[1]C. Chen, L. Lin, Y. Chen, B. Li∗, J. Zeng and J. Huang, "CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images," IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), 2024, pp. 15577-15586.
[2]C. Chen, B. Li, R. Cai∗, J. Zeng and J. Huang, "Distortion Model based Spectral Augmentation for Generalized Recaptured Document Detection," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1283-1298, 2024.
[3]C. Chen*, S. Zhang, F. Lan, and J. Huang, "Domain-agnostic Document Authentication against Practical Recapturing Attacks," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2890-2905, 2022.
[4]Z. Hu, C. Chen*, W. H. Mow and J. Huang, "Document Recapture Detection based on a Unified Distortion Model of Halftone Cells," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2800-2815, 2022.
[5]L. Zhao, C. Chen* and J. Huang, "Deep Learning-based Forgery Attack on Document Images," IEEE Transactions on Image Processing, vol. 30, pp. 7964-7979, 2021.
[6]C. Chen, X. Li, B. Chen and H. Li∗, "A Distortion Model Guided Adversarial Surrogate for Recaptured Document Detection", Pattern Recognition, vol. 151, p. 110433, 2024.
[7]Y. Song, C. Chen*, "MPPCANet: A Feedforward Learning Strategy for Few-shot Image Classification," Pattern Recognition, vol. 113, p. 107792, 2021.
[8]N. Xie, J. Chen, Y. Chen, J. Hu, Q. Zhang and C. Chen*, "Detection of Information Hiding at Anti-Copying 2D Barcodes," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 1, pp. 437-450, Jan. 2022.
[9]N. Xie, C. Chen* and Z. Ming, "Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 1, pp. 253-268, 1 Jan.-Feb. 2021.
[10]N. Xie, Q. Zhang, Y. Chen, J. Hu, G. Luo and C. Chen*, "Low-Cost Anti-Copying 2D Barcode by Exploiting Channel Noise Characteristics," IEEE Transactions on Multimedia, vol. 23, pp. 3752-3767, 2021.
[11]C. Chen, Y. Deng, L. Lin, Z. Yu∗ and Z. Lai, "Multi-modal Document Presentation Attack Detection with Forensics Trace Disentanglement," IEEE International Conference on Multimedia and Expo (ICME), 2024.
[12]C. Chen, L. Zhao, J. Yan and H. Li*, "A Distortion Model-based Pre-screening Method for Document Image Tampering Localization under Recapturing Attack", Signal Processing, vol. 200, p. 108666, 2022.
[13]R. Cai, Z. Yu, C. Kong, H. Li, C. Chen, Y. Hu and A. C. Kot, "S-Adapter: Generalizing Vision Transformer for Face Anti-spoofing with Statistical Tokens," IEEE Transactions on Information Forensics and Security, 2024.
[14]R. Cai, H. Li, S. Wang, C. Chen and A. C. Kot, "DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 937-951, 2021.