default search action
Junhao Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen:
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges. ACM Comput. Surv. 57(3): 79:1-79:38 (2025) - 2024
- [j5]Junhao Dong, Zhu Meng, Delong Liu, Jiaxuan Liu, Zhicheng Zhao, Fei Su:
Boundary-refined prototype generation: A general end-to-end paradigm for semi-supervised semantic segmentation. Eng. Appl. Artif. Intell. 137: 109021 (2024) - [j4]Zhu Meng, Junhao Dong, Binyu Zhang, Shichao Li, Ruixiao Wu, Fei Su, Guangxi Wang, Limei Guo, Zhicheng Zhao:
NuSEA: Nuclei Segmentation With Ellipse Annotations. IEEE J. Biomed. Health Informatics 28(10): 5996-6007 (2024) - [c14]Junhao Dong, Piotr Koniusz, Junxi Chen, Z. Jane Wang, Yew-Soon Ong:
Robust Distillation via Untargeted and Targeted Intermediate Adversarial Samples. CVPR 2024: 28432-28442 - [c13]Junhao Dong, Piotr Koniusz, Junxi Chen, Xiaohua Xie, Yew-Soon Ong:
Adversarially Robust Few-shot Learning via Parameter Co-distillation of Similarity and Class Concept Learners. CVPR 2024: 28535-28544 - [c12]Zhongliang Guo, Junhao Dong, Yifei Qian, Kaixuan Wang, Weiye Li, Ziheng Guo, Yuheng Wang, Yanli Li, Ognjen Arandjelovic, Lei Fang:
Artwork Protection Against Neural Style Transfer Using Locally Adaptive Adversarial Color Attack. ECAI 2024: 1414-1421 - [c11]Junhao Dong, Piotr Koniusz, Junxi Chen, Yew-Soon Ong:
Adversarially Robust Distillation by Reducing the Student-Teacher Variance Gap. ECCV (4) 2024: 92-111 - [c10]Haodong Chen, Haojian Huang, Junhao Dong, Mingzhe Zheng, Dian Shao:
FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs. ACM Multimedia 2024: 2301-2310 - [i10]Junxi Chen, Junhao Dong, Xiaohua Xie:
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability. CoRR abs/2401.07087 (2024) - [i9]Haodong Chen, Haojian Huang, Junhao Dong, Mingzhe Zheng, Dian Shao:
FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs. CoRR abs/2407.02157 (2024) - [i8]Zhongliang Guo, Lei Fang, Jingyu Lin, Yifei Qian, Shuai Zhao, Zeyu Wang, Junhao Dong, Cunjian Chen, Ognjen Arandjelovic, Chun Pong Lau:
A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse. CoRR abs/2408.10901 (2024) - 2023
- [j3]Junhao Dong, Yuan Wang, Jianhuang Lai, Xiaohua Xie:
Restricted Black-Box Adversarial Attack Against DeepFake Face Swapping. IEEE Trans. Inf. Forensics Secur. 18: 2596-2608 (2023) - [j2]Junhao Dong, Lingxiao Yang, Yuan Wang, Xiaohua Xie, Jianhuang Lai:
Toward Intrinsic Adversarial Robustness Through Probabilistic Training. IEEE Trans. Image Process. 32: 3862-3872 (2023) - [c9]Junhao Dong, Seyed-Mohsen Moosavi-Dezfooli, Jianhuang Lai, Xiaohua Xie:
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training. CVPR 2023: 24678-24687 - [c8]Zheng Li, Weibo Cai, Junhao Dong, Jianhuang Lai, Xiaohua Xie:
Feature Disentanglement and Adaptive Fusion for Improving Multi-modal Tracking. PRCV (12) 2023: 68-80 - [c7]Weibo Cai, Zheng Li, Junhao Dong, Jianhuang Lai, Xiaohua Xie:
Modality Balancing Mechanism for RGB-Infrared Object Detection in Aerial Image. PRCV (12) 2023: 81-93 - [i7]Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen:
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications. CoRR abs/2303.14133 (2023) - [i6]Junxi Chen, Junhao Dong, Xiaohua Xie:
Releasing Inequality Phenomena in L∞-Adversarial Training via Input Gradient Distillation. CoRR abs/2305.09305 (2023) - [i5]Junhao Dong, Zhu Meng, Delong Liu, Zhicheng Zhao, Fei Su:
Boundary-Refined Prototype Generation: A General End-to-End Paradigm for Semi-Supervised Semantic Segmentation. CoRR abs/2307.10097 (2023) - [i4]Zhu Meng, Junhao Dong, Limei Guo, Fei Su, Guangxi Wang, Zhicheng Zhao:
Now and Future of Artificial Intelligence-based Signet Ring Cell Diagnosis: A Survey. CoRR abs/2311.10118 (2023) - 2022
- [c6]Junhao Dong, Yuan Wang, Jianhuang Lai, Xiaohua Xie:
Improving Adversarially Robust Few-shot Image Classification with Generalizable Representations. CVPR 2022: 9015-9024 - [c5]Yuan Wang, Quan Zhang, Jianhuang Lai, Xiaohua Xie, Junhao Dong:
Learning Bi-directional Feature Propagation with Latent Layout Modeling for Group Re-identification. ICPR 2022: 907-913 - [c4]Binyu Zhang, Junhao Dong, Zhicheng Zhao, Zhu Meng, Fei Su:
MT2: Multi-task Mean Teacher for Semi-Supervised Cell Segmentation. Cell Segmentation Challenge @ NeurIPS 2022: 1-13 - [i3]Yunhao Du, Junfeng Wan, Yanyun Zhao, Binyu Zhang, Zhihang Tong, Junhao Dong:
GIAOTracker: A comprehensive framework for MCMOT with global information and optimizing strategies in VisDrone 2021. CoRR abs/2202.11983 (2022) - [i2]Junhao Dong, Yuan Wang, Jianhuang Lai, Xiaohua Xie:
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping. CoRR abs/2204.12347 (2022) - [i1]Junhao Dong, Seyed-Mohsen Moosavi-Dezfooli, Jianhuang Lai, Xiaohua Xie:
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training. CoRR abs/2211.00525 (2022) - 2021
- [c3]Kaiheng Dang, Jianhuang Lai, Junhao Dong, Xiaohua Xie:
Adversarial Training Inspired Self-attention Flow for Universal Image Style Transfer. ACPR (2) 2021: 476-489 - [c2]Yunhao Du, Junfeng Wan, Yanyun Zhao, Binyu Zhang, Zhihang Tong, Junhao Dong:
GIAOTracker: A comprehensive framework for MCMOT with global information and optimizing strategies in VisDrone 2021. ICCVW 2021: 2809-2819 - [c1]Junhao Dong, Xiaohua Xie:
Visually Maintained Image Disturbance Against Deepfake Face Swapping. ICME 2021: 1-6 - 2020
- [j1]Junhao Dong, Bo Xiao, Bo Ding, Haoyu Wang:
GT-GAN: A General Transductive Zero-Shot Learning Method Based on GAN. IEEE Access 8: 147173-147184 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-09 23:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint