Kejiang Chen

Orcid: 0000-0002-9868-3414

According to our database1, Kejiang Chen authored at least 71 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography.
IEEE Trans. Commun., April, 2024

Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024

Upward Robust Steganography Based on Overflow Alleviation.
IEEE Trans. Multim., 2024

Provably Secure Robust Image Steganography.
IEEE Trans. Multim., 2024

Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Secure and Robust Steganography for Black-Box Generated Images.
IEEE Trans. Inf. Forensics Secur., 2024

DP<sup>2</sup>Dataset Protection by Data Poisoning.
IEEE Trans. Dependable Secur. Comput., 2024

Provably Secure Disambiguating Neural Linguistic Steganography.
CoRR, 2024

Data-Free Hard-Label Robustness Stealing Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023

Robust Steganography for High Quality Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Invertible mask network for face privacy preservation.
Inf. Sci., June, 2023

Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Cover Reproducible Steganography via Deep Generative Models.
IEEE Trans. Dependable Secur. Comput., 2023

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models.
CoRR, 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Performance-lossless Black-box Model Watermarking.
CoRR, 2023

Data-Free Hard-Label Robustness Stealing Attack.
CoRR, 2023

FunctionMarker: Watermarking Language Datasets via Knowledge Injection.
CoRR, 2023

PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model.
CoRR, 2023

GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance.
CoRR, 2023

Watermarking Text Generated by Black-Box Language Models.
CoRR, 2023

Discop: Provably Secure Steganography in Practice Based on "Distribution Copies".
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ProTegO: Protect Text Content against OCR Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

HexT5: Unified Pre-Training for Stripped Binary Code Information Inference.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Calibration-based Steganalysis for Neural Network Steganography.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2023

Image Adversarial Steganography Based on Joint Distortion.
Proceedings of the IEEE International Conference on Acoustics, 2023

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Triangle Mesh Watermarking and Steganography
Springer, ISBN: 978-981-19-7719-0, 2023

2022
Three-Dimensional Mesh Steganography and Steganalysis: A Review.
IEEE Trans. Vis. Comput. Graph., 2022

Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Multim., 2022

Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective.
IEEE Trans. Image Process., 2022

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models.
IEEE Trans. Dependable Secur. Comput., 2022

Improving robust adaptive steganography via minimizing channel errors.
Signal Process., 2022

Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective.
CoRR, 2022

Invertible Mask Network for Face Privacy-Preserving.
CoRR, 2022

Invertible Image Dataset Protection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression.
Proceedings of the IEEE International Conference on Acoustics, 2022

Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2022

Tracing Text Provenance via Context-Aware Lexical Substitution.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Feature-Preserving Tensor Voting Model for Mesh Steganalysis.
IEEE Trans. Vis. Comput. Graph., 2021

Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric.
IEEE Trans. Circuits Syst. Video Technol., 2021

Adversarial batch image steganography against CNN-based pooled steganalysis.
Signal Process., 2021

Improving Dither Modulation based Robust Steganography by Overflow Suppression.
CoRR, 2021

A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking.
CoRR, 2021

Adversarial Examples Detection Beyond Image Space.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
IEEE Trans. Multim., 2020

JPEG Steganography With Estimated Side-Information.
IEEE Trans. Circuits Syst. Video Technol., 2020

Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020

Self-Supervised Adversarial Training.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Distortion Design for Secure Adaptive 3-D Mesh Steganography.
IEEE Trans. Multim., 2019

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Reversible Data Hiding in Color Image With Grayscale Invariance.
IEEE Trans. Circuits Syst. Video Technol., 2019

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection.
Multim. Tools Appl., 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Targeted attack and security enhancement on texture synthesis based steganography.
J. Vis. Commun. Image Represent., 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Provably Secure Steganography on Generative Media.
CoRR, 2018

Improving the Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Provably Secure Generative Steganography Based on Autoregressive Model.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
Comments on "Steganography Using Reversible Texture Synthesis".
IEEE Trans. Image Process., 2017

2016
Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016


  Loading...