Trung-Nghia Le

ORCID: 0000-0002-7363-2610
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Image and Video Retrieval Techniques
  • Visual Attention and Saliency Detection
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Neural Network Applications
  • Adversarial Robustness in Machine Learning
  • Face recognition and analysis
  • Video Surveillance and Tracking Methods
  • Digital Media Forensic Detection
  • Multimodal Machine Learning Applications
  • Human Pose and Action Recognition
  • Video Analysis and Summarization
  • Image Enhancement Techniques
  • Anomaly Detection Techniques and Applications
  • Face and Expression Recognition
  • AI in cancer detection
  • Image Retrieval and Classification Techniques
  • Forensic and Genetic Research
  • Image and Video Quality Assessment
  • Advanced Vision and Imaging
  • Robotics and Sensor-Based Localization
  • Augmented Reality Applications
  • Music and Audio Processing
  • Domain Adaptation and Few-Shot Learning
  • 3D Shape Modeling and Analysis
  • Industrial Vision Systems and Defect Detection

Ho Chi Minh City University of Science
2012-2025

Vietnam National University Ho Chi Minh City
2012-2024

National Institute of Informatics
2020-2024

The University of Tokyo
2002-2023

The Graduate University for Advanced Studies, SOKENDAI
2016-2019

National Graduate Institute for Policy Studies
2019

Korea University
2010

Moi University
2009

Purdue University West Lafayette
2009

Regenstrief Institute
2009

Camouflaged objects are generally difficult to be detected in their natural environment even for human beings. In this paper, we propose a novel bio-inspired network, named the MirrorNet, that leverages both instance segmentation and mirror stream camouflaged object segmentation. Differently from existing networks segmentation, our proposed network possesses two streams: main corresponding with original image its flipped image, respectively. The output is then fused into stream's result...

10.1109/access.2021.3064443 article EN IEEE Access 2021-01-01

This paper presents a method for detecting salient objects in videos, where temporal information addition to spatial is fully taken into account. Following recent reports on the advantage of deep features over conventional handcrafted features, we propose new set spatiotemporal (STD) that utilize local and global contexts frames. We also conditional random field (STCRF) compute saliency from STD features. STCRF our extension CRF domain describes relationships among neighboring regions both...

10.1109/tip.2018.2849860 article EN IEEE Transactions on Image Processing 2018-06-22

The proliferation of deepfake media is raising concerns among the public and relevant authorities. It has become essential to develop countermeasures against forged faces in social media. This paper presents a comprehensive study on two new countermeasure tasks: multi-face forgery detection segmentation in-the-wild. Localizing multiple human unrestricted natural scenes far more challenging than traditional recognition task. To promote these tasks, we have created first large-scale dataset...

10.1109/iccv48922.2021.00996 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

Deep neural networks are vulnerable to adversarial examples (AEs), which have transferability: AEs generated for the source model can mislead another (target) model's predictions. However, transferability has not been understood in terms of class target predictions were misled (i.e., class-aware transferability). In this paper, we differentiate cases a predicts same wrong as ("same mistake") or different ("different analyze and provide an explanation mechanism. We find that (1) tend cause...

10.1109/wacv56688.2023.00141 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2023-01-01

This paper pushes the envelope on decomposing camouflaged regions in an image into meaningful components, namely, instances. To promote new task of instance segmentation in-the-wild images, we introduce a dataset, dubbed CAMO++, that extends our preliminary CAMO dataset (camouflaged object segmentation) terms quantity and diversity. The substantially increases number images with hierarchical pixel-wise ground truths. We also provide benchmark suite for segmentation. In particular, present...

10.1109/tip.2021.3130490 article EN publisher-specific-oa IEEE Transactions on Image Processing 2021-12-02

The reliability of remote identity-proofing systems (i.e., electronic Know Your Customer, or eKYC, systems) is challenged by the development deepfake generation tools, which can be used to create fake videos that are difficult detect using existing detection models and indistinguishable facial recognition systems. This poses a serious threat eKYC danger individuals' personal information property. Existing datasets not particularly appropriate for developing evaluating systems, require...

10.1109/access.2024.3369187 article EN cc-by-nc-nd IEEE Access 2024-01-01

10.1109/wacv61041.2025.00338 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

Few-shot instance segmentation extends the few-shot learning paradigm to task, which tries segment objects from a query image with few annotated examples of novel categories. Conventional approaches have attempted address task via prototype learning, known as point estimation. However, this mechanism depends on prototypes (e.g. mean K-shot) for prediction, leading performance instability. To overcome disadvantage estimation mechanism, we propose approach, dubbed MaskDiff, models underlying...

10.1609/aaai.v38i3.28068 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

This paper addresses accident detection where we not only detect objects with classes, but also recognize their characteristic properties. More specifically, aim at simultaneously detecting object class bounding boxes on roads and recognizing status such as safe, dangerous, or crashed. To achieve this goal, construct a new dataset propose baseline method for benchmarking the task of detection. We design an network, called Attention R-CNN, which consists two streams: one is classes property...

10.1109/iv47402.2020.9304730 article EN 2022 IEEE Intelligent Vehicles Symposium (IV) 2020-10-19

The regularising parameter of the energy function in graph-cut based image segmentation methods should be carefully determined since it strongly affects result. Presented is a modified technique using novel without for segmentation. In addition, mixture colour model employed to apply proposed effectively. Experimental results show that method outperforms conventional algorithm terms accuracy and ease use.

10.1049/el.2010.1692 article EN Electronics Letters 2010-08-05

The fashion e-commerce industry has witnessed significant growth in recent years, prompting exploring image-based virtual try-on techniques to incorporate Augmented Reality (AR) experiences into online shopping platforms. However, existing research primarily overlooked a crucial aspect - the runtime of underlying machine-learning model. While methods prioritize enhancing output quality, they often disregard execution time, which restricts their applications on limited range devices. To...

10.1109/ismar-adjunct60411.2023.00149 article EN 2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct) 2023-10-16

A model compound of Tyr244-His240 bovine cytochrome c oxidase was synthesized and examined with UV resonance Raman (UVRR) as well absorption spectroscopy pH titration. Owing to the covalent linkage between imidazole phenol, pKa phenolic OH imidazolic NδH groups were lowered by 1.1 2.3, respectively. UVRR measurements ortho-imidazole-bound para-cresol (Im⧫CrOH), its deprotonated anion (Im⧫CrO-), neutral radical (Im⧫CrO•), their perdeuterated, cresol 18O derivatives allowed assignments bands...

10.1021/jp012492n article EN The Journal of Physical Chemistry A 2002-01-24

Amount and variety of training data drastically affect the performance CNNs. Thus, annotation methods are becoming more critical to collect efficiently. In this paper, we propose a simple yet efficient Interactive Self-Annotation framework cut down both time human labor cost for video object bounding box annotation. Our method is based on recurrent self-supervised learning consists two processes: automatic process interactive process, where aims build supported detector speed up process....

10.1109/wacv45572.2020.9093398 article EN 2020-03-01

Traffic flow analysis is essential for intelligent transportation systems. In this paper, we introduce our Intelligent Analysis Software Kit (iTASK) to tackle three challenging problems: vehicle counting, re-identification, and abnormal event detection. For the first problem, propose real-time track vehicles moving along desired direction in corresponding motion-of-interests (MOIs). second consider each as a document with multiple semantic words (i.e., attributes) transform given problem...

10.1109/cvprw50498.2020.00314 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2020-06-01

This paper presents the first adversarial example based method for attacking human instance segmentation networks, namely person networks in short, which are harder to fool than classification networks. We propose a novel Fashion-Guided Adversarial Attack (FashionAdv) framework automatically identify attackable regions target image minimize effect on quality. It generates textures learned from fashion style images and then overlays them clothing original make all persons invisible The...

10.1109/cvprw53098.2021.00105 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2021-06-01

Finger vein recognition (FVR) systems have been commercially used, especially in ATMs, for customer verification. Thus, it is essential to measure their robustness against various attack methods, when a handcrafted FVR system used without any countermeasure methods. In this paper, we are the first literature introduce master attacks which craft vein-looking image so that can falsely match with as many identities possible by systems. We present two methods generating veins use attacking these...

10.1109/wacv56688.2023.00194 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2023-01-01

Masked face counting is the of faces at various crowd densities and discriminating between masked unmasked faces, which generally considered to be an object (i.e., face) detection task. Counting accuracy limited, especially higher densities, when are relatively small, unclear, viewed angles. Furthermore, it costly create ground-truth bounding boxes needed train methods. We formulate as a fine-grained crowd-counting task, appropriate for tackling this challenging task used with density map...

10.1109/access.2024.3367593 article EN cc-by-nc-nd IEEE Access 2024-01-01

The AMPATH program is a leading initiative in rural Kenya providing healthcare services to combat HIV. Malnutrition and food insecurity are common among patients the Nutritional Information System (NIS) was designed, with cross-functional collaboration between engineering medical communities, as comprehensive electronic system record assist effective distribution region poor infrastructure.The NIS designed modularly support urgent need of for growing program. manages ordering, storage,...

10.1197/jamia.m3139 article EN Journal of the American Medical Informatics Association 2009-08-28
Coming Soon ...