Follow
Chenqi KONG
Title
Cited by
Cited by
Year
Detect and locate: Exposing face manipulation by semantic-and noise-level telltales
C Kong, B Chen, H Li, S Wang, A Rocha, S Kwong
IEEE Transactions on Information Forensics and Security 17, 1741-1756, 2022
412022
Rethinking Attention-Model Explainability through Faithfulness Violation Test
Y Liu, H Li, Y Guo, C Kong, J Li, S Wang
International Conference on Machine Learning, 2022
322022
Appearance matters, so does audio: Revealing the hidden face via cross-modality transfer
C Kong, B Chen, W Yang, H Li, P Chen, S Wang
IEEE Transactions on Circuits and Systems for Video Technology 32 (1), 423-436, 2021
292021
Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones
C Kong, K Zheng, S Wang, A Rocha, H Li
IEEE Transactions on Information Forensics and Security 17, 3238-3253, 2022
182022
Digital and physical face attacks: Reviewing and one step further
C Kong, S Wang, H Li
APSIPA Transactions on Signal and Information Processing 12 (1), 2022
152022
No-Reference Image Quality Assessment by Hallucinating Pristine Features
B Chen, L Zhu, C Kong, H Zhu, S Wang, Z Li
IEEE Transactions on Image Processing, 2022
122022
Faster super-resolution imaging with auto-correlation two-step deconvolution
W Zhao, J Liu, C Kong, Y Zhao, C Guo, C Liu, X Ding, X Ding, J Tan, H Li
arXiv preprint arXiv:1809.07410, 2018
122018
Beyond the prior forgery knowledge: Mining critical clues for general face forgery detection
A Luo, C Kong, J Huang, Y Hu, X Kang, AC Kot
IEEE Transactions on Information Forensics and Security 19, 1168-1182, 2023
102023
M FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System
C Kong, K Zheng, Y Liu, S Wang, A Rocha, H Li
IEEE Transactions on Dependable and Secure Computing, 2024
72024
Enhancing general face forgery detection via vision transformer with low-rank adaptation
C Kong, H Li, S Wang
2023 IEEE 6th International Conference on Multimedia Information Processing …, 2023
62023
Accurate aberration correction in confocal microscopy based on modal sensorless method
J Liu, W Zhao, C Liu, C Kong, Y Zhao, X Ding, J Tan
Review of Scientific Instruments 90 (5), 2019
42019
Two-branch multi-scale deep neural network for generalized document recapture attack detection
J Li, C Kong, S Wang, H Li
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
32023
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens
R Cai, Z Yu, C Kong, H Li, C Chen, Y Hu, A Kot
arXiv preprint arXiv:2309.04038, 2023
22023
Pixel-inconsistency modeling for image manipulation localization
C Kong, A Luo, S Wang, H Li, A Rocha, AC Kot
arXiv preprint arXiv:2310.00234, 2023
12023
Forgery-aware adaptive vision transformer for face forgery detection
A Luo, R Cai, C Kong, X Kang, J Huang, AC Kot
arXiv preprint arXiv:2309.11092, 2023
12023
MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection
C Kong, A Luo, S Xia, Y Yu, H Li, AC Kot
arXiv preprint arXiv:2404.08452, 2024
2024
Echo-FAS: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones
K Chenqi, LI Haoliang, W Shiqi, K ZHENG
2022
一種圖像真僞識別模型訓練方法, 應用方法和裝置
C Baoliang, K Chenqi, LI Haoliang, W Shiqi
2022
Artifact-free, penetration-adjustable elliptical-mirror-based TIRF microscopy
J Liu, C Kong, Q Li, W Zhao, M Li, S Gao, C Liu, J Tan
Optics Express 26 (20), 26065-26079, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–19