Zhao-Xia Yin

Orcid: 0000-0003-0387-4806

According to our database1, Zhao-Xia Yin authored at least 91 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Semi-fragile neural network watermarking for content authentication and tampering localization.
Expert Syst. Appl., February, 2024

General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Reversible attack based on local visible adversarial perturbation.
Multim. Tools Appl., January, 2024

WFSS: weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks.
Vis. Intell., 2024

2023
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction.
Expert Syst. Appl., November, 2023

AdvFAS: A robust face anti-spoofing framework against adversarial examples.
Comput. Vis. Image Underst., October, 2023

Reversible data hiding based on automatic contrast enhancement using histogram expansion.
J. Vis. Commun. Image Represent., April, 2023

Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace.
Pattern Recognit. Lett., February, 2023

Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks.
CoRR, 2023

Decision-based iterative fragile watermarking for model integrity verification.
CoRR, 2023

Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization.
CoRR, 2023

Imperceptible Adversarial Attack on S Channel of HSV Colorspace.
Proceedings of the International Joint Conference on Neural Networks, 2023

Local Texture Complexity Guided Adversarial Attack.
Proceedings of the IEEE International Conference on Image Processing, 2023

Multi-Label Adversarial Attack Based on Label Correlation.
Proceedings of the IEEE International Conference on Image Processing, 2023

Reversible Data Hiding Based on Elastic Net Predictor.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

High-Quality Triggers Based Fragile Watermarking for Optical Character Recognition Model.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial Attacks.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB Substitution and Ring-prediction.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression.
IEEE Trans. Dependable Secur. Comput., 2022

High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping.
IEEE Trans. Dependable Secur. Comput., 2022

High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction.
Signal Process., 2022

New framework for code-mapping-based reversible data hiding in JPEG images.
Inf. Sci., 2022

Attention-guided black-box adversarial attacks with large-scale multiobjective evolutionary optimization.
Int. J. Intell. Syst., 2022

High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.
CoRR, 2022

Universal adversarial perturbation for remote sensing images.
CoRR, 2022

PISA: Pixel skipping-based attentional black-box adversarial attack.
Comput. Secur., 2022

Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models.
Cogn. Comput., 2022

Universal adversarial perturbation for remote sensing images.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Adversarial Example Defense via Perturbation Grading Strategy.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy".
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

Neural Network Fragile watermarking With No Model Performance Degradation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

2021
Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression.
IEEE Trans. Signal Inf. Process. over Networks, 2021

Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement.
Signal Process., 2021

On the security and robustness of "Keyless dynamic optimal multi-bit image steganography using energetic pixels".
Multim. Tools Appl., 2021

Reversible adversarial examples against local visual perturbation.
CoRR, 2021

High Capacity Reversible Data Hiding in Encrypted 3D mesh models Based on multi-MSB Prediction.
CoRR, 2021

Comments on "Robust reversible data hiding scheme based on two-layer embedding strategy".
CoRR, 2021

High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive Encoding.
CoRR, 2021

PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack.
CoRR, 2021

Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB Prediction for Encrypted 3D Mesh Models.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Fragile Neural Network Watermarking with Trigger Image Set.
Proceedings of the Knowledge Science, Engineering and Management, 2021

On Generating JPEG Adversarial Images.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Multi-domain Reversible Data Hiding in JPEG Images.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding.
IEEE Trans. Multim., 2020

An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
IEEE Trans. Multim., 2020

Reversible Data Hiding in JPEG Images With Multi-Objective Optimization.
IEEE Trans. Circuits Syst. Video Technol., 2020

Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding.
Multim. Tools Appl., 2020

Defense against adversarial attacks by low-level image transformations.
Int. J. Intell. Syst., 2020

Multi-domain Reversible Data Hiding in JPEG.
CoRR, 2020

Reversible Data Hiding in Encrypted Images Based on Bit plane Compression of Prediction Error.
CoRR, 2020

A Universal Framework to Construct a Huffman-Code-Mapping-based Reversible Data Hiding Scheme for JPEG Images.
CoRR, 2020

War: An Efficient Pre-processing Method for Defending Adversarial Attacks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting.
Signal Process., 2019

Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation.
Int. J. Digit. Crime Forensics, 2019

Reversible Adversarial Examples based on Reversible Image Transformation.
CoRR, 2019

Separable Reversible Data Hiding Based on MSB Prediction for Encrypted 3D Mesh Models.
CoRR, 2019

Image Encryption Algorithm Based on Facebook Social Network.
CoRR, 2019

War: Detecting adversarial examples by pre-processing input data.
CoRR, 2019

High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution.
CoRR, 2019

2018
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization.
IEEE Signal Process. Lett., 2018

Reversible data hiding in encrypted AMBTC images.
Multim. Tools Appl., 2018

Distortion function based on residual blocks for JPEG steganography.
Multim. Tools Appl., 2018

Image authentication scheme based on reversible fragile watermarking with two images.
J. Inf. Secur. Appl., 2018

Training & Evaluation System of Intelligent Oral Phonics Based on Speech Recognition Technology.
Int. J. Emerg. Technol. Learn., 2018

Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding.
CoRR, 2018

Reversible Data Hiding in Encrypted Images with Two-MSB Prediction.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Unified Data Hiding and Scrambling Method for JPEG Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Convolution Neural Network with Active Learning for Information Extraction of Enterprise Announcements.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Reversible Data Embedding and Scrambling Method Based on JPEG Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Style Transferring Based Data Hiding for Color Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Hybrid Algorithm for Text Classification Based on CNN-BLSTM with Attention.
Proceedings of the 2018 International Conference on Asian Language Processing, 2018

Improved Reversible Data Hiding in JPEG Images Based on Interval Correlation.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018

2017
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification.
Multim. Tools Appl., 2017

Data hiding in AMBTC images using quantization level modification and perturbation technique.
Multim. Tools Appl., 2017

Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering.
IEICE Trans. Inf. Syst., 2017

An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
MDE-based image steganography with large embedding capacity.
Secur. Commun. Networks, 2016

Hybrid distortion function for JPEG steganography.
J. Electronic Imaging, 2016

High capacity reversible steganography in encrypted images based on feature mining in plaintext domain.
Int. J. Embed. Syst., 2016

Improved Reversible Image Authentication Scheme.
Cogn. Comput., 2016

Reversible Data Hiding in Encrypted AMBTC Compressed Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Reversible data hiding in encrypted image based on block histogram shifting.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Second-order steganographic method based on adaptive reference matrix.
IET Image Process., 2015

Image Data Embedding with Large Payload Based on Reference-Matrix.
Proceedings of the Advances in Image and Graphics Technologies - 10th Chinese Conference, 2015

Complete Separable Reversible Data Hiding in Encrypted Image.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2009
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...