Liwen Wu

ORCID: 0000-0002-4959-444X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Machine Learning in Bioinformatics
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Image Fusion Techniques
  • Service-Oriented Architecture and Web Services
  • Remote-Sensing Image Classification
  • Advanced Computational Techniques and Applications
  • RNA and protein synthesis mechanisms
  • Text and Document Classification Technologies
  • Geophysical Methods and Applications
  • Advanced Steganography and Watermarking Techniques
  • Genomics and Phylogenetic Studies
  • Statistical Methods in Clinical Trials
  • Heat Transfer and Optimization
  • Biometric Identification and Security
  • Computational Drug Discovery Methods
  • Health Systems, Economic Evaluations, Quality of Life
  • Supply Chain and Inventory Management
  • Image and Signal Denoising Methods
  • Imbalanced Data Classification Techniques
  • Tensor decomposition and applications
  • Spam and Phishing Detection
  • Recycling and utilization of industrial and municipal waste in materials production

Takeda (United States)
2025

Yunnan University
2018-2024

Takeda (Japan)
2024

Tianjin University
2023

North China University of Technology
2022

Dalian University of Technology
2005-2011

National University of Tainan
2011

Southwestern Institute of Physics
1991

In order to solve the problems of long artificial time consumption, inability standardize degree damage, and difficulty maintaining data in traditional tunnel disease detection methods, this paper proposes use Residual Network (ResNet) models for water leakage crack detection. ResNet a residual learning framework ease training networks that are deeper than those previously used. Furthermore, explicitly reformulates layers as functions reference layer inputs, rather unreferenced functions....

10.3390/w14091462 article EN Water 2022-05-03

Remote sensing image fusion (RSIF) can generate an integrated with high spatial and spectral resolution. The fused remote is conducive to applications including disaster monitoring, ecological environment investigation, dynamic monitoring. However, most existing deep learning based RSIF methods require ground truths (or reference images) train a model, the acquisition of difficult problem. To address this, we propose semisupervised method on multiscale conditional generative adversarial...

10.1109/jstars.2021.3090958 article EN cc-by IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2021-01-01

The widespread dissemination of high-fidelity fake faces created by face forgery techniques has caused serious trust concerns and ethical issues in modern society. Consequently, detection emerged as a prominent topic research to prevent technology abuse. Although, most existing detectors demonstrate success when evaluating high-quality under intra-dataset scenarios, they often overfit manipulation-specific artifacts lack robustness postprocessing operations. In this work, we design an...

10.1049/2024/6523854 article EN cc-by IET Biometrics 2024-02-05

Abstract Image hiding is a task that hides secret images into cover images. The purposes of image are to ensure the invisible human and can be recovered. current state‐of‐the‐art steganography methods run risk information leakage. A safe network (SIHNet) presented reduce leakage information. Based on some phenomena which use invertible neural network, reversible processing (SIP) module proposed make suitable for stego leak less Besides, lost (LIH) used hide images, thus method recover better...

10.1049/ipr2.13138 article EN cc-by IET Image Processing 2024-06-14

For Fangshan granite in Beijing, the static compression and dynamic tests have been carried out separately under natural air drying water saturation. It was found that compressive strength of water-saturated is higher than air-dried granite, which contrary to result rock lower load. Furthermore, medium strain rate condition, when 85 s−1, could be increased by nearly 0.5 times compared with its state. The 1–2 strength, shows has stronger sensitivity granite. Meanwhile, impact loading, from...

10.3390/w14020216 article EN Water 2022-01-12

Abstract Deep neural networks are widely adopted powerful tools for perceptual tasks. However, recent research indicated that they easily fooled by adversarial examples, which produced adding imperceptible perturbations to clean examples. Here the steganalysis rich model (SRM) is utilized generate noise feature maps, and combined with RGB images discover difference between examples In particular, a two‐stream pseudo‐siamese network fuses subtle in inconsistency features proposed. The...

10.1049/ipr2.12354 article EN cc-by-nc-nd IET Image Processing 2021-10-08

Identifying the subcellular localization of a given protein is an essential part biological and medical research, since must be localized in correct organelle to ensure physiological function. Conventional experiments for have some limitations, such as high cost low efficiency, thus massive computational methods are proposed solve these problems. However, need improved further with class imbalance problem. We propose new model, generating minority samples (Gm-PLoc), predict multi-label...

10.3389/fgene.2022.912614 article EN cc-by Frontiers in Genetics 2022-06-15

With the popularity of posting memes on social platforms, severe negative impact hateful is growing. As existing detection models have lower accuracy than humans, still a challenge to statistical learning and artificial intelligence. This paper proposed multi-task method consisting primary multimodal task two unimodal auxiliary tasks address this issue. We introduced self-supervised generation strategy in generate labels automatically. Meanwhile, we used BERT RESNET as backbone for text...

10.3390/math10234525 article EN cc-by Mathematics 2022-11-30

Combining the traditional enterprise performance measurement method with nature and characteristics of integrated supply chain, this research determines scope contents chain system. In line individual theory, systems should reflect strategy chain. At same time, it be able to check efficiency strategy. According layer upon strategic objects five key aspects (finance, business processes, customer, environment, core ability) are found. These fields significant for formation improvement

10.1109/icsssm.2005.1499441 article EN 2005-01-01

With increasing prevalence of global virtual teams (GVTs), GVTs effectiveness draws much attention from both academia and industries. Communication is widely acknowledged as a significant element to improve the source many problems in GVTs, but there no systematic model about it. In this paper, conceptual proposed direct communication management CVTs. model, team characteristics are considered independent variables, including degree virtuality diversity. addition, factors influencing...

10.1109/soli.2008.4686464 article EN 2006 IEEE International Conference on Service Operations and Logistics, and Informatics 2008-10-01

In recent years, tensor-based machine learning methods, in which the Support Tensor Machine (STM) is a typical technology, have gradually attracted attention of researchers. Compared with Vector (SVM), STM has superior generalization ability that can make full use structural information data. However, it still faces many challenges due to imperfection its theoretical basis and model. order study further development STM, this paper provides survey about potential existing problems STM.

10.1109/sera.2018.8477228 article EN 2018-06-01

Abstract Arbitrary style transfer aims to stylize the content image with image. The key problem of is how balance global structure and local patterns. A promising method solve this attentional method, where a learnable embedding features enables patterns be flexibly recombined image, so will well preserved in stylized However, current methods cannot preserve structure. To problem, novel network proposed, that relies on Optimal Transport (OT) for computing attention map. proposed OT‐based...

10.1049/ipr2.12403 article EN cc-by-nc IET Image Processing 2022-03-15

Adversarial examples have the property of transferring across models, which has created a great threat for deep learning models. To reveal shortcomings in existing method ensemble been introduced to generating transferable adversarial examples. However, most model attacks directly combine different models’ output but ignore large differences optimization direction them, severely limits transfer attack ability. In this work, we propose new kind called stochastic average attack. Unlike...

10.1049/2024/7983842 article EN cc-by IET Information Security 2024-05-11

Due to the increasing sophistication of face forgery techniques, images generated are becoming more and realistic difficult for human eyes distinguish. These techniques can cause problems such as fraud social engineering attacks in facial recognition identity verification areas. Therefore, researchers have worked on detection studies made significant progress. Current algorithms achieve high accuracy within-dataset. However, it is satisfactory generalization performance cross-dataset...

10.1007/s40747-024-01634-6 article EN cc-by-nc-nd Complex & Intelligent Systems 2024-11-09
Coming Soon ...