Zhenan Sun
Applied Filters
- Zhenan Sun
- AuthorRemove filter
People
Roles
Publication
Journal/Magazine Names
- IEEE Transactions on Information Forensics and Security (14)
- IEEE Transactions on Pattern Analysis and Machine Intelligence (10)
- Pattern Recognition (9)
- International Journal of Computer Vision (7)
- IEEE Transactions on Circuits and Systems for Video Technology (5)
- ACM Transactions on Multimedia Computing, Communications, and Applications (3)
- IEEE Transactions on Image Processing (3)
- Neurocomputing (3)
- Pattern Recognition Letters (3)
- IEEE Transactions on Multimedia (2)
- IEEE Transactions on Knowledge and Data Engineering (1)
- IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews (1)
- IEEE/ACM Transactions on Computational Biology and Bioinformatics (1)
- Image and Vision Computing (1)
- Journal of Visual Communication and Image Representation (1)
Proceedings/Book Names
- ICB '09: Proceedings of the Third International Conference on Advances in Biometrics (5)
- ICB'07: Proceedings of the 2007 international conference on Advances in Biometrics (5)
- 2021 IEEE International Joint Conference on Biometrics (IJCB) (4)
- ACPR '13: Proceedings of the 2013 2nd IAPR Asian Conference on Pattern Recognition (4)
- ICB'06: Proceedings of the 2006 international conference on Advances in Biometrics (4)
- 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) (3)
- 2017 IEEE International Joint Conference on Biometrics (IJCB) (2)
- 2020 IEEE International Joint Conference on Biometrics (IJCB) (2)
- ACCV'07: Proceedings of the 8th Asian conference on Computer vision - Volume Part II (2)
- CCBR'11: Proceedings of the 6th Chinese conference on Biometric recognition (2)
- CCBR'12: Proceedings of the 7th Chinese conference on Biometric Recognition (2)
- ICIP'09: Proceedings of the 16th IEEE international conference on Image processing (2)
- ICPR '10: Proceedings of the 2010 20th International Conference on Pattern Recognition (2)
- MM '20: Proceedings of the 28th ACM International Conference on Multimedia (2)
- MM '21: Proceedings of the 29th ACM International Conference on Multimedia (2)
- Biometric Recognition (1)
- Brain-Inspired Computing (1)
- Computer Vision – ECCV 2018 (1)
- Computer Vision – ECCV 2020 (1)
- Computer Vision – ECCV 2020 (1)
Publisher
- IEEE Press (42)
- Springer-Verlag (30)
- IEEE Computer Society (24)
- Elsevier Science Inc. (12)
- Association for Computing Machinery (11)
- Kluwer Academic Publishers (7)
- AAAI Press (4)
- Curran Associates Inc. (3)
- Elsevier Science Publishers B. V. (3)
- Academic Press, Inc. (1)
- Butterworth-Heinemann (1)
- IEEE Computer Society Press (1)
- IEEE Educational Activities Department (1)
- Unknown publishers (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
r-FACE: Reference guided face component editing
- Qiyao Deng
School of Information Network Security, People’s Public Security University of China, Beijing, China
, - Jie Cao
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
Center for Research on Intelligent Perception and Computing, CASIA, Beijing, China
, - Yunfan Liu
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
Center for Research on Intelligent Perception and Computing, CASIA, Beijing, China
, - Qi Li
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
Center for Research on Intelligent Perception and Computing, CASIA, Beijing, China
, - Zhenan Sun
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
Center for Research on Intelligent Perception and Computing, CASIA, Beijing, China
AbstractAlthough recent studies have made significant processes in face portrait editing, simple and accurate face component editing remains a challenge. Face components, such as eyes, nose, and mouth, have a shape style that is difficult to transfer. ...
Highlights- A novel framework for diverse and controllable face component editing.
- An example-guided attention module for improving semantic transfer ability.
- A domain verification discriminator for improving the quality of generated images.
- 0Citation
MetricsTotal Citations0
- Qiyao Deng
- research-articleOpen Access
Understanding Deep Face Representation via Attribute Recovery
- Min Ren
School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Yuhao Zhu
Institute of Computing Technologies, China Academy of Railway Sciences Corporation Ltd., Beijing, China
, - Yunlong Wang
State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Yongzhen Huang
School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Zhenan Sun
State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences, Beijing, China
IEEE Transactions on Information Forensics and Security, Volume 19•2024, pp 6949-6961 • https://doi.org/10.1109/TIFS.2024.3424291Deep neural networks have proven to be highly effective in the face recognition task, as they can map raw samples into a discriminative high-dimensional representation space. However, understanding this complex space proves to be challenging for human ...
- 0Citation
MetricsTotal Citations0
- Min Ren
- research-article
Multi-Faceted Knowledge-Driven Graph Neural Network for Iris Segmentation
- Jianze Wei
Institute of Microelectronics, Chinese Academy of Sciences, Beijing, China
, - Yunlong Wang
New Laboratory of Pattern Recognition (NLPR), State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
, - Xingyu Gao
Institute of Microelectronics, Chinese Academy of Sciences, Beijing, China
, - Ran He
New Laboratory of Pattern Recognition (NLPR), State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
, - Zhenan Sun
New Laboratory of Pattern Recognition (NLPR), State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
IEEE Transactions on Information Forensics and Security, Volume 19•2024, pp 6015-6027 • https://doi.org/10.1109/TIFS.2024.3407508Accurate iris segmentation, especially around the iris inner and outer boundaries, is still a formidable challenge. Pixels within these areas are difficult to semantically distinguish since they have similar visual characteristics and close spatial ...
- 0Citation
MetricsTotal Citations0
- Jianze Wei
- research-article
Open-Set Single-Domain Generalization for Robust Face Anti-Spoofing
- Fangling Jiang
https://ror.org/03mqfn238School of Computer Science, University of South China, Hengyang, China
, - Qi Li
New Laboratory of Pattern Recognition (NLPR), MAIS, CASIA, Beijing, China
School of Artificial Intelligence, UCAS, Beijing, China
, - Weining Wang
The Laboratory of Cognition and Decision Intelligence for Complex Systems, CASIA, Beijing, China
, - Min Ren
https://ror.org/022k4wk35School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Wei Shen
OPPO Research Institute, Beijing, China
, - Bing Liu
https://ror.org/03mqfn238School of Computer Science, University of South China, Hengyang, China
, - Zhenan Sun
New Laboratory of Pattern Recognition (NLPR), MAIS, CASIA, Beijing, China
School of Artificial Intelligence, UCAS, Beijing, China
International Journal of Computer Vision, Volume 132, Issue 11•Nov 2024, pp 5151-5172 • https://doi.org/10.1007/s11263-024-02129-0AbstractFace anti-spoofing is a critical component of face recognition technology. However, it suffers from poor generalizability for cross-scenario target domains due to the simultaneous presence of unseen domains and unknown attack types. In this paper, ...
- 0Citation
MetricsTotal Citations0
- Fangling Jiang
- research-article
Improving Transferability of Adversarial Samples via Critical Region-Oriented Feature-Level Attack
- Zhiwei Li
New Laboratory of Pattern Recognition and the State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Min Ren
School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Qi Li
New Laboratory of Pattern Recognition and the State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Fangling Jiang
School of Computer Science, University of South China, Hengyang, Hunan, China
, - Zhenan Sun
New Laboratory of Pattern Recognition and the State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China
IEEE Transactions on Information Forensics and Security, Volume 19•2024, pp 6650-6664 • https://doi.org/10.1109/TIFS.2024.3404857Deep neural networks (DNNs) have received a lot of attention because of their impressive progress in computer vision. However, it has been recently shown that DNNs are vulnerable to being spoofed by carefully crafted adversarial samples. These samples are ...
- 0Citation
MetricsTotal Citations0
- Zhiwei Li
- research-article
Open-Vocabulary Text-Driven Human Image Generation
- Kaiduo Zhang
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, UCAS, 101408, Beijing, China
, - Muyi Sun
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, BUPT, 100875, Beijing, China
, - Jianxin Sun
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, UCAS, 101408, Beijing, China
, - Kunbo Zhang
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, UCAS, 101408, Beijing, China
, - Zhenan Sun
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, UCAS, 101408, Beijing, China
, - Tieniu Tan
CRIPAC, MAIS, CASIA, 100190, Beijing, China
School of AI, UCAS, 101408, Beijing, China
https://ror.org/01rxvg760Nanjing University, 210008, Nanjing, China
International Journal of Computer Vision, Volume 132, Issue 10•Oct 2024, pp 4379-4397 • https://doi.org/10.1007/s11263-024-02079-7AbstractGenerating human images from open-vocabulary text descriptions is an exciting but challenging task. Previous methods (i.e., Text2Human) face two challenging problems: (1) they cannot well handle the open-vocabulary setting by arbitrary text inputs ...
- 0Citation
MetricsTotal Citations0
- Kaiduo Zhang
- research-articlePublished By ACMPublished By ACM
Sensing Micro-Motion Human Patterns using Multimodal mmRadar and Video Signal for Affective and Psychological Intelligence
- Yiwei Ru
Beijing University of Posts and Telecommunications & Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Peipei Li
Beijing University of Posts and Telecommunications, Beijing, China
, - Muyi Sun
Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Yunlong Wang
Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Kunbo Zhang
Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Qi Li
Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Zhaofeng He
Beijing University of Post and Telecommunication, Beijing, China
, - Zhenan Sun
Institute of Automation, Chinese Academy of Sciences, Beijing, China
MM '23: Proceedings of the 31st ACM International Conference on Multimedia•October 2023, pp 5935-5946• https://doi.org/10.1145/3581783.3611754Affective and psychological perception are pivotal in human-machine interaction and essential domains within artificial intelligence. Existing physiological signal-based affective and psychological datasets primarily rely on contact-based sensors, ...
- 1Citation
- 205
- Downloads
MetricsTotal Citations1Total Downloads205Last 12 Months194Last 6 weeks6
- Yiwei Ru
- surveyPublished By ACMPublished By ACM
Deep Learning Based Occluded Person Re-Identification: A Survey
- Yunjie Peng
School of Computer Science and Technology, Beihang University, China
, - Jinlin Wu
Institute of Automation, Chinese Academy of Sciences, China
, - Boqiang Xu
Institute of Automation, Chinese Academy of Sciences, China
, - Chunshui Cao
Watrix Technology Limited Co. Ltd., China
, - Xu Liu
Watrix Technology Limited Co. Ltd., China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, China
, - Zhiqiang He
School of Computer Science and Technology, Beihang University, China
ACM Transactions on Multimedia Computing, Communications, and Applications, Volume 20, Issue 3•March 2024, Article No.: 73, pp 1-27 • https://doi.org/10.1145/3610534Occluded person re-identification (Re-ID) focuses on addressing the occlusion problem when retrieving the person of interest across non-overlapping cameras. With the increasing demand for intelligent video surveillance and the application of person Re-ID ...
- 11Citation
- 786
- Downloads
MetricsTotal Citations11Total Downloads786Last 12 Months645Last 6 weeks60
- Yunjie Peng
- research-article
PyMAF-X: Towards Well-Aligned Full-Body Model Regression From Monocular Images
- Hongwen Zhang
Department of Automation, Tsinghua University, Beijing, China
, - Yating Tian
Department of Computer Science and Technology, Nanjing University, Nanjing, China
, - Yuxiang Zhang
Department of Automation, Tsinghua University, Beijing, China
, - Mengcheng Li
Department of Automation, Tsinghua University, Beijing, China
, - Liang An
Department of Automation, Tsinghua University, Beijing, China
, - Zhenan Sun
Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Yebin Liu
Department of Automation, Tsinghua University, Beijing, China
IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 45, Issue 10•Oct. 2023, pp 12287-12303 • https://doi.org/10.1109/TPAMI.2023.3271691We present PyMAF-X, a regression-based approach to recovering a parametric full-body model from a single image. This task is very challenging since minor parametric deviation may lead to noticeable misalignment between the estimated mesh and the input ...
- 8Citation
MetricsTotal Citations8
- Hongwen Zhang
- research-article
Personalized Graph Generation for Monocular 3D Human Pose and Shape Estimation
- Junxing Hu
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
, - Hongwen Zhang
Department of Automation, Tsinghua University, Beijing, China
, - Yunlong Wang
Department of Automation, Tsinghua University, Beijing, China
, - Min Ren
School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Zhenan Sun
Department of Automation, Tsinghua University, Beijing, China
IEEE Transactions on Circuits and Systems for Video Technology, Volume 34, Issue 4•April 2024, pp 2399-2413 • https://doi.org/10.1109/TCSVT.2023.33105253D human pose and shape estimation from a single RGB image is an appealing yet challenging task. Due to the graph-like nature of human parametric models, a growing number of graph neural network-based approaches have been proposed and achieved promising ...
- 1Citation
MetricsTotal Citations1
- Junxing Hu
- research-article
AIF-LFNet: All-in-Focus Light Field Super-Resolution Method Considering the Depth-Varying Defocus
- Shubo Zhou
Institute of Information Science and Technology, Donghua University, Shanghai, China
, - Liang Hu
Key Laboratory of Computational Optical Imaging Technology, Aerospace Information Research Institute, Chinese Academy of Sciences, Beijing, China
, - Yunlong Wang
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
, - Kunbo Zhang
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems (MAIS), Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, China
, - Xue-Qin Jiang
Institute of Information Science and Technology, Donghua University, Shanghai, China
IEEE Transactions on Circuits and Systems for Video Technology, Volume 33, Issue 8•Aug. 2023, pp 3976-3988 • https://doi.org/10.1109/TCSVT.2023.3237593As an aperture-divided computational imaging system, microlens array (MLA) -based light field (LF) imaging is playing an increasingly important role in computer vision. As the trade-off between the spatial and angular resolutions, deep learning (DL) -...
- 6Citation
MetricsTotal Citations6
- Shubo Zhou
- research-article
GAN-Based Facial Attribute Manipulation
- Yunfan Liu
School of Electronic, Electrical, and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China
, - Qi Li
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Qiyao Deng
People's Public Security University of China, Beijing, China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Ming-Hsuan Yang
University of California at Merced, Merced, CA, USA
IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 45, Issue 12•Dec. 2023, pp 14590-14610 • https://doi.org/10.1109/TPAMI.2023.3298868Facial Attribute Manipulation (FAM) aims to aesthetically modify a given face image to render desired attributes, which has received significant attention due to its broad practical applications ranging from digital entertainment to biometric forensics. ...
- 5Citation
MetricsTotal Citations5
- Yunfan Liu
- research-article
Multiscale Dynamic Graph Representation for Biometric Recognition With Occlusions
- Min Ren
School of Artificial Intelligence, Beijing Normal University, Beijing, China
, - Yunlong Wang
Center for Research on Intelligent Perception and Computing, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Yuhao Zhu
Postgraduate Department, China Academy of Railway Sciences, Beijing, China
, - Kunbo Zhang
Center for Research on Intelligent Perception and Computing, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China
IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 45, Issue 12•Dec. 2023, pp 15120-15136 • https://doi.org/10.1109/TPAMI.2023.3298836Occlusion is a common problem with biometric recognition in the wild. The generalization ability of CNNs greatly decreases due to the adverse effects of various occlusions. To this end, we propose a novel unified framework integrating the merits of both ...
- 0Citation
MetricsTotal Citations0
- Min Ren
- research-articlePublished By ACMPublished By ACM
Color-Unrelated Head-Shoulder Networks for Fine-Grained Person Re-identification
- Boqiang Xu
University of Chinese Academy of Sciences, China
, - Jian Liang
CRIPAC & MAIS, Institute of Automation, Chinese Academy of Sciences, China
, - Lingxiao He
AI Research of JD, China
, - Jinlin Wu
MAIS, Institute of Automation, Chinese Academy of Sciences; Centre for Artificial Intelligence and Robotics, HKISI, CAS, China
, - Chao Fan
Chengdu Discaray Technology Co., Ltd., China
, - Zhenan Sun
CRIPAC & MAIS, Institute of Automation, Chinese Academy of Sciences, China
ACM Transactions on Multimedia Computing, Communications, and Applications, Volume 19, Issue 6•November 2023, Article No.: 210, pp 1-21 • https://doi.org/10.1145/3599730Person re-identification (re-id) attempts to match pedestrian images with the same identity across non-overlapping cameras. Existing methods usually study person re-id by learning discriminative features based on the clothing attributes (e.g., color, ...
- 9Citation
- 244
- Downloads
MetricsTotal Citations9Total Downloads244Last 12 Months102Last 6 weeks3
- Boqiang Xu
- research-articlePublished By ACMPublished By ACM
Dilated Convolution-based Feature Refinement Network for Crowd Localization
- Xingyu Gao
Institute of Microelectronics, Chinese Academy of Sciences, China
, - Jinyang Xie
School of Information Science and Engineering, Shandong Normal University, China
, - Zhenyu Chen
Big Data Center, State Grid Corporation of China, and China Electric Power Research Institute, China
, - An-An Liu
School of Electrical and Information Engineering, Tianjin University, China
, - Zhenan Sun
Institute of Automation, Chinese Academy of Sciences, and University of Chinese Academy of Sciences, China
, - Lei Lyu
School of Information Science and Engineering, Shandong Normal University, China
ACM Transactions on Multimedia Computing, Communications, and Applications, Volume 19, Issue 6•November 2023, Article No.: 217, pp 1-16 • https://doi.org/10.1145/3571134As an emerging computer vision task, crowd localization has received increasing attention due to its ability to produce more accurate spatially predictions. However, continuous scale variations in complex crowd scenes lead to tiny individuals at the edges,...
- 16Citation
- 480
- Downloads
MetricsTotal Citations16Total Downloads480Last 12 Months231Last 6 weeks5
- Xingyu Gao
- research-article
Semantic-based conditional generative adversarial hashing with pairwise labels
- Qi Li
State Key Laboratory of Multimodal Artificial Intelligence Systems
Institute of Automation, Chinese Academy of Sciences, 100190, Beijing, China
, - Weining Wang
The Laboratory of Cognition and Decision Intelligence for Complex Systems
Institute of Automation, Chinese Academy of Sciences, 100190, Beijing, China
, - Yuanyan Tang
Zhuhai UM Science and Technology Research Institute, FST University of Macau, Macau
, - Chengzhong Xu
State Key Laboratory of IoTSC, Department of Computer and Information Science, University of Macau, 999078, Macau SAR, China
, - Zhenan Sun
State Key Laboratory of Multimodal Artificial Intelligence Systems
School of Artificial Intelligence, University of Chinese Academy of Sciences
Institute of Automation, Chinese Academy of Sciences, 100190, Beijing, China
Highlights- A general two-stage cGANs framework is proposed to learn hash codes based on the pairwise label information.
- In the first stage, the conditional information is generated via a general Bayesian framework, which has several advantages ...
AbstractHashing has been widely exploited in recent years due to the rapid growth of image and video data on the web. Benefiting from recent advances in deep learning, deep hashing methods have achieved promising results with supervised information. ...
- 0Citation
MetricsTotal Citations0
- Qi Li
- research-article
Contextualized Relation Predictive Model for Self-Supervised Group Activity Representation Learning
- Wanting Zhou
Beijing University of Posts and Telecommunications, Beijing, China
, - Longteng Kong
Beijing University of Posts and Telecommunications, Beijing, China
, - Yushan Han
Beijing University of Posts and Telecommunications, Beijing, China
, - Jie Qin
Nanjing University of Aeronautics and Astronautics, Nanjing, China
, - Zhenan Sun
Institute of Automation, Chinese Academy of Sciences, Beijing, China
IEEE Transactions on Multimedia, Volume 26•2024, pp 353-366 • https://doi.org/10.1109/TMM.2023.3265280Group activity analysis has attracted remarkable attention recently due to the widespread applications in security, entertainment and military. This article targets at learning group activity representations with self-supervision, which differs from the ...
- 1Citation
MetricsTotal Citations1
- Wanting Zhou
- research-article
A Review on Generative Adversarial Networks: Algorithms, Theory, and Applications
- Jie Gui
School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, Chinese Academy of Sciences, Beijing, China
, - Yonggang Wen
School of Computer Science and Engineering, Nanyang Technological University, Singapore
, - Dacheng Tao
JD Explore Academy, China
, - Jieping Ye
Beike, Beijing, China
IEEE Transactions on Knowledge and Data Engineering, Volume 35, Issue 4•April 2023, pp 3313-3332 • https://doi.org/10.1109/TKDE.2021.3130191Generative adversarial networks (GANs) have recently become a hot research topic; however, they have been studied since 2014, and a large number of algorithms have been proposed. Nevertheless, few comprehensive studies explain the connections among ...
- 51Citation
MetricsTotal Citations51
- Jie Gui
- research-article
Towards Spatially Disentangled Manipulation of Face Images With Pre-Trained StyleGANs
- Yunfan Liu
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
, - Qi Li
National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Qiyao Deng
National Laboratory of Pattern Recognition, Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, Beijing, China
, - Zhenan Sun
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
IEEE Transactions on Circuits and Systems for Video Technology, Volume 33, Issue 4•April 2023, pp 1725-1739 • https://doi.org/10.1109/TCSVT.2022.3213662Generative Adversarial Networks with style-based generators could successfully synthesize realistic images from input latent code. Moreover, recent studies have revealed that interpretable translations of generated images could be obtained by linearly ...
- 5Citation
MetricsTotal Citations5
- Yunfan Liu
- research-article
Adversarial Learning Domain-Invariant Conditional Features for Robust Face Anti-spoofing
- Fangling Jiang
Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing, China
University of Chinese Academy of Sciences, Beijing, China
, - Qi Li
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems, CASIA, Beijing, China
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
, - Pengcheng Liu
Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing, China
University of Chinese Academy of Sciences, Beijing, China
, - Xiang-Dong Zhou
Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing, China
University of Chinese Academy of Sciences, Beijing, China
, - Zhenan Sun
Center for Research on Intelligent Perception and Computing, State Key Laboratory of Multimodal Artificial Intelligence Systems, CASIA, Beijing, China
School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China
International Journal of Computer Vision, Volume 131, Issue 7•Jul 2023, pp 1680-1703 • https://doi.org/10.1007/s11263-023-01778-xAbstractFace anti-spoofing has been widely exploited in recent years to ensure security in face recognition systems; however, this technology suffers from poor generalization performance on unseen samples. Most previous methods align the marginal ...
- 4Citation
MetricsTotal Citations4
- Fangling Jiang
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner