Yiming Xue

Orcid: 0000-0001-6500-3868

According to our database1, Yiming Xue authored at least 55 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cognitive Surgery: The Awakening of Implicit Territorial Awareness in LLMs.
CoRR, August, 2025

EditMF: Drawing an Invisible Fingerprint for Your Large Language Models.
CoRR, August, 2025

SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs.
CoRR, August, 2025

BeDKD: Backdoor Defense based on Dynamic Knowledge Distillation and Directional Mapping Modulator.
CoRR, August, 2025

Retrieval-Confused Generation is a Good Defender for Privacy Violation Attack of Large Language Models.
CoRR, June, 2025

GTSD: Generative Text Steganography Based on Diffusion Model.
CoRR, April, 2025

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models.
CoRR, April, 2025

MiZero: The Shadowy Defender Against Text Style Infringements.
CoRR, April, 2025

ImF: Implicit Fingerprint for Large Language Models.
CoRR, March, 2025

Linguistic Steganalysis Based on Few-Shot Adversarial Training.
IEEE Trans. Dependable Secur. Comput., 2025

An adaptive audio watermarking with frame-wise control parameter searching.
Digit. Signal Process., 2025

Kill two birds with one stone: generalized and robust AI-generated text detection via dynamic perturbations.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

2024
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2024

A Test-Time Entropy Minimization Method for Cross-Domain Linguistic Steganalysis.
IEEE Signal Process. Lett., 2024

GexMolGen: cross-modal generation of hit-like molecules via large language model encoding of gene expression signatures.
Briefings Bioinform., 2024

Generative Text Steganography with Large Language Model.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

A Novel Deep Learning Approach for Heliostat Dirt Segmentation and Severity Assessment.
Proceedings of the IEEE International Conference on Signal Processing, 2024

Domain Adaptational Steganographic Text Detection Using Few-Shot Adversary-Refinement Framework.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

2023
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples.
Proceedings of the International Conference on Machine Learning, 2023

HDTC: Hybrid Model of Dual-Transformer and Convolutional Neural Network from RGB-D for Detection of Lettuce Growth Traits.
Proceedings of the IEEE International Conference on Image Processing, 2023

A Global Feature Fusion Network for Lettuce Growth Trait Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

2022
Linguistic Steganography Based on Adaptive Probability Distribution.
IEEE Trans. Dependable Secur. Comput., 2022

Lifelong Learning for Text Steganalysis Based on Chronological Task Sequence.
IEEE Signal Process. Lett., 2022

An effective linguistic steganalysis framework based on hierarchical mutual learning.
Inf. Sci., 2022

Domain Adaptational Text Steganalysis Based on Transductive Learning.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Few-shot Text Steganalysis Based on Attentional Meta-learner.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

SWOT-based Countermeasure Research on Demand-side Resources Development in China Jibei.
Proceedings of the 2022 International Conference on Management Engineering, 2022

2021
Real-Time Text Steganalysis Based on Multi-Stage Transfer Learning.
IEEE Signal Process. Lett., 2021

Transfer subspace learning based on structure preservation for JPEG image mismatched steganalysis.
Signal Process. Image Commun., 2021

An SVD-based adaptive robust speech steganography using MDCT coefficient.
Multim. Tools Appl., 2021

A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution.
KSII Trans. Internet Inf. Syst., 2021

2020
A New Dataset and Deep Residual Spectral Spatial Network for Hyperspectral Image Classification.
Symmetry, 2020

Crop Disease Classification on Inadequate Low-Resolution Target Images.
Sensors, 2020

Low-rank representation-based regularized subspace learning method for unsupervised domain adaptation.
Multim. Tools Appl., 2020

2019
Convolutional Neural Network Based Text Steganalysis.
IEEE Signal Process. Lett., 2019

A Hybrid R-BILSTM-C Neural Network Based Text Steganalysis.
IEEE Signal Process. Lett., 2019

An adaptive steganographic scheme for H.264/AVC video with distortion optimization.
Signal Process. Image Commun., 2019

Generating steganographic image description by dynamic synonym substitution.
Signal Process., 2019

A subspace learning-based method for JPEG mismatched steganalysis.
Multim. Tools Appl., 2019

Structured sparse multi-view feature selection based on weighted hinge loss.
Multim. Tools Appl., 2019

A novel natural language steganographic framework based on image description neural network.
J. Vis. Commun. Image Represent., 2019

A sharing multi-view feature selection method via Alternating Direction Method of Multipliers.
Neurocomputing, 2019

Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine.
Int. J. Digit. Crime Forensics, 2019

Robust Speech Steganography Using Differential SVD.
IEEE Access, 2019

Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective.
IEEE Access, 2019

Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective.
IEEE Access, 2019

A Novel Feature Selection Model for JPEG Image Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Optimized CNN with Point-Wise Parametric Rectified Linear Unit for Spatial Image Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Process Management of Customized Product Manufacturing for Steel Structures.
Proceedings of the 2019 IEEE International Conference on Industrial Engineering and Engineering Management, 2019

Development and Application of MES Based on Cloud Platform for Steel Structure Enterprises.
Proceedings of the 2019 IEEE International Conference on Industrial Engineering and Engineering Management, 2019

2018
An Improved Permission Management Scheme of Android Application Based on Machine Learning.
Secur. Commun. Networks, 2018

Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine Learning.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Production Management System for Small and Medium Sized Manufacturing Enterprises.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018


  Loading...