Dengpan Ye

Orcid: 0000-0003-2510-9523

According to our database1, Dengpan Ye authored at least 67 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improving Adversarial Robustness With Adversarial Augmentations.
IEEE Internet Things J., February, 2024

Perceptual Video Hashing With Secure Anti-Noise Model for Social Video Retrieval.
IEEE Internet Things J., January, 2024

AVT2-DWF: Improving Deepfake Detection with Audio-Visual Fusion and Dynamic Weighting Strategies.
CoRR, 2024

Once and for All: Universal Transferable Adversarial Perturbation against Deep Hashing-Based Facial Image Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model.
Comput. J., November, 2023

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping.
CoRR, 2023

Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors.
CoRR, 2023

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Robust Anti-forensics on Audio Forensics System.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Implicit Identity Driven Deepfake Face Swapping Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Detection defense against adversarial attacks with saliency map.
Int. J. Intell. Syst., December, 2022

Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.
Sensors, 2022

Black-Box Adversarial Attacks against Audio Forensics Models.
Secur. Commun. Networks, 2022

Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning.
Proceedings of the IEEE International Conference on Trust, 2022

Robust Video Hashing Based on Local Fluctuation Preserving for Tracking Deep Fake Videos.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Robust ENF Estimation Based on Harmonic Enhancement and Maximum Weight Clique.
IEEE Trans. Inf. Forensics Secur., 2021

Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors.
IEEE Trans. Inf. Forensics Secur., 2021

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021

Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.
Secur. Commun. Networks, 2021

Metric Learning for Anti-Compression Facial Forgery Detection.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Protecting Encrypted Video Stream Against Information Leak Using Adversarial Traces.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Ground-to-Aerial Image Geo-Localization with Cross-View Image Synthesis.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2020
Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT).
Sensors, 2020

Anti-steganalysis for image on convolutional neural networks.
Multim. Tools Appl., 2020

SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application.
J. Netw. Comput. Appl., 2020

NEXT: a neural network framework for next POI recommendation.
Frontiers Comput. Sci., 2020

Reliability of Power System Frequency on Times-Stamping Digital Recordings.
CoRR, 2020

Adaptive Machine learning: A Framework for Active Malware Detection.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

High Accuracy Perceptual Video Hashing via Low-Rank Decomposition and DWT.
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020

Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multim. Tools Appl., 2019

Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Faster and transferable deep learning steganalysis on GPU.
J. Real Time Image Process., 2019

Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.
J. Real Time Image Process., 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet Things J., 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019

Multi-view coupled dictionary learning for person re-identification.
Neurocomputing, 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

Delay-Distance Correlation Study for IP Geolocation.
CoRR, 2019

Heard More Than Heard: An Audio Steganography Method Based on GAN.
CoRR, 2019

Reversible Data Hiding With Image Enhancement Using Histogram Shifting.
IEEE Access, 2019

2018
Big Data Analytics for Information Security.
Secur. Commun. Networks, 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems.
IEEE Access, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
The Concept Drift Problem in Android Malware Detection and Its Solution.
Secur. Commun. Networks, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Secur. Commun. Networks, 2016

Cyber Crime.
Secur. Commun. Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multim. Tools Appl., 2016

Mobile crowd-sensing context aware based fine-grained access control mode.
Multim. Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multim. Tools Appl., 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multim. Tools Appl., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

2015
Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
Int. J. Digit. Crime Forensics, 2014

2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.
Int. J. Comput. Intell. Syst., 2012

Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.
Int. J. Comput. Intell. Syst., 2012

2011
Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011


  Loading...