Renjie Wan

ORCID: 0000-0002-0161-0367
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image Enhancement Techniques
  • Advanced Image Processing Techniques
  • Advanced Vision and Imaging
  • Computer Graphics and Visualization Techniques
  • Advanced Image Fusion Techniques
  • Domain Adaptation and Few-Shot Learning
  • Image and Signal Denoising Methods
  • Digital Media Forensic Detection
  • Face recognition and analysis
  • Cell Image Analysis Techniques
  • Adversarial Robustness in Machine Learning
  • AI in cancer detection
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Misinformation and Its Impacts
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Steganography and Watermarking Techniques
  • Biometric Identification and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Hate Speech and Cyberbullying Detection
  • COVID-19 diagnosis using AI
  • Multimodal Machine Learning Applications
  • Medical Imaging Techniques and Applications
  • Cryptographic Implementations and Security

Hong Kong Baptist University
2022-2025

Nanyang Technological University
2016-2021

Beihang University
2020

Hunan Institute of Technology
2019

To enhance low-light images to normally-exposed ones is highly ill-posed, namely that the mapping relationship between them one-to-many. Previous works based on pixel-wise reconstruction losses and deterministic processes fail capture complex conditional distribution of normally exposed images, which results in improper brightness, residual noise, artifacts. In this paper, we investigate model one-to-many via a proposed normalizing flow model. An invertible network takes images/features as...

10.1609/aaai.v36i3.20162 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

Removing undesired reflections from a photo taken in front of glass is great importance for enhancing the efficiency visual computing systems. Various approaches have been proposed and shown to be visually plausible on small datasets collected by their authors. A quantitative comparison existing using same dataset has never conducted due lack suitable benchmark data with ground truth. This paper presents first captured Single-image Reflection Removal 'SIR2' 40 controlled 100 wild scenes,...

10.1109/iccv.2017.423 article EN 2017-10-01

Reflection removal aims at separating the mixture of desired scene and undesired reflections. Locating reflection background edges is a key step for removal. In this paper, we present visual depth guided method to remove Our idea use Depth Field (DoF) label edges. We propose DoF confidence map where pixels with higher values are assumed belong components. Moreover, observe that images different resolutions show properties in map. Thus, introduce multi-scale computing strategy classify edge...

10.1109/icip.2016.7532311 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2016-08-17

Removing the undesired reflections from images taken through glass is of broad application to various computer vision tasks. Non-learning based methods utilize different handcrafted priors such as separable sparse gradients caused by levels blurs, which often fail due their limited description capability properties real-world reflections. In this paper, we propose Concurrent Reflection Removal Network (CRRN) tackle problem in a unified framework. Our proposed network integrates image...

10.1109/cvpr.2018.00502 preprint EN 2018-06-01

Removing the undesired reflections from images taken through glass is of broad application to various computer vision tasks. Non-learning based methods utilize different handcrafted priors such as separable sparse gradients caused by levels blurs, which often fail due their limited description capability properties real-world reflections. In this paper, we propose a network with feature-sharing strategy tackle problem in cooperative and unified framework, integrating image context...

10.1109/tpami.2019.2921574 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2019-06-07

Face Anti-Spoofing (FAS) is essential to secure face recognition systems and has been extensively studied in recent years. Although deep neural networks (DNNs) for the FAS task have achieved promising results intra-dataset experiments with similar distributions of training testing data, DNNs' generalization ability limited under cross-domain scenarios different data. To improve ability, hybrid methods explored extract task-aware handcrafted features (e.g., Local Binary Pattern) as...

10.1109/tifs.2022.3158551 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Recently, we have witnessed great progress in the field of medical imaging classification by adopting deep neural networks. However, recent advanced models still require accessing sufficiently large and representative datasets for training, which is often unfeasible clinically realistic environments. When trained on limited datasets, network lack generalization capability, as data within a certain distribution (e.g. captured device vendor or patient population) may not be able to generalize...

10.48550/arxiv.2009.12829 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Removing the undesired reflections in images taken through glass is of broad application to various image processing and computer vision tasks. Existing single image-based solutions heavily rely on scene priors such as separable sparse gradients caused by different levels blur, they are fragile when not observed. In this paper, we notice that strong usually dominant a limited region whole image, propose region-aware reflection removal approach automatically detecting heterogeneously regions...

10.1109/tip.2018.2808768 article EN IEEE Transactions on Image Processing 2018-02-22

10.1109/cvpr52733.2024.01119 article DE 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Reflection removal has been discussed for more than decades. This paper aims to provide the analysis different reflection properties and factors that influence image formation, an up-to-date taxonomy existing methods, a benchmark dataset, unified benchmarking evaluations state-of-the-art (especially learning-based) methods. Specifically, this presents SIngle-image Removal Plus dataset "SIR 2+ " with new consideration in-the-wild scenarios glass diverse color unplanar shapes. We further...

10.1109/tpami.2022.3168560 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2022-04-19

Parkinson's disease (PD) is a common degenerative of the nervous system in elderly. The early diagnosis PD very important for potential patients to receive prompt treatment and avoid aggravation disease. Recent studies have found that always suffer from emotional expression disorder, thus forming characteristics "masked faces". Based on this, we propose an auto method based mixed facial expressions paper. Specifically, proposed cast into four steps: Firstly, synthesize virtual face images...

10.1109/jbhi.2023.3239780 article EN IEEE Journal of Biomedical and Health Informatics 2023-01-25

Existing learning-based single image reflection removal methods using paired training data have fundamental limitations about the generalization capability on real-world reflections due to limited variations in pairs. In this work, we propose jointly generate and separate within a weakly-supervised learning framework, aiming model formation more comprehensively with abundant unpaired supervision. By imposing adversarial losses combinable mapping mechanism multi-task structure, proposed...

10.1109/iccv.2019.00253 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2019-10-01

Heterogeneous Transfer Learning (HTL) aims to solve transfer learning problems where a source domain and target are of heterogeneous types features. Most existing HTL approaches either explicitly learn feature mappings between the domains or implicitly reconstruct cross-domain features based on matrix completion techniques. In this paper, we propose new method deep framework, kernel embedding distributions is trained in an adversarial manner for across domains. We conduct extensive...

10.1609/aaai.v33i01.33018602 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

To enhance low-light images to normally-exposed ones is highly ill-posed, namely that the mapping relationship between them one-to-many. Previous works based on pixel-wise reconstruction losses and deterministic processes fail capture complex conditional distribution of normally exposed images, which results in improper brightness, residual noise, artifacts. In this paper, we investigate model one-to-many via a proposed normalizing flow model. An invertible network takes images/features as...

10.48550/arxiv.2109.05923 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Neural Radiance Fields (NeRF) have the potential to be a major representation of media. Since training NeRF has never been an easy task, protection its model copyright should priority. In this paper, by analyzing pros and cons possible solutions, we propose protect models replacing original color in with watermarked representation. Then, distortion-resistant rendering scheme is designed guarantee robust message extraction 2D renderings NeRF. Our proposed method can directly while maintaining...

10.1109/iccv51070.2023.02047 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

In this study, we compared the chemical forms and subcellular distribution of Cd in high-Cd (X16) low-Cd (N88) sweet potato cultivars through hydroponic experiments examined their roots by histochemical staining. The results showed that inorganic pectate/protein-integrated predominated leaves, concentrations were significantly higher X16 than N88. However, roots, was mostly integrated with pectate protein, concentration N88 X16. It mainly stored vacuolar sequestration cell wall binding....

10.1080/15226514.2018.1524846 article EN International Journal of Phytoremediation 2019-01-18

10.1007/s11263-020-01372-5 article EN International Journal of Computer Vision 2020-09-15

Our everyday lives are filled with occlusions that we strive to see through. By aggregating desired background information from different viewpoints, can easily eliminate such without any external occlusion-free supervision. Though several occlusion removal methods have been proposed empower machine vision systems ability, their performances still unsatisfactory due reliance on We propose a novel method for by directly building mapping between position and viewing angles the corresponding...

10.1109/cvpr52729.2023.01985 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

Removing the undesired moiré patterns from images capturing contents displayed on screens is of increasing research interest, as need for recording and sharing instant information conveyed by growing. Previous demoiréing methods provide limited investigations into formation process to exploit moiré-specific priors guiding learning models. In this paper, we investigate pattern perspective signal aliasing, correspondingly propose a coarse-to-fine disentangling framework. framework, first...

10.1109/tpami.2023.3243310 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2023-02-08

10.1109/tetci.2025.3529893 article EN IEEE Transactions on Emerging Topics in Computational Intelligence 2025-01-01

Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation NeRF-based creations, need for copyright protection has emerged critical issue. Although some approaches proposed to embed digital watermarks into NeRF, they often neglect essential model-level considerations and incur substantial time overheads, resulting in reduced imperceptibility robustness, along with user inconvenience. In this paper, we extend previous...

10.1109/tpami.2025.3550166 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2025-01-01

Hateful meme detection aims to prevent the proliferation of hateful memes on various social media platforms. Considering its impact environments, this paper introduces a previously ignored but significant threat detection: backdoor attacks. By injecting specific triggers into samples, attackers can manipulate detector output their desired outcomes. To explore this, we propose Meme Trojan framework initiate attacks detection. involves creating novel Cross-Modal Trigger (CMT) and learnable...

10.1609/aaai.v39i8.32845 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11
Coming Soon ...