Weike You

Orcid: 0000-0002-2642-6005

According to our database1, Weike You authored at least 14 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reversible data hiding using a transformer predictor and an adaptive embedding strategy.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Unearthing Common Inconsistency for Generalisable Deepfake Detection.
CoRR, 2023

Facial Parameter Splicing: A Novel Approach to Efficient Talking Face Generation.
Proceedings of the ACM Multimedia Asia 2023, 2023

Efficient Chinese Relation Extraction with Multi-entity Dependency Tree Pruning and Path-Fusion.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Fixing Domain Bias for Generalized Deepfake Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Fake Face Images Detection and Identification of Celebrities Based on Semantic Segmentation.
IEEE Signal Process. Lett., 2022

Linguistic Steganalysis Merging Semantic and Statistical Features.
IEEE Signal Process. Lett., 2022

Protecting World Leader Using Facial Speaking Pattern Against Deepfakes.
IEEE Signal Process. Lett., 2022

2021
A Siamese CNN for Image Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2021

2020
A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering.
IEEE Access, 2020

2019
RestegNet: a residual steganalytic network.
Multim. Tools Appl., 2019

Adaptive VP8 Steganography Based on Deblocking Filtering.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2017
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017


  Loading...