default search action
Chenqi Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li:
M$^{3}$3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System. IEEE Trans. Dependable Secur. Comput. 21(6): 5650-5666 (2024) - [j6]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 1168-1182 (2024) - [j5]Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, Alex C. Kot:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. IEEE Trans. Inf. Forensics Secur. 19: 8385-8397 (2024) - [i14]Chenqi Kong, Anwei Luo, Song Xia, Yi Yu, Haoliang Li, Alex C. Kot:
MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection. CoRR abs/2404.08452 (2024) - [i13]Hui Liu, Wenya Wang, Hao Sun, Chris Xing Tian, Chenqi Kong, Xin Dong, Haoliang Li:
Unraveling the Mechanics of Learning-Based Demonstration Selection for In-Context Learning. CoRR abs/2406.11890 (2024) - [i12]Chenqi Kong, Anwei Luo, Peijun Bao, Haoliang Li, Renjie Wan, Zengwei Zheng, Anderson Rocha, Alex C. Kot:
Open-Set Deepfake Detection: A Parameter-Efficient Adaptation Method with Forgery Style Mixture. CoRR abs/2408.12791 (2024) - 2023
- [c3]Jiaxing Li, Chenqi Kong, Shiqi Wang, Haoliang Li:
Two-Branch Multi-Scale Deep Neural Network for Generalized Document Recapture Attack Detection. ICASSP 2023: 1-5 - [c2]Chenqi Kong, Haoliang Li, Shiqi Wang:
Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation. MIPR 2023: 102-107 - [i11]Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li:
M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System. CoRR abs/2301.12831 (2023) - [i10]Chenqi Kong, Haoliang Li, Shiqi Wang:
Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation. CoRR abs/2303.00917 (2023) - [i9]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. CoRR abs/2304.12489 (2023) - [i8]Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, Alex C. Kot:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens. CoRR abs/2309.04038 (2023) - [i7]Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot:
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. CoRR abs/2309.11092 (2023) - [i6]Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, Alex C. Kot:
Pixel-Inconsistency Modeling for Image Manipulation Localization. CoRR abs/2310.00234 (2023) - 2022
- [j4]Chenqi Kong, Baoliang Chen, Wenhan Yang, Haoliang Li, Peilin Chen, Shiqi Wang:
Appearance Matters, So Does Audio: Revealing the Hidden Face via Cross-Modality Transfer. IEEE Trans. Circuits Syst. Video Technol. 32(1): 423-436 (2022) - [j3]Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong:
Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. IEEE Trans. Inf. Forensics Secur. 17: 1741-1756 (2022) - [j2]Chenqi Kong, Kexin Zheng, Shiqi Wang, Anderson Rocha, Haoliang Li:
Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. IEEE Trans. Inf. Forensics Secur. 17: 3238-3253 (2022) - [j1]Baoliang Chen, Lingyu Zhu, Chenqi Kong, Hanwei Zhu, Shiqi Wang, Zhu Li:
No-Reference Image Quality Assessment by Hallucinating Pristine Features. IEEE Trans. Image Process. 31: 6139-6151 (2022) - [c1]Yibing Liu, Haoliang Li, Yangyang Guo, Chenqi Kong, Jing Li, Shiqi Wang:
Rethinking Attention-Model Explainability through Faithfulness Violation Test. ICML 2022: 13807-13824 - [i5]Yibing Liu, Haoliang Li, Yangyang Guo, Chenqi Kong, Jing Li, Shiqi Wang:
Rethinking Attention-Model Explainability through Faithfulness Violation Test. CoRR abs/2201.12114 (2022) - [i4]Chenqi Kong, Shiqi Wang, Haoliang Li:
Digital and Physical Face Attacks: Reviewing and One Step Further. CoRR abs/2209.14692 (2022) - [i3]Jiaxing Li, Chenqi Kong, Shiqi Wang, Haoliang Li:
Two-branch Multi-scale Deep Neural Network for Generalized Document Recapture Attack Detection. CoRR abs/2211.16786 (2022) - 2021
- [i2]Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong:
Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision. CoRR abs/2107.05821 (2021) - [i1]Baoliang Chen, Lingyu Zhu, Chenqi Kong, Hanwei Zhu, Shiqi Wang, Zhu Li:
No-Reference Image Quality Assessment by Hallucinating Pristine Features. CoRR abs/2108.04165 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint