Hao Wang

Orcid: 0000-0003-4139-8193

Affiliations:
  • Nanjing University of Science and Technology, School of Automation, Department of Computer and Software, China


According to our database1, Hao Wang authored at least 12 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Underwater image enhancement based on multiscale fusion generative adversarial network.
Int. J. Mach. Learn. Cybern., April, 2024

Trustworthy adaptive adversarial perturbations in social networks.
J. Inf. Secur. Appl., February, 2024

Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

2023
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

2022
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022

2021
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

2020
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020

Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform.
KSII Trans. Internet Inf. Syst., 2020

2019
Detection of Triple JPEG Compressed Color Images.
IEEE Access, 2019

2017
Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016

2015
A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size.
J. Inf. Hiding Multim. Signal Process., 2015


  Loading...