Detecting Malicious Concepts without Image Generation in AI-Generated Content (AIGC)
Pith reviewed 2026-05-23 03:43 UTC · model grok-4.3
The pith
Concept QuickLook identifies malicious AI image concepts from their files alone without generating any images.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Concept QuickLook performs detection based solely on concept files without generating any images, using two operational modes of concept matching and fuzzy detection; extensive experiments demonstrate its effectiveness and practicality in concept sharing platforms, with additional robustness experiments confirming reliability.
What carries the argument
Concept QuickLook, a file-only detection system that applies concept matching for exact cases and fuzzy detection for disguised ones.
If this is right
- Platforms can screen uploads without the computational cost or risk of image generation.
- Disguised malicious concepts using non-malicious text and example images can still be caught via fuzzy detection.
- Detection scales as upload volume grows without becoming impractical.
- Robustness experiments support the method against attempts to hide malice.
Where Pith is reading between the lines
- Platforms could run the check automatically on every upload to reduce exposure time.
- The file-analysis idea might extend to spotting other problematic uploads in generative AI systems.
- Combining file checks with text description review could raise overall detection rates.
Load-bearing premise
Concept files contain enough distinguishable signals of malice that can be read reliably without generating images or accessing the diffusion model.
What would settle it
A set of malicious concept files on which both matching and fuzzy modes return no alert, or a set of benign files that trigger alerts at scale.
Figures
read the original abstract
The task of text-to-image generation has achieved tremendous success in practice, with emerging concept generation models capable of producing highly personalized and customized content. Fervor for concept generation is increasing rapidly among users, and platforms for concept sharing have sprung up. The concept owners may upload malicious concepts and disguise them with non-malicious text descriptions and example images to deceive users into downloading and generating malicious content. The platform needs a quick method to determine whether a concept is malicious to prevent the spread of malicious concepts. However, simply relying on concept image generation to judge whether a concept is malicious requires time and computational resources. Especially, as the number of concepts uploaded and downloaded on the platform continues to increase, this approach becomes impractical and poses a risk of generating malicious content. In this paper, we propose Concept QuickLook, the first systematic work to incorporate malicious concept detection into research, which performs detection based solely on concept files without generating any images. We define malicious concepts and design two operational modes for detection: concept matching and fuzzy detection. Extensive experiments demonstrate that the proposed Concept QuickLook can detect malicious concepts and demonstrate practicality in concept sharing platforms. We also design robustness experiments to further validate the effectiveness of the solution. We hope this work can initiate malicious concept detection tasks and provide some inspiration.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes Concept QuickLook as the first systematic method to detect malicious concepts uploaded to AIGC concept-sharing platforms. Detection operates exclusively on concept files (without image generation or access to the underlying diffusion model) via two defined modes—concept matching and fuzzy detection—and the authors assert that extensive experiments plus dedicated robustness tests confirm its effectiveness and practicality for platform use.
Significance. If the detection performance holds under the stated conditions, the approach could materially reduce the computational cost and generation risk associated with screening malicious concepts on sharing platforms. It initiates a new task focused on file-level malice signals rather than generated outputs. The work's value depends entirely on whether the claimed experimental support is reproducible and free of circularity in threshold or data selection.
major comments (2)
- [Abstract] Abstract: the central claim that 'extensive experiments demonstrate that the proposed Concept QuickLook can detect malicious concepts' is unsupported by any reported metrics, baselines, dataset sizes, error bars, or exclusion criteria. This absence is load-bearing for the practicality assertion.
- [Abstract / Experiments] The weakest assumption—that concept files contain reliably distinguishable malice signals without model access or image generation—is never subjected to a concrete falsification test or ablation in the reported experiments; the circularity risk (training/evaluation on the same distribution) therefore cannot be assessed.
Simulated Author's Rebuttal
We thank the referee for the detailed review and for highlighting issues with experimental reporting and validation of core assumptions. We address each major comment below.
read point-by-point responses
-
Referee: [Abstract] Abstract: the central claim that 'extensive experiments demonstrate that the proposed Concept QuickLook can detect malicious concepts' is unsupported by any reported metrics, baselines, dataset sizes, error bars, or exclusion criteria. This absence is load-bearing for the practicality assertion.
Authors: The abstract is a high-level summary; the full manuscript reports concrete metrics (e.g., detection accuracy, precision/recall), baselines, dataset sizes (hundreds of concept files across malicious and benign categories), and robustness results in the Experiments section. We acknowledge that the abstract itself lacks these quantitative details and will revise it to include key performance figures, dataset sizes, and error information to make the claim self-supporting. revision: yes
-
Referee: [Abstract / Experiments] The weakest assumption—that concept files contain reliably distinguishable malice signals without model access or image generation—is never subjected to a concrete falsification test or ablation in the reported experiments; the circularity risk (training/evaluation on the same distribution) therefore cannot be assessed.
Authors: The robustness experiments evaluate detection under varied concept-file disguises, formats, and non-malicious overlays precisely to test whether malice signals remain distinguishable without image generation or model access. Data for the two modes were drawn from separate collections to limit overlap. We agree an explicit ablation isolating the signal-distinguishability assumption and a clearer statement on train/eval separation would strengthen the paper and will add both in revision. revision: partial
Circularity Check
No significant circularity identified
full rationale
The paper presents a system proposal for Concept QuickLook with two detection modes (matching and fuzzy) defined directly from the task requirements, followed by empirical validation via experiments. No derivation chain, equations, fitted parameters renamed as predictions, or self-citation load-bearing steps appear in the abstract or described structure. The central claim rests on experimental demonstration rather than any reduction of outputs to inputs by construction. This is the expected non-finding for an applied detection paper without closed-form derivations.
Axiom & Free-Parameter Ledger
Reference graph
Works this paper leans on
-
[1]
High-resolution image synthesis with latent diffusion models,
R. Rombach, A. Blattmann, D. Lorenz, P . Esser, and B. Ommer, “High-resolution image synthesis with latent diffusion models,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. , 2022, pp. 10 674– 10 685
work page 2022
-
[2]
Hierarchical Text-Conditional Image Generation with CLIP Latents
A. Ramesh, P . Dhariwal, A. Nichol, C. Chu, and M. Chen, “Hi- erarchical text-conditional image generation with clip latents,” arXiv:2204.06125, 2022
work page internal anchor Pith review Pith/arXiv arXiv 2022
-
[3]
Photorealistic text-to-image diffusion models with deep language understanding,
C. Saharia, W. Chan, S. Saxena, L. Li, J. Whang, E. L. Denton, K. Ghasemipour, R. Gontijo Lopes, B. Karagol Ayan, T. Salimans, J. Ho, D. J. Fleet, and M. Norouzi, “Photorealistic text-to-image diffusion models with deep language understanding,” in Proc. Adv. Neural Inform. Process. Syst., vol. 35, 2022, pp. 36 479-36 494
work page 2022
-
[4]
Multidiffusion: Fusing diffusion paths for controlled image generation,
O. Bar-Tal, L. Yariv, Y. Lipman, and T. Dekel, “Multidiffusion: Fusing diffusion paths for controlled image generation,” in Proc. Int. Conf. Mach. Learn., 2023, pp. 1737-1752
work page 2023
-
[5]
Pridm: Effective and universal private data recovery via diffusion models,
S. Pang, Y. Rao, Z. Lu, H. Wang, Y. Zhou, and M. Xue, “Pridm: Effective and universal private data recovery via diffusion models,” IEEE Trans. on Dependable and Secure Comput., pp. 1–17, 2025
work page 2025
-
[6]
Subject-diffusion: Open domain personalized text-to-image generation without test-time fine-tuning,
J. Ma, J. Liang, C. Chen, and H. Lu, “Subject-diffusion: Open domain personalized text-to-image generation without test-time fine-tuning,” in Proc. ACM SIGGRAPH Conf. Pap., 2024
work page 2024
-
[7]
Instantbooth: Personalized text-to-image generation without test-time finetuning,
J. Shi, W. Xiong, Z. Lin, and H. J. Jung, “Instantbooth: Personalized text-to-image generation without test-time finetuning,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2024, pp. 8543–8552
work page 2024
-
[8]
An image is worth one word: Personalizing text-to-image generation using textual inversion,
R. Gal, Y. Alaluf, Y. Atzmon, O. Patashnik, A. H. Bermano, G. Chechik, and D. Cohen-Or, “An image is worth one word: Personalizing text-to-image generation using textual inversion,” in Proc. Int. Conf. Learn. Represent., 2022
work page 2022
-
[9]
Dreambooth: Fine tuning text-to-image diffusion models for subject-driven generation,
N. Ruiz, Y. Li, V . Jampani, Y. Pritch, M. Rubinstein, and K. Aber- man, “Dreambooth: Fine tuning text-to-image diffusion models for subject-driven generation,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2023, pp. 22 500–22 510
work page 2023
-
[10]
Multi-concept customization of text-to-image diffusion,
N. Kumari, B. Zhang, R. Zhang, E. Shechtman, and J.-Y. Zhu, “Multi-concept customization of text-to-image diffusion,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2023, pp. 1931-1941
work page 2023
-
[11]
Cones: Concept neurons in diffusion models for customized generation,
Z. Liu, R. Feng, K. Zhu, Y. Zhang, K. Zheng, Y. Liu, D. Zhao, J. Zhou, and Y. Cao, “Cones: Concept neurons in diffusion models for customized generation,” in Proc. Int. Conf. Mach. Learn. , 2023, pp. 21 548-21 566
work page 2023
-
[12]
Cones 2: customizable image syn- thesis with multiple subjects,
Z. Liu, Y. Zhang, Y. Shen, K. Zheng, K. Zhu, R. Feng, Y. Liu, D. Zhao, J. Zhou, and Y. Cao, “Cones 2: customizable image syn- thesis with multiple subjects,” in Proc. Adv. Neural Inform. Process. Syst., vol. 37, 2024, pp. 57 500-57 519
work page 2024
-
[13]
D. Li, J. Li, and S. Hoi, “Blip-diffusion: Pre-trained subject rep- resentation for controllable text-to-image generation and editing,” in Proc. Adv. Neural Inform. Process. Syst. , vol. 36, 2023, pp. 30 146– 30 166
work page 2023
-
[14]
Con- ceptLab: Creative concept generation using VLM-guided diffusion prior constraints,
E. Richardson, K. Goldberg, Y. Alaluf, and D. Cohen-Or, “Con- ceptLab: Creative concept generation using VLM-guided diffusion prior constraints,” ACM Trans. Graph., vol. 43, no. 3, 2024
work page 2024
-
[15]
Create your world: Lifelong text-to-image diffusion,
G. Sun, W. Liang, J. Dong, J. Li, Z. Ding, and Y. Cong, “Create your world: Lifelong text-to-image diffusion,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 46, no. 9, pp. 6454-6470, 2024
work page 2024
-
[16]
Clic: Concept learning in context,
M. Safaee, A. Mikaeili, O. Patashnik, D. Cohen-Or, and A. Mahdavi-Amiri, “Clic: Concept learning in context,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2024, pp. 6924-6933
work page 2024
-
[17]
Unified concept editing in diffusion models,
R. Gandikota, H. Orgad, Y. Belinkov, J. Materzy ´nska, and D. Bau, “Unified concept editing in diffusion models,” in Proc. IEEE Winter Conf. Appl. Comput. Vis., 2024, pp. 5111-5120
work page 2024
-
[18]
Anti-dreambooth: Protecting users from personalized text-to-image synthesis,
T. Van Le, H. Phung, T. H. Nguyen, Q. Dao, N. N. Tran, and A. Tran, “Anti-dreambooth: Protecting users from personalized text-to-image synthesis,” in Proc. Int. Conf. Comput. Vis. , 2023, pp. 2116-2127
work page 2023
-
[19]
Backdooring textual inversion for concept censorship,
Y. Wu, J. Zhang, F. Kerschbaum, and T. Zhang, “Backdooring textual inversion for concept censorship,” arXiv:2308.10718, 2023
-
[20]
Ablating concepts in text-to-image diffusion models,
N. Kumari, B. Zhang, S.-Y. Wang, E. Shechtman, R. Zhang, and J.-Y. Zhu, “Ablating concepts in text-to-image diffusion models,” in Proc. Int. Conf. Comput. Vis., 2023, pp. 22 691–22 702
work page 2023
-
[21]
One-dimensional adapter to rule them all: Concepts, diffusion models and erasing applications,
M. Lyu, Y. Yang, H. Hong, H. Chen, X. Jin, Y. He, H. Xue, J. Han, and G. Ding, “One-dimensional adapter to rule them all: Concepts, diffusion models and erasing applications,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2024, pp. 7559-7568
work page 2024
-
[22]
Catch you everything everywhere: Guarding textual inversion via concept watermarking,
W. Feng, J. He, J. Zhang, T. Zhang, W. Zhou, W. Zhang, and N. Yu, “Catch you everything everywhere: Guarding textual inversion via concept watermarking,” arXiv:2309.05940, 2023
-
[23]
Degeneration- tuning: Using scrambled grid shield unwanted concepts from stable diffusion,
Z. Ni, L. Wei, J. Li, S. Tang, Y. Zhuang, and Q. Tian, “Degeneration- tuning: Using scrambled grid shield unwanted concepts from stable diffusion,” in Proc. ACM Int. Conf. Multimedia, 2023, p. 8900–8909
work page 2023
-
[24]
Ring-a-bell! how reliable are concept removal methods for diffusion models?
Y.-L. Tsai, C.-Y. Hsu, C. Xie, C.-H. Lin, J. Y. Chen, B. Li, P .-Y. Chen, C.-M. Yu, and C.-Y. Huang, “Ring-a-bell! how reliable are concept removal methods for diffusion models?” in Proc. Int. Conf. Learn. Represent., 2024
work page 2024
-
[25]
Y. Cao, S. Li, Y. Liu, Z. Yan, Y. Dai, P . S. Yu, and L. Sun, “A comprehensive survey of ai-generated content (aigc): A history of generative ai from gan to chatgpt,” arXiv:2303.04226, 2023
-
[26]
Security and privacy on generative data in aigc: A survey,
T. Wang, Y. Zhang, S. Qi, R. Zhao, Z. Xia, and J. Weng, “Security and privacy on generative data in aigc: A survey,” ACM Comput. Surv., 2024
work page 2024
-
[27]
Unleashing the power of edge-cloud generative ai in mobile networks: A survey of aigc services,
M. Xu, H. Du, D. Niyato, J. Kang, Z. Xiong, S. Mao, Z. Han, A. Jamalipour, D. I. Kim, X. Shen et al. , “Unleashing the power of edge-cloud generative ai in mobile networks: A survey of aigc services,” IEEE Commun. Surv. Tutorials, 2024
work page 2024
-
[28]
Multimodal image synthesis and editing: The generative ai era,
F. Zhan, Y. Yu, R. Wu, J. Zhang, S. Lu, L. Liu, A. Kortylewski, C. Theobalt, and E. Xing, “Multimodal image synthesis and editing: The generative ai era,”IEEE Trans. Pattern Anal. Mach. Intell., vol. 45, no. 12, pp. 15 098-15 119, 2023
work page 2023
-
[29]
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” Proc. Adv. Neural Inform. Process. Syst., vol. 27, 2014
work page 2014
-
[30]
Generative adversarial networks in computer vision: A survey and taxonomy,
Z. Wang, Q. She, and T. E. Ward, “Generative adversarial networks in computer vision: A survey and taxonomy,” ACM Comput. Surv., vol. 54, no. 2, 2021
work page 2021
-
[31]
Generative adversarial text to image synthesis,
S. Reed, Z. Akata, X. Yan, L. Logeswaran, B. Schiele, and H. Lee, “Generative adversarial text to image synthesis,” in Proc. Int. Conf. Mach. Learn., 2016, pp. 1060-1069
work page 2016
-
[32]
Rifegan: Rich fea- ture generation for text-to-image synthesis from prior knowledge,
J. Cheng, F. Wu, Y. Tian, L. Wang, and D. Tao, “Rifegan: Rich fea- ture generation for text-to-image synthesis from prior knowledge,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. , 2020, pp. 10 908– 10 917
work page 2020
-
[33]
Unifying multimodal transformer for bi-directional image and text generation,
Y. Huang, H. Xue, B. Liu, and Y. Lu, “Unifying multimodal transformer for bi-directional image and text generation,” in Proc. ACM Int. Conf. Multimedia, 2021, p. 1138–1147
work page 2021
-
[34]
Dae-gan: Dynamic aspect-aware gan for text-to-image synthesis,
S. Ruan, Y. Zhang, K. Zhang, Y. Fan, F. Tang, Q. Liu, and E. Chen, “Dae-gan: Dynamic aspect-aware gan for text-to-image synthesis,” in Proc. Int. Conf. Comput. Vis., 2021, pp. 13 940–13 949
work page 2021
-
[35]
Deep unsupervised learning using nonequilibrium thermodynam- ics,
J. Sohl-Dickstein, E. Weiss, N. Maheswaranathan, and S. Ganguli, “Deep unsupervised learning using nonequilibrium thermodynam- ics,” in Proc. Int. Conf. Mach. Learn., 2015, pp. 2256-2265
work page 2015
-
[36]
Denoising diffusion probabilistic models,
J. Ho, A. Jain, and P . Abbeel, “Denoising diffusion probabilistic models,” in Proc. Adv. Neural Inform. Process. Syst., vol. 33, 2020, pp. 6840–6851
work page 2020
-
[37]
Diffusion models in vision: A survey,
F.-A. Croitoru, V . Hondru, R. T. Ionescu, and M. Shah, “Diffusion models in vision: A survey,” IEEE Trans. Pattern Anal. Mach. Intell. , vol. 45, no. 9, pp. 10 850–10 869, 2023
work page 2023
-
[38]
Diffusion models: A comprehensive survey of methods and applications,
L. Yang, Z. Zhang, Y. Song, S. Hong, R. Xu, Y. Zhao, W. Zhang, B. Cui, and M.-H. Yang, “Diffusion models: A comprehensive survey of methods and applications,” ACM Comput. Surv., vol. 56, no. 4, 2023
work page 2023
-
[39]
Diffusion models beat gans on image synthesis,
P . Dhariwal and A. Nichol, “Diffusion models beat gans on image synthesis,” in Proc. Adv. Neural Inform. Process. Syst. , vol. 34, 2021, pp. 8780–8794
work page 2021
-
[40]
Vector quantized diffusion model for text-to-image synthesis,
S. Gu, D. Chen, J. Bao, F. Wen, B. Zhang, D. Chen, L. Yuan, and B. Guo, “Vector quantized diffusion model for text-to-image synthesis,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. , 2022, pp. 10 686–10 696
work page 2022
-
[41]
Instaflow: One step is enough for high-quality diffusion-based text-to-image gen- eration,
X. Liu, X. Zhang, J. Ma, J. Peng, and qiang liu, “Instaflow: One step is enough for high-quality diffusion-based text-to-image gen- eration,” in Proc. Int. Conf. Learn. Represent., 2024
work page 2024
-
[42]
Hive: Harnessing human feedback for instructional visual editing,
S. Zhang, X. Yang, Y. Feng, C. Qin, C.-C. Chen, N. Yu, Z. Chen, H. Wang, S. Savarese, S. Ermon, C. Xiong, and R. Xu, “Hive: Harnessing human feedback for instructional visual editing,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2024, pp. 9026–9036
work page 2024
-
[43]
K. Huang, K. Sun, E. Xie, Z. Li, and X. Liu, “T2i-compbench: A comprehensive benchmark for open-world compositional text-to- K. XU et al.: DETECTING MALICIOUS CONCEPTS WITHOUT IMAGE GENERATION IN AIGC 14 image generation,” in Proc. Adv. Neural Inform. Process. Syst., vol. 36, 2023, pp. 78 723-78 747
work page 2023
-
[44]
LoRA: Low-rank adaptation of large language models,
E. J. Hu, Y. Shen, P . Wallis, Z. Allen-Zhu, Y. Li, S. Wang, L. Wang, and W. Chen, “LoRA: Low-rank adaptation of large language models,” in Proc. Int. Conf. Learn. Represent., 2022
work page 2022
-
[45]
Concept decomposition for visual exploration and inspiration,
Y. Vinker, A. Voynov, D. Cohen-Or, and A. Shamir, “Concept decomposition for visual exploration and inspiration,” ACM Trans. Graph., vol. 42, no. 6, 2023
work page 2023
-
[46]
Break-a-scene: Extracting multiple concepts from a single image,
O. Avrahami, K. Aberman, O. Fried, D. Cohen-Or, and D. Lischin- ski, “Break-a-scene: Extracting multiple concepts from a single image,” in Proc. SIGGRAPH Asia Conf. Pap., 2023
work page 2023
-
[47]
Catversion: Concatenating embeddings for diffusion-based text-to-image per- sonalization,
R. Zhao, M. Zhu, S. Dong, N. Wang, and X. Gao, “Catversion: Concatenating embeddings for diffusion-based text-to-image per- sonalization,” arXiv:2311.14631, 2023
-
[48]
Styledrop: Text-to-image generation in any style,
K. Sohn, L. Jiang, J. Barber, K. Lee, N. Ruiz, D. Krishnan, H. Chang, Y. Li, I. Essa, M. Rubinstein, Y. Hao, G. Entis, I. Blok, and D. Cas- tro Chin, “Styledrop: Text-to-image generation in any style,” inProc. Adv. Neural Inform. Process. Syst., vol. 36, 2023, pp. 66 860–66 889
work page 2023
-
[49]
Inversion-based style transfer with diffusion models,
Y. Zhang, N. Huang, F. Tang, H. Huang, C. Ma, W. Dong, and C. Xu, “Inversion-based style transfer with diffusion models,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. , 2023, pp. 10 146– 10 156
work page 2023
-
[50]
H. Lu, H. Tunanyan, K. Wang, S. Navasardyan, Z. Wang, and H. Shi, “Specialist diffusion: Plug-and-play sample-efficient fine- tuning of text-to-image diffusion models to learn any unseen style,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. , 2023, pp. 14 267– 14 276
work page 2023
-
[51]
Learning transferable visual models from natural language supervision,
A. Radford, J. W. Kim, C. Hallacy, A. Ramesh, G. Goh, S. Agar- wal, G. Sastry, A. Askell, P . Mishkin, J. Clark, G. Krueger, and I. Sutskever, “Learning transferable visual models from natural language supervision,” in Proc. Int. Conf. Mach. Learn. , 2021, pp. 8748-8763
work page 2021
- [52]
- [53]
-
[54]
Billion-scale similarity search with gpus,
J. Johnson, M. Douze, and H. J ´egou, “Billion-scale similarity search with gpus,” IEEE Trans. Big Data, vol. 7, no. 3, pp. 535–547, 2021
work page 2021
-
[55]
Make-a-video: Text-to-video generation without text-video data,
U. Singer, A. Polyak, T. Hayes, X. Yin, J. An, S. Zhang, Q. Hu, H. Yang, O. Ashual, O. Gafni, D. Parikh, S. Gupta, and Y. Taigman, “Make-a-video: Text-to-video generation without text-video data,” in Proc. Int. Conf. Learn. Represent., 2023
work page 2023
-
[56]
Tune-a-video: One-shot tuning of image diffusion models for text-to-video generation,
J. Z. Wu, Y. Ge, X. Wang, S. W. Lei, Y. Gu, Y. Shi, W. Hsu, Y. Shan, X. Qie, and M. Z. Shou, “Tune-a-video: One-shot tuning of image diffusion models for text-to-video generation,” in Proc. Int. Conf. Comput. Vis., 2023, pp. 7623–7633. Kun Xureceived the B.E. and M.E. degrees from Anhui University of Science and Technology, Huainan, China, in 2020 and 202...
work page 2023
-
[57]
He is currently a Professor with the School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China. His research interests include visual attention modeling, visual quality assess- ment, image retargeting, computer vision, 3D image/video processing
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.