Weiming Zhang

According to our database1, Weiming Zhang authored at least 161 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Distortion Design for Secure Adaptive 3-D Mesh Steganography.
IEEE Trans. Multimedia, 2019

Screen-Shooting Resilient Watermarking.
IEEE Trans. Information Forensics and Security, 2019

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Information Forensics and Security, 2019

Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection.
IEEE Trans. Circuits Syst. Video Techn., 2019

Reversible Data Hiding in Color Image With Grayscale Invariance.
IEEE Trans. Circuits Syst. Video Techn., 2019

On the Security of Secret Sharing Over a Ring and the Fast Implementation.
IEEE Signal Process. Lett., 2019

Detection of Dummy Trajectories Using Convolutional Neural Networks.
Security and Communication Networks, 2019

A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multimedia Tools Appl., 2019

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection.
Multimedia Tools Appl., 2019

A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multimedia Tools Appl., 2019

A fast coding method for distortion-free data hiding in high dynamic range image.
J. Real-Time Image Processing, 2019

Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras.
IEEE Internet of Things Journal, 2019

Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation.
IJDCF, 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Processing, 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Processing, 2019

Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
CoRR, 2019

Neural Machine Reading Comprehension: Methods and Trends.
CoRR, 2019

Edge Federation: Towards an Integrated Service Provisioning Model.
CoRR, 2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures.
CoRR, 2019

Potential risk of IoT device supporting IR remote control.
Computer Networks, 2019

A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption.
IEEE Access, 2019

JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds.
IEEE Access, 2019

Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019

UnseenCode: Invisible On-screen Barcode with Image-based Extraction.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Query-Free Embedding Attack Against Deep Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Learning to Select User-Specific Features for Top-N Recommendation of New Items.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

2018
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models.
IEEE Trans. Multimedia, 2018

Reversible Data Hiding Under Inconsistent Distortion Metrics.
IEEE Trans. Image Processing, 2018

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Dependable Sec. Comput., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Processing, 2018

Reversible data hiding in JPEG image based on DCT frequency and block selection.
Signal Processing, 2018

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multimedia Tools Appl., 2018

Which gray level should be given the smallest cost for adaptive steganography?
Multimedia Tools Appl., 2018

Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multimedia Tools Appl., 2018

Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multimedia Tools Appl., 2018

Targeted attack and security enhancement on texture synthesis based steganography.
J. Visual Communication and Image Representation, 2018

Reversible visual transformation via exploring the correlations within color images.
J. Visual Communication and Image Representation, 2018

A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images.
IJDCF, 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Provably Secure Steganography on Generative Media.
CoRR, 2018

CAAD 2018: Iterative Ensemble Adversarial Attack.
CoRR, 2018

Emerging Applications of Reversible Data Hiding.
CoRR, 2018

CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018

Reversible Adversarial Examples.
CoRR, 2018

Detecting Adversarial Examples Based on Steganalysis.
CoRR, 2018

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018

From Partition-Based Clustering to Density-Based Clustering: Fast Find Clusters With Diverse Shapes and Densities in Spatial Databases.
IEEE Access, 2018

Interactive Temporal Recurrent Convolution Network for Traffic Prediction in Data Centers.
IEEE Access, 2018

Cyber Security Inference Based on a Two-Level Bayesian Network Framework.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Improving the Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Provably Secure Generative Steganography Based on Autoregressive Model.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Bottleneck Identification of Extended Flexible Job Shop Scheduling Problem.
Proceedings of the 6th International Symposium on Computational and Business Intelligence, 2018

Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Text Semantic Steganalysis Based on Word Embedding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Covert Communication by Exploring Statistical and Linguistical Distortion in Text.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Comments on "Steganography Using Reversible Texture Synthesis".
IEEE Trans. Image Processing, 2017

A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Information Forensics and Security, 2017

Decomposing Joint Distortion for Adaptive Steganography.
IEEE Trans. Circuits Syst. Video Techn., 2017

An Extended Flexible Job Shop Scheduling Model for Flight Deck Scheduling with Priority, Parallel Operations, and Sequence Flexibility.
Scientific Programming, 2017

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
Security and Communication Networks, 2017

A Cloud-User Protocol Based on Ciphertext Watermarking Technology.
Security and Communication Networks, 2017

Unified entropy-based sorting for reversible data hiding.
Multimedia Tools Appl., 2017

Optimal structural similarity constraint for reversible data hiding.
Multimedia Tools Appl., 2017

Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multimedia Tools Appl., 2017

Semi-order preserving encryption.
Inf. Sci., 2017

Paint thickness simulation for painting robot trajectory planning: a review.
Industrial Robot, 2017

Enhanced Attacks on Defensively Distilled Deep Neural Networks.
CoRR, 2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators.
CoRR, 2017

Attention-Based Memory Network for Sentence-Level Question Answering.
Proceedings of the Social Media Processing - 6th National Conference, 2017

A framework for key element evaluation of combat system.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Secure Image Denoising over Two Clouds.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Probability-p Order-Preserving Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Shape-Based Analysis for Vessel Trajectories.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Range Queries on Two Column Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Two-Step Joint Attention Network for Visual Question Answering.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Multiple DAGs Learning with Non-negative Matrix Factorization.
Proceedings of the 3rd Workshop on Advanced Methodologies for Bayesian Networks, 2017

2016
Secure Nonlocal Denoising in Outsourced Images.
TOMCCAP, 2016

Reversible Data Hiding in Encrypted Images by Reversible Image Transformation.
IEEE Trans. Multimedia, 2016

Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Processing, 2016

Improving visual quality of reversible data hiding by twice sorting.
Multimedia Tools Appl., 2016

Protecting patient confidential information based on ECG reversible data hiding.
Multimedia Tools Appl., 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multimedia Tools Appl., 2016

Image camouflage by reversible image transformation.
J. Visual Communication and Image Representation, 2016

Design of redundant robot painting system for long non-regular duct.
Industrial Robot, 2016

Reversible data hiding in medical images with enhanced contrast in texture area.
Digital Signal Processing, 2016

Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Second Order Perdicting-Error Sorting for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016

Reversible image processing via reversible data hiding.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Reversible Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Processing, 2015

Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Information Forensics and Security, 2015

Efficient Reversible Data Hiding Based on Multiple Histograms Modification.
IEEE Trans. Information Forensics and Security, 2015

Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Information Forensics and Security, 2015

Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommunication Systems, 2015

Matrix embedding in finite abelian group.
Signal Processing, 2015

Defining embedding distortion for motion vector-based video steganography.
Multimedia Tools Appl., 2015

A further study of large payloads matrix embedding.
Inf. Sci., 2015

Semantic image compression based on data hiding.
IET Image Processing, 2015

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

PVO-based reversible data hiding for encrypted images.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Reversible steganography: Data hiding for covert storage.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Reversibility improved data hiding in encrypted images.
Signal Processing, 2014

Recursive code construction for reversible data hiding in DCT domain.
Multimedia Tools Appl., 2014

Reversible Data Hiding for DNA Sequences and Its Applications.
IJDCF, 2014

Optimizing Non-Local Pixel Predictors for Reversible Data Hiding.
IJDCF, 2014

Towards optimal noise distribution for privacy preserving in data aggregation.
Computers & Security, 2014

Adaptive ±1 Steganography in Extended Noisy Region.
Comput. J., 2014

Non-local Denoising in Encrypted Images.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A brief review on reversible data hiding: Current techniques and future prospects.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

Fast tamper location of batch DNA sequences based on reversible data hiding.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

2013
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Processing, 2013

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Information Forensics and Security, 2013

A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification.
IEEE Trans. Information Forensics and Security, 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Information Forensics and Security, 2013

Cryptographic Secrecy Analysis of Matrix Embedding.
Int. J. Comput. Intell. Syst., 2013

Tamper restoration on DNA sequences based on reversible data hiding.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2012
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Processing, 2012

Fast Matrix Embedding by Matrix Extending.
IEEE Trans. Information Forensics and Security, 2012

Acarp: Author-Centric Analysis of Research Papers.
Proceedings of the Database Systems for Advanced Applications, 2012

A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Capacity-Approaching Codes for Reversible Data Hiding.
Proceedings of the Information Hiding - 13th International Conference, 2011

Dynamic Background Subtraction Using Spatial-Color Binary Patterns.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Robust COA planning with varying durations.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Near-optimal codes for information embedding in gray-scale signals.
IEEE Trans. Information Theory, 2010

Generalization and Analysis of the Paper Folding Method for Steganography.
IEEE Trans. Information Forensics and Security, 2010

Reliable JPEG steganalysis based on multi-directional correlations.
Sig. Proc.: Image Comm., 2010

Improving the Perturbed Quantization steganography by Modified Matrix Encoding.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Generalization of the ZZW embedding construction for steganography.
IEEE Trans. Information Forensics and Security, 2009

Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding.
IEEE Signal Process. Lett., 2009

Steganography Combining Data Decomposition Mechanism and Stego-coding Method.
Informatica (Slovenia), 2009

2008
A coding problem in steganography.
Des. Codes Cryptogr., 2008

A Hierarchical Method for Estimating Relative Importance in Complex Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Twice Gric Colorings in Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Applying Double Process Models for Verification in CMMI.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Double Layered "Plus-Minus One" Data Embedding Scheme.
IEEE Signal Process. Lett., 2007

Improving Embedding Efficiency of Covering Codes for Applications in Steganography.
IEEE Communications Letters, 2007

A Semantic Event Detection Approach for Soccer Video based on Perception Concepts and Finiste State Machines.
Proceedings of the Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007

A Logic-Reasoning Approach to Network Security Analysis.
Proceedings of the Third International Conference on Semantics, 2007

Video Semantic Content Analysis Framework Based on Ontology Combined MPEG-7.
Proceedings of the Adaptive Multimedial Retrieval: Retrieval, 2007

An Approach for Network Security Analysis Using Logic Exploitation Graph.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2005
Steganographic Codes -- a New Problem of Coding Theory
CoRR, 2005

On the Unicity Distance of Stego Key
CoRR, 2005

Schema Matching Using Neural Network.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Humanoid On-line Pattern Generation Based on Parameters of Off-line Typical Walk Patterns.
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005

2004
A Data Transformation Method Based on Schema Mapping.
Proceedings of the Information Systems Technology and its Applications, 2004

Security Measurements of Steganographic Systems.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Construction Scheme of Meteorological Application Grid (MAG).
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Object-Oriented Design of QoS Multicast Communications.
Cluster Computing, 2001

1999
Object-Oriented Design of Adaptive Multicast Communications.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999


  Loading...