Weixuan Tang

Orcid: 0009-0000-2816-7089

According to our database1, Weixuan Tang authored at least 36 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Payload-Independent Direct Cost Learning for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

HP-MIA: A novel membership inference attack scheme for high membership prediction precision.
Comput. Secur., January, 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network.
IEEE Trans. Inf. Forensics Secur., 2024

Black-box Adversarial Attacks Against Image Quality Assessment Models.
CoRR, 2024

2023
A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023

Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023

S-MFRL: Spiking Mean Field Reinforcement Learning for Dynamic Resource Allocation of D2D Networks.
IEEE Trans. Veh. Technol., 2023

ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy.
IEEE Trans. Dependable Secur. Comput., 2023

StarVQA+: Co-training Space-Time Attention for Video Quality Assessment.
CoRR, 2023

Live4D: A Real-time Capture System for Streamable Volumetric Video.
Proceedings of the SIGGRAPH Asia 2023 Technical Communications, 2023

SemanticCrop: Boosting Contrastive Learning via Semantic-Cropped Views.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing Environment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Deep Multi-image Hiding with Random Key.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Active Defense Against Image Steganography.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning.
IEEE Signal Process. Lett., 2022

HVS Revisited: A Comprehensive Video Quality Assessment Framework.
CoRR, 2022

Multi-instance Point Cloud Registration by Efficient Correspondence Clustering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.
CoRR, 2021

Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image.
Proceedings of the IEEE International Conference on Acoustics, 2021

Learning-based Point Cloud Registration: A Short Review and Evaluation.
Proceedings of the AIEE 2021: 2nd International Conference on Artificial Intelligence in Electronics Engineering, Phuket, Thailand, January 15, 2021

2019
CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2019

2018
CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

2017
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network.
IEEE Signal Process. Lett., 2017

2016
Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Inf. Forensics Secur., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

2014
Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014


  Loading...