Diqun Yan

Orcid: 0000-0002-5241-7276

According to our database1, Diqun Yan authored at least 88 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern.
IEEE Signal Process. Lett., 2024

Audio steganography cover enhancement via reinforcement learning.
Signal Image Video Process., 2024

2023
Non-intrusive speech quality assessment with attention-based ResNet-BiLSTM.
Signal Image Video Process., October, 2023

Imperceptible adversarial audio steganography based on psychoacoustic model.
Multim. Tools Appl., July, 2023

Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger.
IEEE Signal Process. Lett., 2023

Corrigendum to "Semi-supervised semantic segmentation with cross teacher training" [Neurocomputing 508 (2022) 36-46].
Neurocomputing, 2023

Adversarial Examples Protect Your Privacy on Speech Enhancement System.
Comput. Syst. Sci. Eng., 2023

Adversarial defense based on distribution transfer.
CoRR, 2023

Facial Data Minimization: Shallow Model as Your Privacy Filter.
CoRR, 2023

BadSQA: Stealthy Backdoor Attacks Using Presence Events as Triggers in Non-Intrusive Speech Quality Assessment.
CoRR, 2023

Evil Operation: Breaking Speaker Recognition with PaddingBack.
CoRR, 2023

Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion.
CoRR, 2023

Adaptive-SpEx: Local and Global Perceptual Modeling with Speaker Adaptation for Target Speaker Extraction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Gradient Sign Inversion: Making an Adversarial Attack a Good Defense.
Proceedings of the International Joint Conference on Neural Networks, 2023

A Pseudo-Dual Self-Rectification Framework for Semantic Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Animal Re-Identification Algorithm for Posture Diversity.
Proceedings of the IEEE International Conference on Acoustics, 2023

SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2023

Physically Robust Reversible Watermarking.
Proceedings of the 2023 Workshop on Advanced Multimedia Computing for Smart Manufacturing and Engineering, 2023

2022
NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation.
IEEE Signal Process. Lett., 2022

Anti-forensics of fake stereo audio using generative adversarial network.
Multim. Tools Appl., 2022

Semi-supervised semantic segmentation with cross teacher training.
Neurocomputing, 2022

Black-box adversarial attacks through speech distortion for speech emotion recognition.
EURASIP J. Audio Speech Music. Process., 2022

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations.
CoRR, 2022

Adversarial Privacy Protection on Speech Enhancement.
CoRR, 2022

Transferability of Adversarial Attacks on Synthetic Speech Detection.
CoRR, 2022

Residual-Guided Non-Intrusive Speech Quality Assessment.
CoRR, 2022

Robust Document Image Forgery Localization Against Image Blending.
Proceedings of the IEEE International Conference on Trust, 2022

On Attacking Deep Image Quality Evaluator Via Spatial Transform.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Detection of Synthetic Speech Based on Spectrum Defects.
Proceedings of the DDAM@MM 2022: Proceedings of the 1st International Workshop on Deepfake Detection for Audio Multimedia, 2022

Physical Anti-copying Semi-robust Random Watermarking for QR Code.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

2021
Antiforensics of Speech Resampling Using Dual-Path Strategy.
Wirel. Commun. Mob. Comput., 2021

Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain Adaptation.
IEEE Signal Process. Lett., 2021

Exposing Speech Transsplicing Forgery with Noise Level Inconsistency.
Secur. Commun. Networks, 2021

Defending and Detecting Audio Adversarial Example using Frame Offsets.
KSII Trans. Internet Inf. Syst., 2021

Identification of Fake Stereo Audio Using SVM and CNN.
Inf., 2021

Towards breaking DNN-based audio steganalysis with GAN.
Int. J. Auton. Adapt. Commun. Syst., 2021

Adversarial Attacks on Machinery Fault Diagnosis.
CoRR, 2021

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise.
CoRR, 2021

Identification of fake stereo audio.
CoRR, 2021

Fast speech adversarial example generation for keyword spotting system with conditional GAN.
Comput. Commun., 2021

Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes.
IEEE Access, 2021

Learning to Generate Steganographic Cover for Audio Steganography Using GAN.
IEEE Access, 2021

Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Identification of Synthetic Spoofed Speech with Deep Capsule Network.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

An Antiforensic Method against AMR Compression Detection.
Secur. Commun. Networks, 2020

A Robust Method for Speech Replay Attack Detection.
KSII Trans. Internet Inf. Syst., 2020

Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network.
Int. J. Digit. Multim. Broadcast., 2020

Anti-Forensics of Double Compressed MP3 Audio.
Int. J. Digit. Crime Forensics, 2020

Selecting Optimal Submatrix for Syndrome-Trellis Codes (STCs)-Based Steganography With Segmentation.
IEEE Access, 2020

A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio.
IEEE Access, 2020

Targeted Speech Adversarial Example Generation With Generative Adversarial Network.
IEEE Access, 2020

Post-processing for Enhancing Audio Steganographic Undetectability.
Proceedings of the Security and Privacy in Digital Economy, 2020

Detection of Various Speech Forgery Operations Based on Recurrent Neural Network.
Proceedings of the Security and Privacy in Digital Economy, 2020

Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey.
Proceedings of the Security and Privacy in Digital Economy, 2020

Robust, Imperceptible and End-to-End Audio Steganography Based on CNN.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient Generation of Speech Adversarial Examples with Generative Model.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Towards Designing an Effective Complexity Indicator for Audio Steganography.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Source smartphone identification by exploiting encoding characteristics of recorded speech.
Digit. Investig., 2019

Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum.
Autom. Control. Comput. Sci., 2019

Anti-Forensics of Audio Source Identification Using Generative Adversarial Network.
IEEE Access, 2019

Audio Steganalysis with Improved Convolutional Neural Network.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Compression history detection for MP3 audio.
KSII Trans. Internet Inf. Syst., 2018

Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain.
Inf., 2018

AAC Double Compression Audio Detection Algorithm Based on the Difference of Scale Factor.
Inf., 2018

A Replay Speech Detection Algorithm Based on Sub-band Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

A Replay Voice Detection Algorithm Based on Multi-feature Fusion.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

AAC Audio Compression Detection Based on QMDCT Coefficient.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Steganalysis of MP3Stego with low embedding-rate using Markov feature.
Multim. Tools Appl., 2017

2016
An efficient algorithm for double compressed AAC audio detection.
Multim. Tools Appl., 2016

Source Cell-Phone Identification Using Spectral Features of Device Self-noise.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Audio Tampering Detection Based on Quantization Artifacts.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Detection of MP3Stego exploiting recompression calibration-based feature.
Multim. Tools Appl., 2014

A multipurpose audio aggregation watermarking based on multistage vector quantization.
Multim. Tools Appl., 2014

Detecting Fake-Quality MP3 based on Huffman Table Index.
J. Softw., 2014

Detecting double-compressed MP3 with the Same Bit-rate.
J. Softw., 2014

Detecting Fake-Quality WAV Audio Based on Phase Differences.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A novel detection scheme for MP3Stego with low payload.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Detecting MP3Stego using calibrated side information features.
J. Softw., 2013

Steganalysis for MP3Stego using differential statistics of quantization step.
Digit. Signal Process., 2013

A Huffman Table Index Based Approach to Detect Double MP3 Compression.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
Steganography for MP3 audio by exploiting the rule of window switching.
Comput. Secur., 2012

2011
Huffman table swapping-based steganograpy for MP3 audio.
Multim. Tools Appl., 2011

2009
Quantization Step Parity-based Steganography for MP3 Audio.
Fundam. Informaticae, 2009

2008
Reversible Data Hiding for Audio Based on Prediction Error Expansion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...