zheng:
Graph-Diffusion-Based Domain-Invariant Representation Learning for Cross-Domain Facial Expression Recognition. IEEE Trans. Comput. Soc. Syst. 11(3): 4163-4174 (2024) - [c26]Xuanhua He, Tao Hu, Guoli Wang, Zejin Wang, Run Wang, Qian Zhang, Keyu Yan, Ziyi Chen, Rui Li, Chengjun Xie, Jie Zhang, Man Zhou:
Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain. AAAI 2024: 2130-2138 - [c25]Mengjie Wu, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang, Lina Wang:
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. AAAI 2024: 19965-19973 - [c24]Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu:
Fingerprinting Image-to-Image Generative Adversarial Networks. EuroS&P 2024: 41-61 - [c23]Shenjie Jiang, Peng Song, Shaokai Li, Run Wang, Wenming Zheng:
Multi-Source Unsupervised Transfer Components Learning for Cross-Domain Speech Emotion Recognition. ICASSP 2024: 10226-10230 - [c22]Boheng Li, Yishuo Cai, Jisong Cai, Yiming Li, Han Qiu, Run Wang, Tianwei Zhang:
Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation. ICML 2024 - [i23]Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin:
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. CoRR abs/2401.00137 (2024) - [i22]Xuanhua He, Tao Hu, Guoli Wang, Zejin Wang, Run Wang, Qian Zhang, Keyu Yan, Ziyi Chen, Rui Li, Chenjun Xie, Jie Zhang, Man Zhou:
Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain. CoRR abs/2401.02161 (2024) - [i21]Weifeng Liu, Tianyi She, Jiawei Liu, Run Wang, Dongyu Yao, Ziyou Liang:
Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes. CoRR abs/2401.15668 (2024) - [i20]Ziyou Liang, Run Wang, Weifeng Liu, Yuyang Zhang, Wenyuan Yang, Lina Wang, Xingkai Wang:
Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models. CoRR abs/2403.16513 (2024) - [i19]Di Yang, Yihao Huang, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Run Wang, Geguang Pu, Yang Liu:
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake. CoRR abs/2405.18071 (2024) - 2023
- [j27]Hong Li, Bo Wan, Deping Chu, Run Wang, Guoxi Ma, Jinming Fu, Zhuocheng Xiao:
Progressive Geological Modeling and Uncertainty Analysis Using Machine Learning. ISPRS Int. J. Geo Inf. 12(3): 97 (2023) - [j26]Minghong Liu, Hong-Li Ren, Run Wang, Jieru Ma, Xin Mao:
Distinct Impacts of Two Types of Developing El Niño-Southern Oscillations on Tibetan Plateau Summer Precipitation. Remote. Sens. 15(16): 4030 (2023) - [j25]Shiyao Li, Run Wang, Lei Wang, Shaoyu Liu, Jiang Ye, Hang Xu, Ruiqing Niu:
An Approach for Monitoring Shallow Surface Outcrop Mining Activities Based on Multisource Satellite Remote Sensing Data. Remote. Sens. 15(16): 4062 (2023) - [j24]Wenqi Wang, Run Wang, Lina Wang, Zhibo Wang, Aoshuang Ye:
Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey. IEEE Trans. Knowl. Data Eng. 35(3): 3159-3179 (2023) - [c21]Shenjie Jiang, Peng Song, Run Wang, Shaokai Li, Wenming Zheng:
Dynamic Graph-Guided Transferable Regression for Cross-Domain Speech Emotion Recognition. CCBR 2023: 225-234 - [c20]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks. ICCV 2023: 4986-4996 - [c19]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Wenhui Zhang, Liming Fang, Jing Chen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. ACM Multimedia 2023: 8463-8474 - [i18]Dongyu Yao, Boheng Li, Run Wang, Lina Wang:
Dual-level Interaction for Domain Adaptive Semantic Segmentation. CoRR abs/2307.07972 (2023) - [i17]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network. CoRR abs/2307.15860 (2023) - [i16]Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang:
Hard Adversarial Example Mining for Improving Robust Fairness. CoRR abs/2308.01823 (2023) - [i15]Xiaobei Li, Changchun Yin, Liming Fang, Run Wang, Chenhao Lin:
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning. CoRR abs/2308.04673 (2023) - [i14]Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning. CoRR abs/2310.00626 (2023) - 2022
- [j23]Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu:
Countering Malicious DeepFakes: Survey, Battleground, and Horizon. Int. J. Comput. Vis. 130(7): 1678-1734 (2022) - [j22]Wenqi Wang, Lina Wang, Run Wang, Aoshuang Ye, Jianpeng Ke:
Better constraints of imperceptibility, better adversarial examples in the text. Int. J. Intell. Syst. 37(6): 3440-3459 (2022) - [c18]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. IJCAI 2022: 761-767 - [c17]Kang Yang, Run Wang, Lina Wang:
MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training. IJCAI 2022: 776-782 - [c16]Zhengwu Luo, Lina Wang, Run Wang, Kang Yang, Aoshuang Ye:
Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization. IJCNN 2022: 1-8 - [c15]Run Wang, Haoxuan Li, Lingzhou Mu, Jixing Ren, Shangwei Guo, Li Liu, Liming Fang, Jing Chen, Lina Wang:
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations? ACM Multimedia 2022: 1808-1818 - [c14]Run Wang, Qiong Wang, Jiawei Yu, Jiaxing Tong:
Multi-scale Self-attention-based Few-shot Object Detection for Remote Sensing Images. MMSP 2022: 1-7 - [i13]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. CoRR abs/2206.00477 (2022) - [i12]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - 2021
- [j21]Wenqi Wang, Run Wang, Jianpeng Ke, Lina Wang:
TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification. IEEE Access 9: 27467-27475 (2021) - [j20]Aoshuang Ye, Lina Wang, Run Wang, Wenqi Wang, Jianpeng Ke, Danlei Wang:
An End-to-End Rumor Detection Model Based on Feature Aggregation. Complex. 2021: 6659430:1-6659430:16 (2021) - [j19]Yuanyuan Liu, Wei Dai, Fang Fang, Yongquan Chen, Rui Huang, Run Wang, Bo Wan:
Dynamic multi-channel metric network for joint pose-aware and identity-invariant facial expression recognition. Inf. Sci. 578: 195-213 (2021) - [j18]Lifei Wei, Kun Wang, Qikai Lu, Yajing Liang, Haibo Li, Zhengxiang Wang, Run Wang, Liqin Cao:
Crops Fine Classification in Airborne Hyperspectral Imagery Based on Multi-Feature Fusion and Deep Learning. Remote. Sens. 13(15): 2917 (2021) - [j17]Muhammad Afaq Hussain, Zhanlong Chen, Run Wang, Muhammad Shoaib:
PS-InSAR-Based Validated Landslide Susceptibility Mapping along Karakorum Highway, Pakistan. Remote. Sens. 13(20): 4129 (2021) - [j16]Run Wang, Somak Dutta, Vivekananda Roy:
A note on marginal correlation based screening. Stat. Anal. Data Min. 14(1): 88-92 (2021) - [c13]Wenxin Li, Qi Wang, Run Wang, Lei Zhao, Lina Wang:
Exposing DeepFakes via Localizing the Manipulated Artifacts. ICICS (2) 2021: 3-20 - [c12]Wenyu Zhang, Run Wang, Yanqin Tang, En Yuan, Yongfen Wu, Zhen Wang:
Research on Teaching Evaluation of Courses Based on Computer System Ability Training. ICPCSEE (2) 2021: 434-442 - [c11]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. ACM Multimedia 2021: 3546-3555 - [i11]Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu:
Countering Malicious DeepFakes: Survey, Battleground, and Horizon. CoRR abs/2103.00218 (2021) - [i10]Guanlin Li, Shangwei Guo, Run Wang, Guowen Xu, Tianwei Zhang:
A Stealthy and Robust Fingerprinting Scheme for Generative Models. CoRR abs/2106.11760 (2021) - [i9]Run Wang, Xiaotian Zhou, Wei Li, Zhongzhi Zhang:
Maximizing the Smallest Eigenvalue of Grounded Laplacian Matrix. CoRR abs/2110.12576 (2021) - 2020
- [j15]Feng Shen, Yongyong Liu, Run Wang, Wei Zhou:
A dynamic financial distress forecast model with multiple forecast results under unbalanced data environment. Knowl. Based Syst. 192: 105365 (2020) - [j14]Fei Sun, Fang Fang, Run Wang, Bo Wan, Qinghua Guo, Hong Li, Xincai Wu:
An Impartial Semi-Supervised Learning Strategy for Imbalanced Classification on VHR Images. Sensors 20(22): 6699 (2020) - [j13]Run Wang, Zhibo Wang, Benxiao Tang, Lei Zhao, Lina Wang:
SmartPI: Understanding Permission Implications of Android Apps from User Reviews. IEEE Trans. Mob. Comput. 19(12): 2933-2945 (2020) - [c10]Run Wang, Shudong Shi:
Security Analysis of Home Agent Time-Stamped Binding Update Based on CS Logic. ICCCS 2020: 463-466 - [c9]Run Wang, Ke Xu, Hui Feng, Wei Chen:
Hybrid RNN-ANN Based Deep Physiological Network for Pain Recognition. EMBC 2020: 5584-5587 - [c8]Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu:
FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces. IJCAI 2020: 3444-3451 - [c7]Run Wang, Felix Juefei-Xu, Yihao Huang, Qing Guo, Xiaofei Xie, Lei Ma, Yang Liu:
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices. ACM Multimedia 2020: 1207-1216 - [c6]Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction. ACM Multimedia 2020: 1217-1226 - [c5]Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu:
Amora: Black-box Adversarial Morphing Attack. ACM Multimedia 2020: 1376-1385 - [c4]Lina Wang, Kang Yang, Wenqi Wang, Run Wang, Aoshuang Ye:
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm. ACM Multimedia 2020: 2229-2236 - [i8]Yihao Huang, Felix Juefei-Xu, Run Wang, Xiaofei Xie, Lei Ma, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles. CoRR abs/2001.09598 (2020) - [i7]Run Wang, Felix Juefei-Xu, Yihao Huang, Qing Guo, Xiaofei Xie, Lei Ma, Yang Liu:
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices. CoRR abs/2005.13770 (2020) - [i6]Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction. CoRR abs/2006.07533 (2020) - [i5]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. CoRR abs/2009.09869 (2020)
2010 – 2019
- 2019
- [j12]Yang Meng, Run Wang, Juan Wang, Jie Yang, Guan Gui:
IRIS: Smart Phone Aided Intelligent Reimbursement System Using Deep Learning. IEEE Access 7: 165635-165645 (2019) - [j11]Sha Zhou, Run Wang, Junhua Ding, Xiaofang Pan, Shunping Zhou, Fang Fang, Wenjie Zhen:
An approach for computing routes without complicated decision points in landmark-based pedestrian navigation. Int. J. Geogr. Inf. Sci. 33(9): 1829-1846 (2019) - [j10]Fei Sun, Run Wang, Bo Wan, Yanjun Su, Qinghua Guo, Youxin Huang, Xincai Wu:
Efficiency of Extreme Gradient Boosting for Imbalanced Land Cover Classification Using an Extended Margin and Disagreement Performance. ISPRS Int. J. Geo Inf. 8(7): 315 (2019) - [j9]Yanwei Sun, Chao Gao, Jialin Li, Run Wang, Jian Liu:
Quantifying the Effects of Urban Form on Land Surface Temperature in Subtropical High-Density Urban Areas Using Machine Learning. Remote. Sens. 11(8): 959 (2019) - [j8]Dezhi Wang, Bo Wan, Penghua Qiu, Zejun Zuo, Run Wang, Xincai Wu:
Mapping Height and Aboveground Biomass of Mangrove Forests on Hainan Island Using UAV-LiDAR Sampling. Remote. Sens. 11(18): 2156 (2019) - [c3]Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming:
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. ICICS 2019: 630-645 - [i4]Wenqi Wang, Benxiao Tang, Run Wang, Lina Wang, Aoshuang Ye:
A survey on Adversarial Attacks and Defenses in Text. CoRR abs/1902.07285 (2019) - [i3]Run Wang, Lei Ma, Felix Juefei-Xu, Xiaofei Xie, Jian Wang, Yang Liu:
FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces. CoRR abs/1909.06122 (2019) - [i2]Run Wang, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Yihao Huang, Yang Liu:
Amora: Black-box Adversarial Morphing Attack. CoRR abs/1912.03829 (2019) - 2018
- [j7]Bo Wan, Lin Yang, Shunping Zhou, Run Wang, Dezhi Wang, Wenjie Zhen:
A Parallel-Computing Approach for Vector Road-Network Matching Using GPU Architecture. ISPRS Int. J. Geo Inf. 7(12): 472 (2018) - [j6]Dezhi Wang, Bo Wan, Penghua Qiu, Yanjun Su, Qinghua Guo, Run Wang, Fei Sun, Xincai Wu:
Evaluating the Performance of Sentinel-2, Landsat 8 and Pléiades-1 in Mapping Mangrove Extent and Species. Remote. Sens. 10(9): 1468 (2018) - [j5]Benxiao Tang, Zhibo Wang, Run Wang, Lei Zhao, Lina Wang:
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference. Wirel. Commun. Mob. Comput. 2018: 4627108:1-4627108:19 (2018) - 2017
- [j4]Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang:
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. J. Syst. Softw. 124: 153-168 (2017) - [j3]Run Wang, Bo Wan, Qinghua Guo, Maosheng Hu, Shunping Zhou:
Mapping Regional Urban Extent Using NPP-VIIRS DNB and MODIS NDVI Data. Remote. Sens. 9(8): 862 (2017) - 2015
- [j2]Fei Guo, Li Yan, Run Wang:
Rigorous derivation and propagation speed property for a two-component Degasperis-Procesi system in shallow water regimes. Appl. Math. Comput. 259: 980-986 (2015) - [j1]Bo Wan, Qinghua Guo, Fang Fang, Yanjun Su, Run Wang:
Mapping US Urban Extents from MODIS Data Using One-Class Classification Method. Remote. Sens. 7(8): 10143-10163 (2015) - [c2]Lei Zhao, Run Wang, Lina Wang, Yueqiang Cheng:
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis. COMPSAC 2015: 434-443 - [i1]Run Wang, Qiaoli Mo, Qian Zhang, Fudi Chen, Dazuo Yang:
Prediction of the Yield of Enzymatic Synthesis of Betulinic Acid Ester Using Artificial Neural Networks and Support Vector Machine. CoRR abs/1511.03984 (2015) - 2010
- [c1]Yongzhu Xiong, Zhengdong Zhang, Feng Chen, Run Wang:
Estimation of urbanization effect on climatic warming over the recent 30 years in Guangzhou, South China. Geoinformatics 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint