Search
Search Results
-
Bit Manipulation
This chapter explores bit manipulation including bit-wise logic, shifting, and rotation. -
StylePart: image-based shape part manipulation
Direct part-level manipulation of man-made shapes in an image is desired given its simplicity. However, it is not intuitive given the existing...
-
String Manipulation
In the Bourne shell, very little string manipulation was possible without resorting to external commands. Strings could be concatenated by... -
Image manipulation localization using reconstruction attention
With the development of image manipulation techniques and the widespread use of image editing tools, it is effortless to forge images without leaving...
-
Ethics of generative AI and manipulation: a design-oriented research agenda
Generative AI enables automated, effective manipulation at scale. Despite the growing general ethical discussion around generative AI, the specific...
-
Image splicing manipulation location by multi-scale dual-channel supervision
The swift growth of diverse editing software has resulted in image splicing manipulation becoming more complex, the discovery of a meticulously...
-
Multi-teacher Universal Distillation Based on Information Hiding for Defense Against Facial Manipulation
The rapid development of AI-based facial manipulation techniques has made manipulated facial images highly deceptive. These techniques can be misused...
-
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
Abstract —The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of...
-
DexHand: dexterous hand manipulation motion synthesis for virtual reality
Natural object manipulation is one of the important human skills. However, generating natural hand manipulation motions that are adaptive to object...
-
An effective framework based on hybrid learning and kernel principal component analysis for face manipulation detection
Face manipulation is the process of modifying facial features in videos or images to produce a variety of artistic or deceptive effects. Face...
-
ManiCLIP: Multi-attribute Face Manipulation from Text
In this paper we present a novel multi-attribute face manipulation method based on textual descriptions. Previous text-based image editing methods...
-
Shallowfake and deepfake image manipulation localization using noise and RGB-based dual branch method
The reliability of multimedia is being progressively tested by sophisticated Image Manipulation localization (IML) methods, which has led to the...
-
Human-Inspired Non-prehensile Manipulation Strategies: Design, Implementation, and Evaluation
Gras** of objects is not always feasible for robot manipulators, e.g., due to their geometric properties. Non-prehensile manipulation strategies...
-
Mass spring model for non-uniformed deformable linear object toward dexterous manipulation
Manipulation for deformable object is difficult in robotics. The deformation of the deformable object is not the same, despite the same manipulation....
-
Multi sentence description of complex manipulation action videos
Automatic video description necessitates generating natural language statements that encapsulate the actions, events, and objects within a video. An...
-
ROS-Enabled Collaborative Navigation and Manipulation with Heterogeneous Robots
One of the most difficult tasks for a mobile robot is navigation. Navigation and manipulation of heterogeneous robots are becoming more important in...
-
FP-Net: frequency-perception network with adversarial training for image manipulation localization
Mining the forged regions of digitally tampered images is one of the key research tasks for visual recognition. Although there are many algorithms...
-
Robot Manipulation Strategy for Explosives Disposal in Cluttered Scenes
Compared to human operator, robotic arm possesses the advantages of high accuracy and controllability in handling and manipulating hazardous... -
Synergy of Nanoparticles Photovoltaic Trap** and Manipulation from Suspension Layer on Ferroelectric Crystal Surface
We experimentally demonstrated that dielectrophoretic (DEP) forces of alternating photovoltaic fields generated near the surface of a photorefractive...
-
Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Recent works have demonstrated the great performance of forgery image forensics based on deep learning, but there is still a risk that detectors...