Xiaowei Yi

Orcid: 0000-0002-8250-1698

According to our database1, Xiaowei Yi authored at least 28 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet.
IEEE Signal Process. Lett., 2022

A fast and secure MP3 steganographic scheme with multi-domain.
Signal Process., 2022

OCAGraph: An effective observation capability association model for Earth observation sensor planning.
Int. J. Appl. Earth Obs. Geoinformation, 2022

Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Improving Robustness of Speech Anti-Spoofing System Using Resnext with Neighbor Filters.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021

FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Fake Speech Detection Using Residual Network with Transformer Encoder.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

2020
GAN based synthesized audio dataset.
Dataset, May, 2020

An Adaptive Double-Layered Embedding Scheme for MP3 Steganography.
IEEE Signal Process. Lett., 2020

An AAC steganography scheme for adaptive embedding with distortion minimization model.
Multim. Tools Appl., 2020

MP3 steganalysis based on joint point-wise and block-wise correlations.
Inf. Sci., 2020

Deepfake Video Detection Using Audio-Visual Consistency.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

2019
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model.
IEEE Trans. Inf. Forensics Secur., 2019

Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Improving Audio Steganalysis Using Deep Residual Networks.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Defining Joint Embedding Distortion for Adaptive MP3 Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

RHFCN: : Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Pitch Delay Based Adaptive Steganography for AMR Speech Stream.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2014
Efficient authentication of scalable media streams over wireless networks.
Multim. Tools Appl., 2014

A capacity self-adaption information hiding algorithm based on RS code.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

2013
Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

2012
Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012


  Loading...