Wanli Peng

Orcid: 0009-0005-4993-6453

According to our database1, Wanli Peng authored at least 38 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Cognitive Surgery: The Awakening of Implicit Territorial Awareness in LLMs.
CoRR, August, 2025

EditMF: Drawing an Invisible Fingerprint for Your Large Language Models.
CoRR, August, 2025

SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs.
CoRR, August, 2025

BeDKD: Backdoor Defense based on Dynamic Knowledge Distillation and Directional Mapping Modulator.
CoRR, August, 2025

GR-3 Technical Report.
CoRR, July, 2025

Retrieval-Confused Generation is a Good Defender for Privacy Violation Attack of Large Language Models.
CoRR, June, 2025

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models.
CoRR, April, 2025

MiZero: The Shadowy Defender Against Text Style Infringements.
CoRR, April, 2025

ImF: Implicit Fingerprint for Large Language Models.
CoRR, March, 2025

Linguistic Steganalysis Based on Few-Shot Adversarial Training.
IEEE Trans. Dependable Secur. Comput., 2025

Kill two birds with one stone: generalized and robust AI-generated text detection via dynamic perturbations.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

Transparent Object Depth Completion with Stereo Image Guidance.
Proceedings of the Advances in Neural Networks - ISNN 2025, 2025

Watermarking One for All: A Robust Watermarking Scheme Against Partial Image Theft.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2024

Establishing Robust Generative Image Steganography via Popular Stable Diffusion.
IEEE Trans. Inf. Forensics Secur., 2024

A Test-Time Entropy Minimization Method for Cross-Domain Linguistic Steganalysis.
IEEE Signal Process. Lett., 2024

Transparent Object Depth Completion.
CoRR, 2024

From Covert Hiding to Visual Editing: Robust Generative Video Steganography.
CoRR, 2024

Emotion-Aware and Efficient Meme Sticker Dialogue Generation.
Proceedings of the 6th ACM International Conference on Multimedia in Asia, 2024

Generative Text Steganography with Large Language Model.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

From Covert Hiding To Visual Editing: Robust Generative Video Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Road Traffic Accident Data Management and Application Analysis Based on Knowledge Graph Technology.
Proceedings of the 2024 International Conference on Digital Society and Artificial Intelligence, 2024

2023
FunctionalGrasp: Learning Functional Grasp for Robots via Semantic Hand-Object Representation.
IEEE Robotics Autom. Lett., May, 2023

Functional Grasp Transfer Across a Category of Objects From Only one Labeled Instance.
IEEE Robotics Autom. Lett., May, 2023

Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack.
IEEE Signal Process. Lett., 2023

Improved CNN Prediction Based Reversible Data Hiding.
CoRR, 2023

WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

HDTC: Hybrid Model of Dual-Transformer and Convolutional Neural Network from RGB-D for Detection of Lettuce Growth Traits.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
Linguistic Steganography Based on Adaptive Probability Distribution.
IEEE Trans. Dependable Secur. Comput., 2022

Domain Adaptational Text Steganalysis Based on Transductive Learning.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

TransGrasp: Grasp Pose Estimation of a Category of Objects by Transferring Grasps from Only One Labeled Instance.
Proceedings of the Computer Vision - ECCV 2022, 2022

Self-Supervised Category-Level 6D Object Pose Estimation with Deep Implicit Shape Representation.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution.
KSII Trans. Internet Inf. Syst., 2021

2020
IDA-3D: Instance-Depth-Aware 3D Object Detection From Stereo Vision for Autonomous Driving.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2009
Analysis of Transmitter Phase Noise in OFDM System and its Mitigation.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2007
SDBIA: A Novel Approach to Improve the Reading Performance of Large Objects for Object-Based Storage Device.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

2006
Intelligent Multimedia Group of Tsinghua University at TRECVID 2006.
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006


  Loading...