Chenhao Lin
Chenhao Lin
Verified email at - Homepage
Cited by
Cited by
Robustscanner: Dynamically enhancing positional clues for robust text recognition
X Yue, Z Kuang, C Lin, H Sun, W Zhang
European Conference on Computer Vision, 135-151, 2020
Sensemood: depression detection on social media
C Lin, P Hu, H Su, S Li, J Mei, J Zhou, H Leung
Proceedings of the 2020 international conference on multimedia retrieval …, 2020
Matching contactless and contact-based conventional fingerprint images for biometrics identification
C Lin, A Kumar
IEEE Transactions on Image Processing 27 (4), 2008-2021, 2018
Contactless and partial 3D fingerprint recognition using multi-view deep representation
C Lin, A Kumar
Pattern Recognition 83, 314-327, 2018
Object instance mining for weakly supervised object detection
C Lin, S Wang, D Xu, Y Lu, W Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 11482 …, 2020
A CNN-based framework for comparison of contactless to contact-based fingerprints
C Lin, A Kumar
IEEE Transactions on Information Forensics and Security 14 (3), 662-676, 2018
Tetrahedron based fast 3D fingerprint identification using colored LEDs illumination
C Lin, A Kumar
IEEE transactions on pattern analysis and machine intelligence 40 (12), 3022 …, 2017
A unified framework for analyzing and detecting malicious examples of dnn models
K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu
arXiv preprint arXiv:2006.14871 8 (9), 2020
Spatial dual-modality graph reasoning for key information extraction
H Sun, Z Kuang, X Yue, C Lin, W Zhang
arXiv preprint arXiv:2103.14470, 2021
Multi-siamese networks to accurately match contactless to contact-based fingerprint images
C Lin, A Kumar
2017 IEEE International Joint Conference on Biometrics (IJCB), 277-285, 2017
Improving cross sensor interoperability for fingerprint identification
C Lin, A Kumar
2016 23rd International Conference on Pattern Recognition (ICPR), 943-948, 2016
Interpreting adversarial examples in deep learning: A review
S Han, C Lin, C Shen, Q Wang, X Guan
ACM Computing Surveys 55 (14s), 1-38, 2023
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
J Tian, C Shen, B Wang, X Xia, M Zhang, C Lin, Q Li
IEEE Transactions on Dependable and Secure Computing, 2024
Free fine-tuning: A plug-and-play watermarking scheme for deep neural networks
R Wang, J Ren, B Li, T She, W Zhang, L Fang, J Chen, L Wang
Proceedings of the 31st ACM International Conference on Multimedia, 8463-8474, 2023
Bluememo: depression analysis through twitter posts
P Hu, C Lin, H Su, S Li, X Han, Y Zhang, J Mei
Proceedings of the Twenty-Ninth International Conference on International …, 2021
Crossbehaauth: Cross-scenario behavioral biometrics authentication using keystroke dynamics
C Lin, J He, C Shen, Q Li, Q Wang
IEEE Transactions on Dependable and Secure Computing, 2022
ELLG: explainable lesion learning and generation for diabetic retinopathy detection
C Lin, J Zhu, C Shen, P Hu, Q Wang
International Joint Conferences on Artificial Intelligence Workshop on …, 2020
Sensitive region-aware black-box adversarial attacks
C Lin, S Han, J Zhu, Q Li, C Shen, Y Zhang, X Guan
Information Sciences 637, 118929, 2023
Rethinking adversarial examples exploiting frequency-based analysis
S Han, C Lin, C Shen, Q Wang
Information and Communications Security: 23rd International Conference …, 2021
Towards benchmarking and evaluating deepfake detection
J Deng, C Lin, P Hu, C Shen, Q Wang, Q Li, Q Li
IEEE Transactions on Dependable and Secure Computing, 2024
The system can't perform the operation now. Try again later.
Articles 1–20