Wan-Li Lyu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
WFSS: weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks.
Vis. Intell., 2024

2023
Reversible data hiding based on automatic contrast enhancement using histogram expansion.
J. Vis. Commun. Image Represent., April, 2023

Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace.
Pattern Recognit. Lett., February, 2023

Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization.
CoRR, 2023

Imperceptible Adversarial Attack on S Channel of HSV Colorspace.
Proceedings of the International Joint Conference on Neural Networks, 2023

Improving Transferability Reversible Adversarial Examples Based on Flipping Transformation.
Proceedings of the Data Science, 2023

Local Texture Complexity Guided Adversarial Attack.
Proceedings of the IEEE International Conference on Image Processing, 2023

High-Quality Triggers Based Fragile Watermarking for Optical Character Recognition Model.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial Attacks.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB Substitution and Ring-prediction.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction.
Signal Process., 2022

High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Adversarial Example Defense via Perturbation Grading Strategy.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

2018
High-Capacity Reversible Data Hiding Method for JPEG Images.
J. Softw., 2018

2016
An Image Compression Method Based on Block Truncation Coding and Linear Regression.
J. Inf. Hiding Multim. Signal Process., 2016

Image Authentication and Self-Recovery Scheme Based on The Rehashing Model.
J. Inf. Hiding Multim. Signal Process., 2016

Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Process., 2016

A Perfect Hash Model Used for Image Content Tamper Detection.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

Image Content Authentication and Self-recovery Using Rehashing and Matrix Combined Method.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

A High-Capacity Image Data Hiding Based on Extended EMD-2 Reference Matrix.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

2015
The credit card visual authentication scheme based on GF(28) field.
Multim. Tools Appl., 2015

Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication.
J. Inf. Hiding Multim. Signal Process., 2015

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method.
J. Inf. Hiding Multim. Signal Process., 2015

A novel high-capacity reversible data-hiding scheme using two steganographic images.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

A novel terraced field block based scheme for data hiding.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015


  Loading...