Weiming Zhang

Orcid: 0000-0001-5576-6108

Affiliations:
  • University of Science and Technology of China, School of Cyber Science and Security, CAS Key Laboratory of Electro-magnetic Space Information, Hefei, Anhui, China
  • Zhengzhou Information Science and Technology Institute, Zhengzhou, China (PhD 2005)


According to our database1, Weiming Zhang authored at least 287 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Robust Database Watermarking Scheme That Preserves Statistical Characteristics.
IEEE Trans. Knowl. Data Eng., June, 2024

LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography.
IEEE Trans. Commun., April, 2024

Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024

Deep Image Matting With Sparse User Interactions.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024

ControlFace: Feature Disentangling for Controllable Face Swapping.
J. Imaging, January, 2024

Upward Robust Steganography Based on Overflow Alleviation.
IEEE Trans. Multim., 2024

Provably Secure Robust Image Steganography.
IEEE Trans. Multim., 2024

PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition.
IEEE Trans. Image Process., 2024

Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Secure and Robust Steganography for Black-Box Generated Images.
IEEE Trans. Inf. Forensics Secur., 2024

DP<sup>2</sup>Dataset Protection by Data Poisoning.
IEEE Trans. Dependable Secur. Comput., 2024

Provably Secure Disambiguating Neural Linguistic Steganography.
CoRR, 2024

GoodSAM: Bridging Domain and Capacity Gaps via Segment Anything Model for Distortion-aware Panoramic Semantic Segmentation.
CoRR, 2024

Model X-ray: Detect Backdoored Models via Decision Boundary.
CoRR, 2024

FaceRSA: RSA-Aware Facial Identity Cryptography Framework.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Data-Free Hard-Label Robustness Stealing Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Enhancing image steganography via adversarial optimization of the stego distribution.
Signal Process., November, 2023

Measuring the Consistency and Diversity of 3D Face Generation.
IEEE J. Sel. Top. Signal Process., November, 2023

Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023

Robust Steganography for High Quality Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Deepfacelab: Integrated, flexible and extensible face-swapping framework.
Pattern Recognit., September, 2023

Invertible mask network for face privacy preservation.
Inf. Sci., June, 2023

A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding.
IEEE Trans. Serv. Comput., 2023

Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2023

No-reference Quality Assessment for Contrast-distorted Images Based on Gray and Color-gray-difference Space.
ACM Trans. Multim. Comput. Commun. Appl., 2023

OAcode: Overall Aesthetic 2D Barcode on Screen.
IEEE Trans. Multim., 2023

Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes.
IEEE Trans. Multim., 2023

De-END: Decoder-Driven Watermarking Network.
IEEE Trans. Multim., 2023

Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM.
IEEE Trans. Dependable Secur. Comput., 2023

Cover Reproducible Steganography via Deep Generative Models.
IEEE Trans. Dependable Secur. Comput., 2023

Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code.
IEEE Trans. Dependable Secur. Comput., 2023

Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks.
IEEE Signal Process. Lett., 2023

Language universal font watermarking with multiple cross-media robustness.
Signal Process., 2023

Coherent adversarial deepfake video generation.
Signal Process., 2023

Unauthorized AI cannot recognize me: Reversible adversarial example.
Pattern Recognit., 2023

A Robust Approach to Multimodal Deepfake Detection.
J. Imaging, 2023

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models.
CoRR, 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Performance-lossless Black-box Model Watermarking.
CoRR, 2023

Data-Free Hard-Label Robustness Stealing Attack.
CoRR, 2023

Detecting Voice Cloning Attacks via Timbre Watermarking.
CoRR, 2023

OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation.
CoRR, 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

FunctionMarker: Watermarking Language Datasets via Knowledge Injection.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

Aparecium: Revealing Secrets from Physical Photographs.
CoRR, 2023

Test-Time Adaptation for Nighttime Color-Thermal Semantic Segmentation.
CoRR, 2023

GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance.
CoRR, 2023

Watermarking Text Generated by Black-Box Language Models.
CoRR, 2023

Deep Learning for Event-based Vision: A Comprehensive Survey and Benchmarks.
CoRR, 2023

VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum.
CoRR, 2023

Discop: Provably Secure Steganography in Practice Based on "Distribution Copies".
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ProTegO: Protect Text Content against OCR Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

HexT5: Unified Pre-Training for Stripped Binary Code Information Inference.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Calibration-based Steganalysis for Neural Network Steganography.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023

Transbuilding: An End-to-End Polygonal Building Extraction with Transformers.
Proceedings of the IEEE International Conference on Image Processing, 2023

It Wasn't Me: Irregular Identity in Deepfake Videos.
Proceedings of the IEEE International Conference on Image Processing, 2023

HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2023

Image Adversarial Steganography Based on Joint Distortion.
Proceedings of the IEEE International Conference on Acoustics, 2023

Diversity-Aware Meta Visual Prompting.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

AnisoTag: 3D Printed Tag on 2D Surface via Reflection Anisotropy.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

DeAR: A Deep-Learning-Based Audio Re-recording Resilient Watermarking.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Triangle Mesh Watermarking and Steganography
Springer, ISBN: 978-981-19-7719-0, 2023

2022
Three-Dimensional Mesh Steganography and Steganalysis: A Review.
IEEE Trans. Vis. Comput. Graph., 2022

JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud.
IEEE Trans. Serv. Comput., 2022

Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Multim., 2022

TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022

Poison Ink: Robust and Invisible Backdoor Attack.
IEEE Trans. Image Process., 2022

E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion.
IEEE Trans. Image Process., 2022

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models.
IEEE Trans. Dependable Secur. Comput., 2022

A High Visual Quality Color Image Reversible Data Hiding Scheme Based on B-R-G Embedding Principle and CIEDE2000 Assessment Metric.
IEEE Trans. Circuits Syst. Video Technol., 2022

Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.
IEEE Trans. Circuits Syst. Video Technol., 2022

Improving robust adaptive steganography via minimizing channel errors.
Signal Process., 2022

Deep Model Intellectual Property Protection via Deep Watermarking.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Reversible data hiding with enhancing contrast and preserving brightness in medical image.
J. Inf. Secur. Appl., 2022

Robustness enhancement against adversarial steganography via steganalyzer outputs.
J. Inf. Secur. Appl., 2022

A motional but temporally consistent physical video examples.
J. Inf. Secur. Appl., 2022

Deep 3D mesh watermarking with self-adaptive robustness.
Cybersecur., 2022

CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet.
CoRR, 2022

X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion.
CoRR, 2022

PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition.
CoRR, 2022

Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images.
CoRR, 2022

Invertible Mask Network for Face Privacy-Preserving.
CoRR, 2022

Protecting Celebrities with Identity Consistency Transformer.
CoRR, 2022

Self-supervised Transformer for Deepfake Detection.
CoRR, 2022

Certified defense against patch attacks via mask-guided randomized smoothing.
Sci. China Inf. Sci., 2022

Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Font Watermarking Network for Text Images.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Capturing the Lighting Inconsistency for Deepfake Detection.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Noise Simulation-Based Deep Optical Watermarking.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

ADT: Anti-Deepfake Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2022

An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression.
Proceedings of the IEEE International Conference on Acoustics, 2022

Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2022

Bootstrapped Masked Autoencoders for Vision BERT Pretraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

HairCLIP: Design Your Hair by Text and Reference Image.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Shape-invariant 3D Adversarial Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Protecting Celebrities from DeepFake with Identity Consistency Transformer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Tracing Text Provenance via Context-Aware Lexical Substitution.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Feature-Preserving Tensor Voting Model for Mesh Steganalysis.
IEEE Trans. Vis. Comput. Graph., 2021

Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
IEEE Trans. Inf. Forensics Secur., 2021

BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2021

Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry.
IEEE Trans. Circuits Syst. Video Technol., 2021

Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2021

Deep Template-Based Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2021

Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric.
IEEE Trans. Circuits Syst. Video Technol., 2021

Adversarial batch image steganography against CNN-based pooled steganalysis.
Signal Process., 2021

Adversarial steganography based on sparse cover enhancement.
J. Vis. Commun. Image Represent., 2021

Improving UNIWARD distortion function via isotropic construction and hierarchical merging.
J. Vis. Commun. Image Represent., 2021

<i>CDAE</i>: Color decomposition-based adversarial examples for screen devices.
Inf. Sci., 2021

Adversarial defense via self-orthogonal randomization super-network.
Neurocomputing, 2021

A novel reversible data hiding based on adaptive block-partition and payload-allocation method.
IET Image Process., 2021

Face Swapping Consistency Transfer with Neural Identity Carrier.
Future Internet, 2021

PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers.
CoRR, 2021

Improving Dither Modulation based Robust Steganography by Overflow Suppression.
CoRR, 2021

Deep 3D Mesh Watermarking with Self-Adaptive Robustness.
CoRR, 2021

Poison Ink: Robust and Invisible Backdoor Attack.
CoRR, 2021

Exploring Structure Consistency for Deep Model Watermarking.
CoRR, 2021

A Simple Baseline for StyleGAN Inversion.
CoRR, 2021

A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking.
CoRR, 2021

GDroid: Android malware detection and classification with graph convolutional network.
Comput. Secur., 2021

3D Print-Scan Resilient Localized Mesh Watermarking.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

A lightweight framework for function name reassignment based on large-scale stripped binaries.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Towards More Powerful Multi-column Convolutional Network for Crowd Counting.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Adversarial Examples Detection Beyond Image Space.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Multi-Attentional Deepfake Detection.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
IEEE Trans. Multim., 2020

Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020

Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

JPEG Steganography With Estimated Side-Information.
IEEE Trans. Circuits Syst. Video Technol., 2020

A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents.
IEEE Trans. Circuits Syst. Video Technol., 2020

Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020

Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes.
IEEE Trans. Commun., 2020

A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images.
IEEE Signal Process. Lett., 2020

Rate-distortion model for grayscale-invariance reversible data hiding.
Signal Process., 2020

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020

Real-time attacks on robust watermarking tools in the wild by CNN.
J. Real Time Image Process., 2020

Identity-Driven DeepFake Detection.
CoRR, 2020

DeepFaceLab: A simple, flexible and extensible face swapping framework.
CoRR, 2020

Passport-aware Normalization for Deep Model Protection.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

GreedyFool: Distortion-Aware Sparse Adversarial Attack.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

From Image to Code: Executable Adversarial Examples of Android Applications.
Proceedings of the ICCAI '20: 2020 6th International Conference on Computing and Artificial Intelligence, 2020

Self-Supervised Adversarial Training.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Robust Superpixel-Guided Attentional Adversarial Attack.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Self-Robust 3D Point Recognition via Gather-Vector Guidance.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Distortion Design for Secure Adaptive 3-D Mesh Steganography.
IEEE Trans. Multim., 2019

Screen-Shooting Resilient Watermarking.
IEEE Trans. Inf. Forensics Secur., 2019

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection.
IEEE Trans. Circuits Syst. Video Technol., 2019

Reversible Data Hiding in Color Image With Grayscale Invariance.
IEEE Trans. Circuits Syst. Video Technol., 2019

On the Security of Secret Sharing Over a Ring and the Fast Implementation.
IEEE Signal Process. Lett., 2019

Content-adaptive reversible visible watermarking in encrypted images.
Signal Process., 2019

Detection of Dummy Trajectories Using Convolutional Neural Networks.
Secur. Commun. Networks, 2019

A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multim. Tools Appl., 2019

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection.
Multim. Tools Appl., 2019

A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multim. Tools Appl., 2019

Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras.
IEEE Internet Things J., 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures.
CoRR, 2019

Potential risk of IoT device supporting IR remote control.
Comput. Networks, 2019

A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption.
IEEE Access, 2019

JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds.
IEEE Access, 2019

Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019

UnseenCode: Invisible On-screen Barcode with Image-based Extraction.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Query-Free Embedding Attack Against Deep Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Direct Adversarial Attack on Stego Sandwiched Between Black Boxes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Emerging applications of reversible data hiding.
Proceedings of the 2nd International Conference on Image and Graphics Processing, 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models.
IEEE Trans. Multim., 2018

Reversible Data Hiding Under Inconsistent Distortion Metrics.
IEEE Trans. Image Process., 2018

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Dependable Secur. Comput., 2018

Reversible data hiding in JPEG image based on DCT frequency and block selection.
Signal Process., 2018

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multim. Tools Appl., 2018

Which gray level should be given the smallest cost for adaptive steganography?
Multim. Tools Appl., 2018

Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multim. Tools Appl., 2018

Targeted attack and security enhancement on texture synthesis based steganography.
J. Vis. Commun. Image Represent., 2018

Reversible visual transformation via exploring the correlations within color images.
J. Vis. Commun. Image Represent., 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Provably Secure Steganography on Generative Media.
CoRR, 2018

CAAD 2018: Iterative Ensemble Adversarial Attack.
CoRR, 2018

CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018

Reversible Adversarial Examples.
CoRR, 2018

Detecting Adversarial Examples Based on Steganalysis.
CoRR, 2018

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018

Improving the Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Provably Secure Generative Steganography Based on Autoregressive Model.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Text Semantic Steganalysis Based on Word Embedding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Covert Communication by Exploring Statistical and Linguistical Distortion in Text.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Comments on "Steganography Using Reversible Texture Synthesis".
IEEE Trans. Image Process., 2017

A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

Decomposing Joint Distortion for Adaptive Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2017

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
Secur. Commun. Networks, 2017

A Cloud-User Protocol Based on Ciphertext Watermarking Technology.
Secur. Commun. Networks, 2017

Unified entropy-based sorting for reversible data hiding.
Multim. Tools Appl., 2017

Optimal structural similarity constraint for reversible data hiding.
Multim. Tools Appl., 2017

Semi-order preserving encryption.
Inf. Sci., 2017

Enhanced Attacks on Defensively Distilled Deep Neural Networks.
CoRR, 2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators.
CoRR, 2017

Secure Image Denoising over Two Clouds.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Probability-p Order-Preserving Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Range Queries on Two Column Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Secure Nonlocal Denoising in Outsourced Images.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Reversible Data Hiding in Encrypted Images by Reversible Image Transformation.
IEEE Trans. Multim., 2016

Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Process., 2016

Improving visual quality of reversible data hiding by twice sorting.
Multim. Tools Appl., 2016

Protecting patient confidential information based on ECG reversible data hiding.
Multim. Tools Appl., 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016

Image camouflage by reversible image transformation.
J. Vis. Commun. Image Represent., 2016

Reversible data hiding in medical images with enhanced contrast in texture area.
Digit. Signal Process., 2016

Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Second Order Perdicting-Error Sorting for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016

Reversible image processing via reversible data hiding.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Reversible Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Process., 2015

Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Inf. Forensics Secur., 2015

Efficient Reversible Data Hiding Based on Multiple Histograms Modification.
IEEE Trans. Inf. Forensics Secur., 2015

Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2015

Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015

Matrix embedding in finite abelian group.
Signal Process., 2015

Defining embedding distortion for motion vector-based video steganography.
Multim. Tools Appl., 2015

A further study of large payloads matrix embedding.
Inf. Sci., 2015

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

PVO-based reversible data hiding for encrypted images.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Reversibility improved data hiding in encrypted images.
Signal Process., 2014

Recursive code construction for reversible data hiding in DCT domain.
Multim. Tools Appl., 2014

Reversible Data Hiding for DNA Sequences and Its Applications.
Int. J. Digit. Crime Forensics, 2014

Optimizing Non-Local Pixel Predictors for Reversible Data Hiding.
Int. J. Digit. Crime Forensics, 2014

Towards optimal noise distribution for privacy preserving in data aggregation.
Comput. Secur., 2014

Adaptive ±1 Steganography in Extended Noisy Region.
Comput. J., 2014

Non-local Denoising in Encrypted Images.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A brief review on reversible data hiding: Current techniques and future prospects.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

Fast tamper location of batch DNA sequences based on reversible data hiding.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

2013
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Process., 2013

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

Tamper restoration on DNA sequences based on reversible data hiding.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2012
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Process., 2012

Fast Matrix Embedding by Matrix Extending.
IEEE Trans. Inf. Forensics Secur., 2012

A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Capacity-Approaching Codes for Reversible Data Hiding.
Proceedings of the Information Hiding - 13th International Conference, 2011

Dynamic Background Subtraction Using Spatial-Color Binary Patterns.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
Generalization and Analysis of the Paper Folding Method for Steganography.
IEEE Trans. Inf. Forensics Secur., 2010


  Loading...