Bin Ma
Orcid: 0000-0002-9030-7393Affiliations:
- Qilu University of Technology, School of Cyber Security, Jinan, China
- New Jersey Institute of Technology at Newark, NJ, USA (2013 - 2015)
- Shandong University of Political Science and Law, School of Information Science, Jinan, China (2008 - 2013)
- Shandong University, Jinan, China (PhD 2008)
According to our database1,
Bin Ma
authored at least 125 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Insight Rumors: A Novel Textual Rumor Locating and Marking Model Leveraging Att_BiMamba2 Network.
CoRR, August, 2025
A Cross-Modal Rumor Detection Scheme via Contrastive Learning by Exploring Text and Image internal Correlations.
CoRR, August, 2025
Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances.
IEEE Trans. Artif. Intell., July, 2025
A High-Performance Region Recognition Network-Enhanced Deep CNN for Image Content Perceptual Hashing.
IEEE Internet Things J., July, 2025
Privacy-Preserving IoT Image Transmission: Multistage SVD Data Embedding and Heatmap Alignment.
IEEE Internet Things J., July, 2025
Color Image High-Capacity Differential Steganography Algorithm Based on Multiple Adversarial Networks.
IEEE Trans. Circuits Syst. Video Technol., April, 2025
Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025
IEEE Trans. Circuits Syst. Video Technol., February, 2025
Paradoxical Role of Adversarial Attacks: Enabling Crosslinguistic Attacks and Information Hiding in Multilingual Speech Recognition.
IEEE Signal Process. Lett., 2025
IEEE Signal Process. Lett., 2025
IEEE Signal Process. Lett., 2025
IEEE Signal Process. Lett., 2025
IEEE Signal Process. Lett., 2025
One-class network leveraging spectro-temporal features for generalized synthetic speech detection.
Speech Commun., 2025
A GAN-based anti-forensics method by modifying the quantization table in JPEG header file.
J. Vis. Commun. Image Represent., 2025
LDSGAN: Unsupervised Image-to-Image Translation With Long-Domain Search GAN for Generating High-Quality Anime Images.
Int. J. Intell. Syst., 2025
Digit. Investig., 2025
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024
A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments.
IEEE Trans. Circuits Syst. Video Technol., April, 2024
J. Inf. Secur. Appl., February, 2024
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
IEEE Trans. Circuits Syst. II Express Briefs, January, 2024
Reversible data hiding algorithm based on adaptive prediction and code division multiplexing.
Multim. Tools Appl., January, 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
J. Inf. Secur. Appl., 2024
Improving the transferability of adversarial examples through black-box feature attacks.
Neurocomputing, 2024
Eng. Appl. Artif. Intell., 2024
PWPH: Proactive Deepfake Detection Method Based on Watermarking and Perceptual Hashing.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm.
Proceedings of the PRICAI 2024: Trends in Artificial Intelligence, 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
LCRPS: Large-Capacity Residual Plane Steganography Based on Multiple Adversarial Networks.
Proceedings of the Neural Information Processing - 31st International Conference, 2024
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Expert Syst. Appl., December, 2023
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition.
J. Inf. Secur. Appl., November, 2023
J. Vis. Commun. Image Represent., September, 2023
A multi-level sorting prediction enhancement-based two-dimensional reversible data hiding algorithm for JPEG images.
Digit. Signal Process., September, 2023
Enhancing the security of image steganography via multiple adversarial networks and channel attention modules.
Digit. Signal Process., September, 2023
Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order Exponent-Fourier moments.
Digit. Signal Process., August, 2023
Reversible data hiding based on prediction-error value ordering and multiple-embedding.
Signal Process., June, 2023
Expert Syst. Appl., May, 2023
ACM Trans. Multim. Comput. Commun. Appl., February, 2023
PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems.
Int. J. Semantic Web Inf. Syst., February, 2023
Sedenion polar harmonic Fourier moments and their application in multi-view color image watermarking.
Signal Process., 2023
High-performance reversible data hiding based on ridge regression prediction algorithm.
Signal Process., 2023
Geometrical attacks resilient statistical watermark decoder using polar harmonic Fourier moments.
J. Frankl. Inst., 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples.
CoRR, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum.
Proceedings of the International Joint Conference on Neural Networks, 2023
2022
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022
Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss.
IEEE Trans. Circuits Syst. Video Technol., 2022
Fast Expansion-Bins-Determination for Multiple Histograms Modification Based Reversible Data Hiding.
IEEE Signal Process. Lett., 2022
Multim. Tools Appl., 2022
A high-performance insulators location scheme based on YOLOv4 deep learning network with GDIoU loss function.
IET Image Process., 2022
Eng. Appl. Artif. Intell., 2022
A robust zero-watermarking algorithm for lossless copyright protection of medical images.
Appl. Intell., 2022
Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.
IEEE Trans. Circuits Syst. Video Technol., 2021
High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding.
IEEE Signal Process. Lett., 2021
Invariant Image Representation Using Novel Fractional-Order Polar Harmonic Fourier Moments.
Sensors, 2021
Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding.
Secur. Commun. Networks, 2021
Medical image super-resolution via deep residual neural network in the shearlet domain.
Multim. Tools Appl., 2021
A reversible data hiding algorithm for audio files based on code division multiplexing.
Multim. Tools Appl., 2021
Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images.
Knowl. Based Syst., 2021
Double Medical Images Zero-Watermarking Algorithm Based on the Chaotic System and Ternary Accurate Polar Complex Exponential Transform.
J. Math. Imaging Vis., 2021
Inf. Sci., 2021
Octonion continuous orthogonal moments and their applications in color stereoscopic image reconstruction and zero-watermarking.
Eng. Appl. Artif. Intell., 2021
Novel quaternion polar complex exponential transform and its application in color image zero-watermarking.
Digit. Signal Process., 2021
Comput. Syst. Sci. Eng., 2021
Appl. Soft Comput., 2021
Appl. Math. Comput., 2021
Corrigendum to "Fractional-order quaternion exponential moments for color images" [Applied Mathematics and Computation 400 (2021) 126061].
Appl. Math. Comput., 2021
Appl. Math. Comput., 2021
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
A Generalized Optimization Embedded Framework of Undersampling Ensembles for Imbalanced Classification.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021
A New Classification Algorithm and a New Oversampling Method of Mapping Common Data Elements to the BRIDG Model.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
SURFR: A Real-Time Platform for Non-Coding RNA Fragmentation Analysis Using Wavelets.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
Proceedings of the Asian Conference on Machine Learning, 2021
2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping.
Signal Process., 2020
Secur. Commun. Networks, 2020
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis.
BMC Medical Informatics Decis. Mak., 2020
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology.
BMC Medical Informatics Decis. Mak., 2020
Comput. Syst. Sci. Eng., 2020
A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks.
IEEE Access, 2020
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.
Secur. Commun. Networks, 2019
BMC Medical Informatics Decis. Mak., 2019
Adaptive error prediction method based on multiple linear regression for reversible data hiding.
J. Real Time Image Process., 2019
A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images.
J. Real Time Image Process., 2019
Int. J. Digit. Crime Forensics, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
Use CPET data to predict the intervention effect of aerobic exercise on young hypertensive patients.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
2018
J. Vis. Commun. Image Represent., 2018
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
High Speed Pharmaceutical Packaging Detection System Based on Genetic Algorithm and Memory Optimization.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018
2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
2014
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014