Robustscanner: Dynamically enhancing positional clues for robust text recognition X Yue, Z Kuang, C Lin, H Sun, W Zhang European Conference on Computer Vision, 135-151, 2020 | 217 | 2020 |
Sensemood: depression detection on social media C Lin, P Hu, H Su, S Li, J Mei, J Zhou, H Leung Proceedings of the 2020 international conference on multimedia retrieval …, 2020 | 173 | 2020 |
Matching contactless and contact-based conventional fingerprint images for biometrics identification C Lin, A Kumar IEEE Transactions on Image Processing 27 (4), 2008-2021, 2018 | 144 | 2018 |
Contactless and partial 3D fingerprint recognition using multi-view deep representation C Lin, A Kumar Pattern Recognition 83, 314-327, 2018 | 100 | 2018 |
A CNN-based framework for comparison of contactless to contact-based fingerprints C Lin, A Kumar IEEE Transactions on Information Forensics and Security 14 (3), 662-676, 2018 | 93 | 2018 |
Object instance mining for weakly supervised object detection C Lin, S Wang, D Xu, Y Lu, W Zhang Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 11482 …, 2020 | 91 | 2020 |
Interpreting adversarial examples in deep learning: A review S Han, C Lin, C Shen, Q Wang, X Guan ACM Computing Surveys 55 (14s), 1-38, 2023 | 60 | 2023 |
Tetrahedron based fast 3D fingerprint identification using colored LEDs illumination C Lin, A Kumar IEEE transactions on pattern analysis and machine intelligence 40 (12), 3022 …, 2017 | 44 | 2017 |
Spatial dual-modality graph reasoning for key information extraction H Sun, Z Kuang, X Yue, C Lin, W Zhang arXiv preprint arXiv:2103.14470, 2021 | 40 | 2021 |
A unified framework for analyzing and detecting malicious examples of dnn models K Jin, T Zhang, C Shen, Y Chen, M Fan, C Lin, T Liu CoRR, 2020 | 39* | 2020 |
LESSON: Multi-label adversarial false data injection attack for deep learning locational detection J Tian, C Shen, B Wang, X Xia, M Zhang, C Lin, Q Li IEEE Transactions on Dependable and Secure Computing, 2024 | 37 | 2024 |
Multi-siamese networks to accurately match contactless to contact-based fingerprint images C Lin, A Kumar 2017 IEEE International Joint Conference on Biometrics (IJCB), 277-285, 2017 | 28 | 2017 |
Improving cross sensor interoperability for fingerprint identification C Lin, A Kumar 2016 23rd International Conference on Pattern Recognition (ICPR), 943-948, 2016 | 22 | 2016 |
Free fine-tuning: A plug-and-play watermarking scheme for deep neural networks R Wang, J Ren, B Li, T She, W Zhang, L Fang, J Chen, L Wang Proceedings of the 31st ACM International Conference on Multimedia, 8463-8474, 2023 | 17 | 2023 |
Bluememo: depression analysis through twitter posts P Hu, C Lin, H Su, S Li, X Han, Y Zhang, J Mei Proceedings of the Twenty-Ninth International Conference on International …, 2021 | 14 | 2021 |
Physical 3D adversarial attacks against monocular depth estimation in autonomous driving J Zheng, C Lin, J Sun, Z Zhao, Q Li, C Shen Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | 13 | 2024 |
Towards benchmarking and evaluating deepfake detection J Deng, C Lin, P Hu, C Shen, Q Wang, Q Li, Q Li IEEE Transactions on Dependable and Secure Computing, 2024 | 11 | 2024 |
Crossbehaauth: Cross-scenario behavioral biometrics authentication using keystroke dynamics C Lin, J He, C Shen, Q Li, Q Wang IEEE Transactions on Dependable and Secure Computing 20 (3), 2314-2327, 2022 | 11 | 2022 |
Quantization aware attack: Enhancing transferable adversarial attacks by model quantization Y Yang, C Lin, Q Li, Z Zhao, H Fan, D Zhou, N Wang, T Liu, C Shen IEEE Transactions on Information Forensics and Security, 2024 | 10 | 2024 |
{KENKU}: Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems X Wu, S Ma, C Shen, C Lin, Q Wang, Q Li, Y Rao 32nd USENIX Security Symposium (USENIX Security 23), 247-264, 2023 | 10 | 2023 |