Shouhong Ding
Applied Filters
- Shouhong Ding
- AuthorRemove filter
People
Colleagues
- Shouhong Ding (47)
- Lizhuang Ma (17)
- Taiping Yao (15)
- Bo Li (9)
- Keyue Zhang (8)
- Shuang Wu (8)
- Feiyue Huang (6)
- Jilin Li (5)
- Rongrong Ji (5)
- Ke Yan (4)
- Lei Shen (3)
- Liujuan Cao (3)
- Qianyu Zhou (3)
- Wenqiang Zhang (3)
- Xiaonan Hou (3)
- Zhifeng Xie (3)
- Bin Sheng (2)
- Chunhua Shen (2)
- Weikuan Le Jia (2)
- Yang Wang (2)
Publication
Proceedings/Book Names
- AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence (4)
- MM '22: Proceedings of the 30th ACM International Conference on Multimedia (3)
- AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence (2)
- Computer Vision – ECCV 2022 (2)
- MM '21: Proceedings of the 29th ACM International Conference on Multimedia (2)
- MM '24: Proceedings of the 32nd ACM International Conference on Multimedia (2)
- NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing Systems (2)
- NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing Systems (2)
- Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing (1)
- Computer Vision – ECCV 2020 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2022 (1)
- Computer Vision – ECCV 2024 (1)
- Computer Vision – ECCV 2024 (1)
- Neural Information Processing (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
Published By ACM
Published By ACM
AlignCLIP: Align Multi Domains of Texts Input for CLIP models with Object-IoU Loss
Lu Zhang
Tencent Youtu Lab, Shanghai, China
,Ke Yan
Tencent Youtu Lab, Shanghai, China
,Shouhong Ding
Tencent Youtu Lab, Shanghai, China
MM '24: Proceedings of the 32nd ACM International Conference on Multimedia•October 2024, pp 1092-1100• https://doi.org/10.1145/3664647.3681636Since the release of the CLIP model by OpenAI, it has received widespread attention. However, categories in the real world often exhibit a long-tail distribution, and existing CLIP models struggle to effectively recognize rare, tail-end classes, such as ...
- 0Citation
- 69
- Downloads
MetricsTotal Citations0Total Downloads69Last 12 Months69Last 6 weeks16
- research-article
Published By ACM
Published By ACM
Bilateral Adaptive Cross-Modal Fusion Prompt Learning for CLIP
Qiang Wang
Tencent YouTu Lab, Shanghai, China
,Ke Yan
Tencent Youtu Lab, Shanghai, China
,Shouhong Ding
Tencent Youtu Lab, Shanghai, China
MM '24: Proceedings of the 32nd ACM International Conference on Multimedia•October 2024, pp 9001-9009• https://doi.org/10.1145/3664647.3681218In the realm of CLIP adaptation through prompt learning, it is important to emphasize the pivotal role that the proper alignment of visual and textual representations plays when adapting the CLIP to downstream tasks. We propose that the proper alignment ...
- 0Citation
- 72
- Downloads
MetricsTotal Citations0Total Downloads72Last 12 Months72Last 6 weeks14
- Article
Enhancing Tampered Text Detection Through Frequency Feature Fusion and Decomposition
Zhongxi Chen
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Effcient Computing, Ministry of Education of China, Xiamen University, 361005, Xiamen, People’s Republic of China
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Shen Chen
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Taiping Yao
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Ke Sun
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Effcient Computing, Ministry of Education of China, Xiamen University, 361005, Xiamen, People’s Republic of China
,Shouhong Ding
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Xianming Lin
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Effcient Computing, Ministry of Education of China, Xiamen University, 361005, Xiamen, People’s Republic of China
,Liujuan Cao
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Effcient Computing, Ministry of Education of China, Xiamen University, 361005, Xiamen, People’s Republic of China
,Rongrong Ji
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Effcient Computing, Ministry of Education of China, Xiamen University, 361005, Xiamen, People’s Republic of China
Computer Vision – ECCV 2024•September 2024, pp 200-217• https://doi.org/10.1007/978-3-031-73414-4_12AbstractDocument image tampering poses a grave risk to the veracity of information, with potential consequences ranging from misinformation dissemination to financial and identity fraud. Current detection methods use frequency information to uncover ...
- 0Citation
MetricsTotal Citations0
- Article
TF-FAS: Twofold-Element Fine-Grained Semantic Guidance for Generalizable Face Anti-spoofing
Xudong Wang
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, China
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Ke-Yue Zhang
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Taiping Yao
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Qianyu Zhou
https://ror.org/0220qvk04Shanghai Jiao Tong University, Shanghai, China
,Shouhong Ding
https://ror.org/00hhjss72Youtu Lab, Tencent, Shenzhen, China
,Pingyang Dai
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, China
,Rongrong Ji
https://ror.org/00mcjh785Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, Xiamen, China
Computer Vision – ECCV 2024•September 2024, pp 148-168• https://doi.org/10.1007/978-3-031-72667-5_9AbstractGeneralizable Face anti-spoofing (FAS) approaches have recently garnered considerable attention due to their robustness in unseen scenarios. Some recent methods incorporate vision-language models into FAS, leveraging their impressive pre-trained ...
- 0Citation
MetricsTotal Citations0
- research-article
Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning
Junyi Cao
https://ror.org/0220qvk04MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University, Shanghai, China
,Ke-Yue Zhang
https://ror.org/00hhjss72Youtu Lab, Tencent, Shanghai, China
,Taiping Yao
https://ror.org/00hhjss72Youtu Lab, Tencent, Shanghai, China
,Shouhong Ding
https://ror.org/00hhjss72Youtu Lab, Tencent, Shanghai, China
,Xiaokang Yang
https://ror.org/0220qvk04MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University, Shanghai, China
,Chao Ma
https://ror.org/0220qvk04MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University, Shanghai, China
International Journal of Computer Vision, Volume 132, Issue 12•Dec 2024, pp 5862-5887 • https://doi.org/10.1007/s11263-024-02151-2AbstractReal-world face recognition systems are vulnerable to diverse face attacks, ranging from digitally manipulated artifacts to physically crafted spoofing attacks. Existing works primarily focus on using an image classification network to address one ...
- 0Citation
MetricsTotal Citations0
- research-article
PCE-palm: palm crease energy based two-stage realistic pseudo-palmprint generation
Jianlong Jin
Hefei University of Technology, China and Youtu Lab, Tencent
,Lei Shen
Youtu Lab, Tencent
,Ruixin Zhang
Youtu Lab, Tencent
,Chenglong Zhao
Youtu Lab, Tencent
,Ge Jin
Youtu Lab, Tencent
,Jingyun Zhang
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
,Yang Zhao
Hefei University of Technology, China
,Wei Jia
Hefei University of Technology, China
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence•February 2024, Article No.: 291, pp 2616-2624• https://doi.org/10.1609/aaai.v38i3.28039The lack of large-scale data seriously hinders the development of palmprint recognition. Recent approaches address this issue by generating large-scale realistic pseudo palm-prints from Bézier curves. However, the significant difference between Bézier ...
- 0Citation
MetricsTotal Citations0
- research-article
Domain-hallucinated updating for multi-domain face anti-spoofing
Chengyang Hu
Shanghai Jiao Tong University
,Ke-Yue Zhang
Youtu Lab, Tencent
,Taiping Yao
Youtu Lab, Tencent
,Shice Liu
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
,Xin Tan
East China Normal University
,Lizhuang Ma
Shanghai Jiao Tong University and East China Normal University and MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence•February 2024, Article No.: 244, pp 2193-2201• https://doi.org/10.1609/aaai.v38i3.27992Multi-Domain Face Anti-Spoofing (MD-FAS) is a practical setting that aims to update models on new domains using only novel data while ensuring that the knowledge acquired from previous domains is not forgotten. Prior methods utilize the responses from ...
- 0Citation
MetricsTotal Citations0
- research-article
MmAP: multi-modal alignment prompt for cross-domain multi-task learning
Yi Xin
State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China and Youtu Lab, Tencent
,Junlong Du
Youtu Lab, Tencent
,Qiang Wang
Youtu Lab, Tencent
,Ke Yan
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence•February 2024, Article No.: 1792, pp 16076-16084• https://doi.org/10.1609/aaai.v38i14.29540Multi-Task Learning (MTL) is designed to train multiple correlated tasks simultaneously, thereby enhancing the performance of individual tasks. Typically, a multi-task network structure consists of a shared backbone and task-specific decoders. However, ...
- 0Citation
MetricsTotal Citations0
- research-article
HDMixer: hierarchical dependency with extendable patch for multivariate time series forecasting
Qihe Huang
University of Science and Technology of China (USTC), Hefei, China and Youtu Laboratory, Tencent, Shanghai, China
,Lei Shen
Youtu Laboratory, Tencent, Shanghai, China
,Ruixin Zhang
Youtu Laboratory, Tencent, Shanghai, China
,Jiahuan Cheng
Johns Hopkins University and Youtu Laboratory, Tencent, Shanghai, China
,Shouhong Ding
Youtu Laboratory, Tencent, Shanghai, China
,Zhengyang Zhou
University of Science and Technology of China (USTC), Hefei, China and Suzhou Institute for Advanced Research, USTC, Suzhou, China and State Key Laboratory of Resources and Environmental Information System
,Yang Wang
University of Science and Technology of China (USTC), Hefei, China and Suzhou Institute for Advanced Research, USTC, Suzhou, China
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence•February 2024, Article No.: 1407, pp 12608-12616• https://doi.org/10.1609/aaai.v38i11.29155Multivariate time series (MTS) prediction has been widely adopted in various scenarios. Recently, some methods have employed patching to enhance local semantics and improve model performance. However, length-fixed patch are prone to losing temporal ...
- 2Citation
MetricsTotal Citations2
- research-article
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-Spoofing
Tianyi Zheng
Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China
,Bo Li
YouTu Laboratory, Tencent, Shanghai, China
,Shuang Wu
YouTu Laboratory, Tencent, Shanghai, China
,Ben Wan
Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China
,Guodong Mu
YouTu Laboratory, Tencent, Shanghai, China
,Shice Liu
YouTu Laboratory, Tencent, Shanghai, China
,Shouhong Ding
YouTu Laboratory, Tencent, Shanghai, China
,Jia Wang
Department of Electronic Engineering, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China
IEEE Transactions on Information Forensics and Security, Volume 19•2024, pp 4058-4069 • https://doi.org/10.1109/TIFS.2024.3371266The generalizable face anti-spoofing (FAS) has attracted much attention recently. Even though many existing methods perform well under intra-domain settings, the model’s performance in the unseen domain is not satisfying. In this paper, we shift ...
- 3Citation
MetricsTotal Citations3
- research-article
Content-based unrestricted adversarial attack
Zhaoyu Chen
Academy for Engineering and Technology, Fudan University and Youtu Lab, Tencent
,Bo Li
Youtu Lab, Tencent
,Shuang Wu
Youtu Lab, Tencent
,Kaixun Jiang
Academy for Engineering and Technology, Fudan University
,Shouhong Ding
Youtu Lab, Tencent
,Wenqiang Zhang
Academy for Engineering and Technology, Fudan University and School of Computer Science, Fudan University
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing Systems•December 2023, Article No.: 2253, pp 51719-51733Unrestricted adversarial attacks typically manipulate the semantic content of an image (e.g., color or texture) to create adversarial examples that are both effective and photorealistic, demonstrating their ability to deceive human perception and deep ...
- 0Citation
MetricsTotal Citations0
- research-article
CrossGNN: confronting noisy multivariate time series via cross interaction refinement
Qihe Huang
University of Science and Technology of China (USTC), Hefei, China and Youtu Laboratory, Tencent, Shanghai, China
,Lei Shen
Youtu Laboratory, Tencent, Shanghai, China
,Ruixin Zhang
Youtu Laboratory, Tencent, Shanghai, China
,Shouhong Ding
Youtu Laboratory, Tencent, Shanghai, China
,Binwu Wang
University of Science and Technology of China (USTC), Hefei, China
,Zhengyang Zhou
University of Science and Technology of China (USTC), Hefei, China and Suzhou Institute for Advanced Research, USTC, Suzhou, China
,Yang Wang
University of Science and Technology of China (USTC), Hefei, China and Suzhou Institute for Advanced Research, USTC, Suzhou, China
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing Systems•December 2023, Article No.: 2031, pp 46885-46902Recently, multivariate time series (MTS) forecasting techniques have seen rapid development and widespread applications across various fields. Transformer-based and GNN-based methods have shown promising potential due to their strong ability to model ...
- 0Citation
MetricsTotal Citations0- 1
Supplementary Material3666122.3668153_supp.pdf
- research-article
Published By ACM
Published By ACM
Seeing in Flowing: Adapting CLIP for Action Recognition with Motion Prompts Learning
Qiang Wang
Tencent YouTu Lab, Shanghai, China
,Junlong Du
Tencent YouTu Lab, Shanghai, China
,Ke Yan
Tencent YouTu Lab, Shanghai, China
,Shouhong Ding
Tencent YouTu Lab, Shanghai, China
MM '23: Proceedings of the 31st ACM International Conference on Multimedia•October 2023, pp 5339-5347• https://doi.org/10.1145/3581783.3612490The Contrastive Language-Image Pre-training (CLIP) has recently shown remarkable generalization on "zero-shot" training and has applied to many downstream tasks. We explore the adaptation of CLIP to achieve a more efficient and generalized action ...
- 6Citation
- 269
- Downloads
MetricsTotal Citations6Total Downloads269Last 12 Months190Last 6 weeks12
- research-article
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices
Dongheng Zhang
School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China
,Jia Meng
Tencent YouTu Laboratory, Shanghai, China
,Jian Zhang
Tencent YouTu Laboratory, Shanghai, China
,Xinzhe Deng
Tencent YouTu Laboratory, Shanghai, China
,Shouhong Ding
School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China
,Man Zhou
Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China
,Qian Wang
School of Cyber Science and Engineering, Wuhan University, Wuhan, China
,Qi Li
Zhongguancun Laboratory, Beijing, China
,Yan Chen
School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China
IEEE Transactions on Circuits and Systems for Video Technology, Volume 33, Issue 8•Aug. 2023, pp 4401-4414 • https://doi.org/10.1109/TCSVT.2023.3236303Liveness detection has been widely applied in face authentication systems to combat malicious attacks. However, existing methods purely depending on visual frames become vulnerable once visual perception is not reliable. The emerging face spoof and forge ...
- 2Citation
MetricsTotal Citations2
- research-article
Delving into the adversarial robustness of federated learning
Jie Zhang
Zhejiang University
,Bo Li
Youtu Lab, Tencent
,Chen Chen
Sony AI
,Lingjuan Lyu
Sony AI
,Shuang Wu
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
,Chao Wu
Zhejiang University
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence•February 2023, Article No.: 1262, pp 11245-11253• https://doi.org/10.1609/aaai.v37i9.26331In Federated Learning (FL), models are as fragile as centrally trained models against adversarial examples. However, the adversarial robustness of federated learning remains largely unexplored. This paper casts light on the challenge of adversarial ...
- 0Citation
MetricsTotal Citations0
- research-article
Attack can benefit: an adversarial approach to recognizing facial expressions under noisy annotations
Jiawen Zheng
Xiamen University
,Bo Li
Youtu Lab, Tencent
,Shengchuan Zhang
Xiamen University
,Shuang Wu
Youtu Lab, Tencent
,Liujuan Cao
Xiamen University
,Shouhong Ding
Youtu Lab, Tencent
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence•February 2023, Article No.: 408, pp 3660-3668• https://doi.org/10.1609/aaai.v37i3.25477The real-world Facial Expression Recognition (FER) datasets usually exhibit complex scenarios with coupled noise annotations and imbalanced class distribution, which undoubtedly impede the development of FER methods. To address the aforementioned issues, ...
- 0Citation
MetricsTotal Citations0
- research-article
Query-Efficient Decision-Based Black-Box Patch Attack
Zhaoyu Chen
Academy for Engineering and Technology, Fudan University, Shanghai, China
,Bo Li
Youtu Laboratory, Tencent, Shanghai, China
,Shuang Wu
Youtu Laboratory, Tencent, Shanghai, China
,Shouhong Ding
Youtu Laboratory, Tencent, Shanghai, China
,Wenqiang Zhang
Academy for Engineering and Technology, Fudan University, Shanghai, China
IEEE Transactions on Information Forensics and Security, Volume 18•2023, pp 5522-5536 • https://doi.org/10.1109/TIFS.2023.3307908Deep neural networks (DNNs) have been showed to be highly vulnerable to imperceptible adversarial perturbations. As a complementary type of adversary, patch attacks that introduce perceptible perturbations to the images have attracted the interest of ...
- 6Citation
MetricsTotal Citations6
- research-article
Adv-attribute: inconspicuous and transferable adversarial attack on face recognition
Shuai Jia
MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University
,Bangjie Yin
Youtu Lab, Tencent
,Taiping Yao
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
,Chunhua Shen
Zhejiang University
,Xiaokang Yang
MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University
,Chao Ma
MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing Systems•November 2022, Article No.: 2474, pp 34136-34147Deep learning models have shown their vulnerability when dealing with adversarial attacks. Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and rarely exploit semantic clues. For face recognition attacks, existing ...
- 0Citation
MetricsTotal Citations0- 1
Supplementary Material3600270.3602744_supp.pdf
- research-article
DENSE: data-free one-shot federated learning
Jie Zhang
Zhejiang University
,Chen Chen
Zhejiang University
,Bo Li
Youtu Lab, Tencent
,Lingjuan Lyu
Sony AI
,Shuang Wu
Youtu Lab, Tencent
,Shouhong Ding
Youtu Lab, Tencent
,Chunhua Shen
Zhejiang University
,Chao Wu
Zhejiang University
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing Systems•November 2022, Article No.: 1556, pp 21414-21428One-shot Federated Learning (FL) has recently emerged as a promising approach, which allows the central server to learn a model in a single communication round. Despite the low communication cost, existing one-shot FL methods are mostly impractical or ...
- 0Citation
MetricsTotal Citations0- 1
Supplementary Material3600270.3601826_supp.pdf
- Article
ECO-TR: Efficient Correspondences Finding via Coarse-to-Fine Refinement
Dongli Tan
Media Analytics and Computing Lab, School of Informatics, Xiamen University, Xiamen, China
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Jiang-Jiang Liu
TMCC, CS, Nankai University, Tianjin, China
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Xingyu Chen
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Chao Chen
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Ruixin Zhang
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Yunhang Shen
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Shouhong Ding
Youtu Lab, Tencent Technology (Shanghai) Co., Ltd., Shanghai, China
,Rongrong Ji
Media Analytics and Computing Lab, School of Informatics, Xiamen University, Xiamen, China
Institute of Artificial Intelligence, Xiamen University, Xiamen, China
Computer Vision – ECCV 2022•October 2022, pp 317-334• https://doi.org/10.1007/978-3-031-20080-9_19AbstractModeling sparse and dense image matching within a unified functional correspondence model has recently attracted increasing research interest. However, existing efforts mainly focus on improving matching accuracy while ignoring its efficiency, ...
- 1Citation
MetricsTotal Citations1
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner