Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
TALK-Act: Enhance Textural-Awareness for 2D Speaking Avatar Reenactment with Diffusion Model
- Jiazhi Guan,
- Quanwei Yang,
- Kaisiyuan Wang,
- Hang Zhou,
- Shengyi He,
- Zhiliang Xu,
- Haocheng Feng,
- Errui Ding,
- Jingdong Wang,
- Hongtao Xie,
- Youjian Zhao,
- Ziwei Liu
SA '24: SIGGRAPH Asia 2024 Conference PapersArticle No.: 109, Pages 1–11https://doi.org/10.1145/3680528.3687571Recently, 2D speaking avatars have increasingly participated in everyday scenarios due to the fast development of facial animation techniques. However, most existing works neglect the explicit control of human bodies. In this paper, we propose to drive ...
- ArticleNovember 2024
ReSyncer: Rewiring Style-Based Generator for Unified Audio-Visually Synced Facial Performer
- Jiazhi Guan,
- Zhiliang Xu,
- Hang Zhou,
- Kaisiyuan Wang,
- Shengyi He,
- Zhanwang Zhang,
- Borong Liang,
- Haocheng Feng,
- Errui Ding,
- Jingtuo Liu,
- Jingdong Wang,
- Youjian Zhao,
- Ziwei Liu
AbstractLip-syncing videos with given audio is the foundation for various applications including the creation of virtual presenters or performers. While recent studies explore high-fidelity lip-sync with different techniques, their task-orientated models ...
- research-articleJanuary 2025
Adversarial robust safeguard for evading deep facial manipulation
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 14, Pages 118–126https://doi.org/10.1609/aaai.v38i1.27762The non-consensual exploitation of facial manipulation has emerged as a pressing societal concern. In tandem with the identification of such fake content, recent research endeavors have advocated countering manipulation techniques through proactive ...
- research-articleOctober 2023
SpaceCLIP: A Vision-Language Pretraining Framework With Spatial Reconstruction On Text
MM '23: Proceedings of the 31st ACM International Conference on MultimediaPages 519–528https://doi.org/10.1145/3581783.3612379The tremendous progress of vision-to-language retrieval over these years is fueled by contrastive vision-language pretraining (VLP), such as CLIP. Although, contrastive methods do not exhibit the same level of performance on other downstream tasks (e.g., ...
- research-articleJune 2023
Dual-Modality Co-Learning for Unveiling Deepfake in Spatio-Temporal Space
ICMR '23: Proceedings of the 2023 ACM International Conference on Multimedia RetrievalPages 85–94https://doi.org/10.1145/3591106.3592284The emergence of photo-realistic deepfakes on a large scale has become a significant societal concern, which has garnered considerable attention from the research community. Several recent studies have identified the critical issue of “temporal ...
-
- research-articleApril 2024
Delving into sequential patches for deepfake detection
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing SystemsArticle No.: 326, Pages 4517–4530Recent advances in face forgery techniques produce nearly visually untraceable deepfake videos, which could be leveraged with malicious intentions. As a result, researchers have been devoted to deepfake detection. Previous studies have identified the ...
- short-paperJune 2022
Identity-Referenced Deepfake Detection with Contrastive Learning
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia SecurityPages 27–32https://doi.org/10.1145/3531536.3532964With current advancements in deep learning technology, it is becoming easier to create high-quality face forgery videos, causing concerns about the misuse of deepfake technology. In recent years, research on deepfake detection has become a popular ...
- research-articleAugust 2021
Multivariate Time Series Anomaly Detection and Interpretation using Hierarchical Inter-Metric and Temporal Embedding
KDD '21: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data MiningPages 3220–3230https://doi.org/10.1145/3447548.3467075Anomaly detection is a crucial task for monitoring various status (i.e., metrics) of entities (e.g., manufacturing systems and Internet services), which are often characterized by multivariate time series (MTS). In practice, it's important to precisely ...
- research-articleApril 2021
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation
- Yuchao Zhang,
- Xiaohui Nie,
- Junchen Jiang,
- Wendong Wang,
- Ke Xu,
- Youjian Zhao,
- Martin J. Reed,
- Kai Chen,
- Haiyang Wang,
- Guang Yao
IEEE/ACM Transactions on Networking (TON), Volume 29, Issue 2Pages 918–934https://doi.org/10.1109/TNET.2021.3054924Many important cloud services require replicating massive data from one datacenter (DC) to multiple DCs. While the performance of pair-wise inter-DC data transfers has been much improved, prior solutions are insufficient to optimize bulk-data multicast, ...
- research-articleJuly 2020
DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks
IEEE INFOCOM 2020 - IEEE Conference on Computer CommunicationsPages 1907–1916https://doi.org/10.1109/INFOCOM41043.2020.9155515Shared resources facilitate stealthy communication channels, including side channels and covert channels, which greatly endanger the information security, even in cloud environments. As a commonly shared resource, DRAM memory also serves as a source of ...
- research-articleJuly 2020
Unsupervised and Network-Aware Diagnostics for Latent Issues in Network Information Databases
IEEE INFOCOM 2020 - IEEE Conference on Computer CommunicationsPages 426–435https://doi.org/10.1109/INFOCOM41043.2020.9155512Network management database (NID) is essential in modern large-scale networks. Operators rely on NID to provide accurate and up-to-date data, however, NID—like any other databases—can suffers from latent issues such as inconsistent, ...
- short-paperDecember 2019
Improving Survivability of LEO Satellite Network with guaranteed based approach
CoNEXT '19 Companion: Proceedings of the 15th International Conference on emerging Networking EXperiments and TechnologiesPages 47–48https://doi.org/10.1145/3360468.3368173Low Earth Orbit (LEO) Satellite network have the potential to revolutionize wide-area communications. However, it may suffer different failure modes than many traditional networks, due to its location in the complex space environment. In this paper, we ...
- extended-abstractDecember 2019
PKN: Improving Survivability of LEO Satellite Network through Protecting Key Nodes
CoNEXT '19 Companion: Proceedings of the 15th International Conference on emerging Networking EXperiments and TechnologiesPages 7–8https://doi.org/10.1145/3360468.3366770Low Earth Orbit (LEO) Satellite network have the potential to revolutionize wide-area communications. Due to its location in a complex space environment, LEO satellite network may suffer different failure modes than many traditional networks, and ...
- research-articleJuly 2019
Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network
KDD '19: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningPages 2828–2837https://doi.org/10.1145/3292500.3330672Industry devices (i.e., entities) such as server machines, spacecrafts, engines, etc., are typically monitored with multivariate time series, whose anomaly detection is critical for an entity's service quality management. However, due to the complex ...
- research-articleJune 2019
CoFlux: robustly correlating KPIs by fluctuations for service troubleshooting
- Ya Su,
- Youjian Zhao,
- Wentao Xia,
- Rong Liu,
- Jiahao Bu,
- Jing Zhu,
- Yuanpu Cao,
- Haibin Li,
- Chenhao Niu,
- Yiyin Zhang,
- Zhaogang Wang,
- Dan Pei
IWQoS '19: Proceedings of the International Symposium on Quality of ServiceArticle No.: 13, Pages 1–10https://doi.org/10.1145/3326285.3329048Internet-based service companies monitor a large number of KPIs (Key Performance Indicators) to ensure their service quality and reliability. Correlating KPIs by fluctuations reveals interactions between KPIs under anomalous situations and can be ...
- short-paperAugust 2018
SN-FFC: Improving Survivability of LEO Satellite Network with Forward Fault Correction
SIGCOMM '18: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and DemosPages 90–92https://doi.org/10.1145/3234200.3234252Low Earth Orbit (LEO) Satellite network will suffer from heavy congestion under network faults such as node failure, which affects its survivability. Traffic engineering is the mechanism to solve such problem. In data-center wide area networks (DCWAN), ...
- research-articleJune 2018
FUSO: Fast Multi-Path Loss Recovery for Data Center Networks
- Guo Chen,
- Yuanwei Lu,
- Yuan Meng,
- Bojie Li,
- Kun Tan,
- Dan Pei,
- Peng Cheng,
- Layong Luo,
- Yongqiang Xiong,
- Xiaoliang Wang,
- Youjian Zhao
IEEE/ACM Transactions on Networking (TON), Volume 26, Issue 3Pages 1376–1389https://doi.org/10.1109/TNET.2018.2830414To achieve low TCP flow completion time FCT in data center networks DCNs, it is critical and challenging to rapidly recover loss without adding extra congestion. Therefore, in this paper, we propose a novel loss recovery approach fast multi-path loss ...
- research-articleApril 2018
Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications
- Haowen Xu,
- Wenxiao Chen,
- Nengwen Zhao,
- Zeyan Li,
- Jiahao Bu,
- Zhihan Li,
- Ying Liu,
- Youjian Zhao,
- Dan Pei,
- Yang Feng,
- Jie Chen,
- Zhaogang Wang,
- Honglin Qiao
WWW '18: Proceedings of the 2018 World Wide Web ConferencePages 187–196https://doi.org/10.1145/3178876.3185996To ensure undisrupted business, large Internet companies need to closely monitor various KPIs (e.g., Page Views, number of online users, and number of orders) of its Web applications, to accurately detect anomalies and trigger timely troubleshooting/...
- research-articleDecember 2017
Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach
GLOBECOM 2017 - 2017 IEEE Global Communications ConferencePages 1–6https://doi.org/10.1109/GLOCOM.2017.8253990The privacy issue arising in data mining applications has attracted much attention in recent years. In the context of distributed data mining, the participant can employ data perturbation techniques to protect its privacy. Data perturbation generally ...
- research-articleAugust 2017
$\mathrm {F^{2}}$ Tree: Rapid Failure Recovery for Routing in Production Data Center Networks
IEEE/ACM Transactions on Networking (TON), Volume 25, Issue 4Pages 1940–1953https://doi.org/10.1109/TNET.2017.2672678Failures are not uncommon in production data center networks DCNs nowadays. It takes long time for the DCN routing to recover from a failure and find new forwarding paths, significantly impacting realtime and interactive applications at the upper layer. ...