Yun Cao
Orcid: 0000-0003-3433-0764Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- University of Chinese Academy of Sciences, Beiing, China (PhD 2012)
According to our database1,
Yun Cao
authored at least 49 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media Channels.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025
2024
Temporal Diversified Self-Contrastive Learning for Generalized Face Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., December, 2024
J. Vis. Commun. Image Represent., 2024
Proceedings of the 16th International Conference on Wireless Communications and Signal Processing, 2024
OC-SAN: Unsupervised Deepfake Detection for Specific Individual Protection Based on Deep One-Class Classification.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
2023
A novel model compression method based on joint distillation for deepfake video detection.
J. King Saud Univ. Comput. Inf. Sci., October, 2023
Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning.
IEEE Signal Process. Lett., 2023
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
J. Vis. Commun. Image Represent., 2021
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
2020
IEEE Signal Process. Lett., 2020
2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
2018
CoRR, 2018
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017
Secur. Commun. Networks, 2017
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
2016
Multim. Tools Appl., 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
2013
Proceedings of the Media Watermarking, 2013
2012
IEEE Signal Process. Lett., 2012
2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2009
Proceedings of the Multimedia and Security Workshop, 2009