1 |
On Generating JPEG Adversarial Images
|
会议论文 |
M. Shi;S. Li;Z. Yin;X. Zhang;Z. Qian |
2 |
Preemptive Image Protection against Steganography
|
会议论文 |
Y. Guo;N. Zhong;Z. Qian;X. Zhang;H. Cho |
3 |
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection
|
会议论文 |
Q. Ying;J. Liu;S. Li;H. Xu;Z. Qian;X. Zhang |
4 |
Towards Criminal Sketching with Generative Adversarial Network, 2020 IEEE 22nd International Workshop on Multimedia Signal Processing
|
会议论文 |
H. Wu;Y. Yao;X. Zhang;J. Wang |
5 |
Fragile Neural Network Watermarking with Trigger Image Set
|
会议论文 |
R. Zhu;P. Wei;S. Li;Z. Yin;X. Zhang;Z. Qian |
6 |
Neural Network Fragile watermarking With No Model Performance Degradation
|
会议论文 |
Z. Yin;H. Yin;X. Zhang |
7 |
Watermarking Neural Network with Compensation Mechanism
|
会议论文 |
L. Feng;X. Zhang |
8 |
Multimodal fake news detection via CLIP-guided learning
|
会议论文 |
Y. Zhou;Y. Yang;Q. Ying;Z. Qian;X. Zhang |
9 |
Secure neural network watermarking protocol against forging attack
|
期刊论文 |
R. Zhu;X. Zhang;M. Shi;Z. Tang |
10 |
Reversible Data Hiding in Palette Images
|
期刊论文 |
M. Yu;H. Yao;C. Qin;X. Zhang |
11 |
On Physically Occluded Fake Identity Document Detection
|
会议论文 |
H. Wang;S. Li;S. Cao;R. Yang;J. Zeng;Z. Qian;X. Zhang |
12 |
Hierarchical Authorization of Convolutional Neural Networks for Multi-User
|
期刊论文 |
Y. Luo;G. Feng;X. Zhang |
13 |
基于预测误差位平面压缩的密文图像可逆信息隐藏
|
期刊论文 |
吴友情;马文静;殷赵霞;彭银银;张新鹏 |
14 |
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
|
期刊论文 |
X. Duan;B. Li;Z. Yin;X. Zhang;B. Luo |
15 |
Robust Image Hashing with Isomap and Saliency Map for Copy Detection
|
期刊论文 |
X. Liang;Z. Tang;J. Wu;Z. Li;X. Zhang |
16 |
Sparse Backdoor Attack Against Neural Networks
|
期刊论文 |
N. Zhong;Z. Qian;X. Zhang |
17 |
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption
|
期刊论文 |
Y. Zhang;W. Zhou;R. Zhao;X. Zhang;X. Cao |
18 |
Steganography in social networks based on behavioral correlation
|
期刊论文 |
Y. Hu;Z. Wang;X. Zhang |
19 |
Deep Neural Network Retrieval
|
会议论文 |
N. Zhong;Z. Qian;X. Zhang |
20 |
RWN: Robust Watermarking Network for Image Cropping Localization
|
会议论文 |
Q. Ying;X. Hu;X. Zhang;Z. Qian;S. Li;X. Zhang |
21 |
Patch Diffusion: A General Module for Face Manipulation Detection
|
会议论文 |
B. Zhang;S. Li;G. Feng;Z. Qian;X. Zhang |
22 |
An Effective Framework for Intellectual Property Protection of NLG Models
|
期刊论文 |
M. Li;Z. Wang;X. Zhang |
23 |
Robust adversarial examples against scale transformation via generative network
|
期刊论文 |
M. Liu;X. Zhang;G. Feng |
24 |
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption
|
期刊论文 |
Y. Zhang;R. Zhao;X. Xiao;R. Lan;Z. Liu;X. Zhang |
25 |
Anti-Forensics for Face Swapping Videos via Adversarial Training
|
期刊论文 |
Feng Ding;Guopu Zhu;Yingcan Li;Xinpeng Zhang;Pradeep K Atrey;Siwei Lyu |
26 |
一种人脸活体检测方法、装置及存储介质
|
专利 |
李晟;钱振兴;张新鹏 |
27 |
Securing Graph Steganography over Social Networks via Interaction Remapping
|
会议论文 |
H. Wu;L. Zhou;J. Li;X. Zhang |
28 |
WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs
|
会议论文 |
G. Liu;Y. Si;Z. Qian;X. Zhang;S. Li;W. Peng |
29 |
Neural Visual Social Comment on Image-Text Content
|
期刊论文 |
Y. Yin;H. Wu;X. Zhang |
30 |
Image Generation Network for Covert Transmission in Online Social Network
|
会议论文 |
Z. You;Q. Ying;S. Li;Z. Qian;X. Zhang |
31 |
隐蔽图像后门攻击
|
期刊论文 |
朱淑雯;罗戈;韦平;李晟;张新鹏;钱振兴 |
32 |
Efficient video hashing based on low-rank frames
|
期刊论文 |
Z. Chen;Z. Tang;X. Zhang;R. Sun;X. Zhang |
33 |
Print-Camera Resistant Image Watermarking with Deep Noise Simulation and Constrained Learning
|
期刊论文 |
C. Qin;X. Li;Z. Zhang;F. Li;X. Zhang;G. Feng |
34 |
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval
|
期刊论文 |
C. Qin;L. Wu;X. Zhang;G. Feng |
35 |
一种加密域鲁棒图像哈希算法
|
期刊论文 |
秦川;郭梦琦;李欣然;钱振兴;张新鹏 |
36 |
Multi-granularity Brushstrokes Network for Universal Style Transfer
|
期刊论文 |
Q. Wang;S. Li;X. Zhang;G. Feng |
37 |
A fully supervised universal adversarial perturbations and the progressive optimization
|
期刊论文 |
G. Sun;H. Hu;X. Zhang;X. Lu |
38 |
一种虚假人脸检测方法、装置及存储介质
|
专利 |
李晟;王皓月;钱振兴;张新鹏 |
39 |
VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts
|
会议论文 |
M. Zhang;Ge Luo;Y. Ma;S. Li;Z. Qian;X. Zhang |
40 |
Unlabeled Backdoor Poisoning in Semi-Supervised Learning
|
会议论文 |
L. Feng;S. Li;Z. Qian;X. Zhang |
41 |
Batch Steganography via Generative Network
|
期刊论文 |
N. Zhong;Z. Qian;Z. Wang;X. Zhang;X. Li |
42 |
Destroying robust steganography in online social networks
|
期刊论文 |
Z. Zhu;S. Li;Z. Qian;X. Zhang |
43 |
Steganographic visual story with mutual-perceived joint attention
|
期刊论文 |
Y. Guo;H. Wu;X. Zhang |
44 |
Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding
|
期刊论文 |
Q. Liu;H. Wu;X. Zhang |
45 |
Linguistic Steganalysis With Graph Neural Networks
|
期刊论文 |
H. Wu;B. Yi;F. Ding;G. Feng;X. Zhang |
46 |
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks
|
期刊论文 |
L. Feng;Z. Qian;X. Zhang;S. Li |
47 |
Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization
|
期刊论文 |
Y. Qin;G. Feng;Y. Ren;X. Zhang |
48 |
Semi-fragile neural network watermarking for content authentication and tampering localization
|
期刊论文 |
Z. Yuan;X. Zhang;Z. Wang;Z. Yin |
49 |
Robust backdoor injection with the capability of resisting network transfer
|
期刊论文 |
Le Feng;Sheng Li;Zhenxing Qian;Xinpeng Zhang |
50 |
Hiding data hiding
|
期刊论文 |
H. Wu;C. Li;G. Liu;X. Zhang |
51 |
Maximum Block Energy Guided Robust Subspace Clustering
|
期刊论文 |
Y. Qin;X. Zhang;L. Shen;G. Feng |
52 |
Gaussian Model for 3D Mesh Steganography
|
期刊论文 |
J. Zhu;Y. Zhang;X. Zhang;X. Cao |
53 |
Semi-structured data protection scheme based on robust watermarking
|
期刊论文 |
J. He;Q. Ying;Z. Qian;G. Feng;X. Zhang |
54 |
Iris Segmentation Using Feature Channel Optimization for Noisy Environments
|
期刊论文 |
K. Hao;G. Feng;Y. Ren;X. Zhang |
55 |
Repeatable Data Hiding: Towards the Reusability of Digital Images
|
期刊论文 |
Z. Wang;G. Feng;X. Zhang |
56 |
Encryption Resistant Deep Neural Network Watermarking
|
会议论文 |
G. Li;S. Li;Z. Qian;X. Zhang |
57 |
Perceptual Model Hashing: Towards Neural Network Model Authentication
|
会议论文 |
X. Li;Z. Wang;G. Feng;X. Zhang;C. Qin |
58 |
Salient object detection in optical remote sensing images driven by transformer
|
期刊论文 |
G. Li;Z. Bai;Z. Liu;X. Zhang;H. Ling |
59 |
Generating watermarked adversarial texts
|
期刊论文 |
M. Li;H. Wu;Z. Wang;X. Zhang |
60 |
JPEG Steganography With Content Similarity Evaluation
|
期刊论文 |
Z. Wang;G. Feng;Z. Qian;X. Zhang |
61 |
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution
|
期刊论文 |
X. Tang;Z. Wang;X. Zhang |
62 |
ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling
|
期刊论文 |
B. Yi;H. Wu;G. Feng;X. Zhang |
63 |
Generating traceable adversarial text examples by watermarking in the semantic space
|
期刊论文 |
M. Li;H. Wu;X. Zhang |
64 |
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints
|
期刊论文 |
H. Yao;M. Zou;C. Qin;X. Zhang |
65 |
Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment
|
期刊论文 |
M. Yu;Z. Tang;X. Zhang;B. Zhong;X. Zhang |
66 |
From Image to Imuge:Immunized Image Generation
|
会议论文 |
Q. Ying;Z. Qian;H. Zhou;H. Xu;X. Zhang;S. Li |
67 |
Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain
|
期刊论文 |
W. Huan;S. Li;Z. Qian;X. Zhang |
68 |
Hiding Images in Deep Probabilistic Models
|
会议论文 |
H. Chen;L. Song;Z. Qian;X. Zhang;K. Ma |
69 |
Covert Communication via Modulating Soft Label of Neural Network
|
会议论文 |
G. Liu;H. Wu;X. Zhang |
70 |
Generative Steganography Network
|
会议论文 |
P. Wei;S. Li;X. Zhang;G. Luo;Z. Qian;Q. Zhou |
71 |
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling
|
期刊论文 |
J. Yang;G. Zhu;Y. Luo;S. Kwong;X. Zhang;Y. Zhou |
72 |
A novel watermarking framework for intellectual property protection of NLG APIs
|
期刊论文 |
M. Li;H. Wu;X. Zhang |
73 |
CADW: CGAN-based Attack on Deep Robust Image Watermarking
|
期刊论文 |
C. Qin;S. Gao;X. Zhang;G. Feng |
74 |
Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding
|
期刊论文 |
Z. Zhu;P. Wei;Z. Qian;S. Li;X. Zhang |
75 |
Unified Performance Evaluation Method for Perceptual Image Hashing
|
期刊论文 |
X. Li;C. Qin;Z. Wang;Z. Qian;X. Zhang |
76 |
Game-theoretic analysis to parameterized reversible watermarking
|
期刊论文 |
H. Wu;X. Zhang |
77 |
Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment
|
期刊论文 |
G. Li;Z. Liu;X. Zhang;W. Lin |
78 |
基于DT-CWT和SVD变换的鲁棒彩色数字图像水印方法
|
专利 |
宦文楠;钱振兴;张新鹏;李晟 |
79 |
DRAW: Defending Camera-shooted RAW Against Image Manipulation
|
会议论文 |
X. Hu;Q. Ying;Z. Qian;S. Li;X. Zhang |
80 |
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness
|
会议论文 |
Y. Zhou;Q. Ying;Y. Wang;X. Zhang;Z. Qian;X. Zhang |
81 |
Object-Oriented Backdoor Attack Against Image Captioning
|
会议论文 |
M. Li;N. Zhong;X. Zhang;Z. Qian;S. Li |
82 |
多媒体数据保护的理论与方法
|
奖励 |
张新鹏;沈礼权;冯国瑞;钱振兴 |
83 |
Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation
|
会议论文 |
Q. Song;S. Li;P. Wei;G. Luo;X. Zhang;Z. Qian |
84 |
Invisible backdoor attacks on deep neural networks via steganography and regularization
|
期刊论文 |
S. Li;M. Xue;B. Zhao;H. Zhu;X. Zhang |
85 |
Robust image watermarking based on generative adversarial network
|
期刊论文 |
K. Hao;G. Feng;X. Zhang |
86 |
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images
|
期刊论文 |
M. Yu;H. Yao;C. Qin;X. Zhang |
87 |
Data hiding during image processing using capsule networks
|
期刊论文 |
Z. Wang;G. Feng;H. Wu;X. Zhang |
88 |
Physical Invisible Backdoor Based on Camera Imaging
|
会议论文 |
Y. Guo;N. Zhong;Z. Qian;X. Zhang |
89 |
Diffusing the Liveness Cues for Face Anti-spoofing
|
会议论文 |
S. Li;X. Zhu;G. Feng;X. Zhang;Z. Qian |
90 |
Unifying Dual-Attention and Siamese Transformer Network for Full-Reference Image Quality Assessment
|
期刊论文 |
Z. Tang;Z. Chen;Z. Li;B. Zhong;X. Zhang;X. Zhang |
91 |
Stealthy Backdoor Attack with Adversarial Training
|
会议论文 |
L. Feng;S. Li;Z. Qian;X. Zhang |
92 |
Invertible Image Dataset Protection
|
会议论文 |
K. Chen;X. Zeng;Q. Ying;S. Li;Z. Qian;X. Zhang |
93 |
On Cloud Storage Optimization of Blockchain with a Clustering-Based Genetic Algorithm
|
期刊论文 |
M. Xu;G. Feng;Y. Ren;X. Zhang |
94 |
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network
|
期刊论文 |
C. Wang;T. Zhang;H. Chen;Q. Huang;J. Ni;X. Zhang |
95 |
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples
|
期刊论文 |
Z. Wang;S. Li;X. Zhang;G. Feng |
96 |
Learning to Immunize Images for Tamper Localization and Self-Recovery
|
期刊论文 |
Q. Ying;H. Zhou;Z. Qian;S. Li;X. Zhang |
97 |
Image Protection for Robust Cropping Localization and Recovery
|
会议论文 |
Q. Ying;H. Zhou;X. Hu;Z. Qian;S. Li;X. Zhang |
98 |
A Customized Deep Network Based Encryption-then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios
|
期刊论文 |
C. Wang;J. Hu;S. Bian;J. Ni;X. Zhang |
99 |
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]
|
期刊论文 |
Z. Wang;G. Feng;H. Wu;X. Zhang |
100 |
NFT 图像隐写
|
期刊论文 |
王子驰;冯国瑞;张新鹏 |
101 |
Cover Selection for Steganography Using Image Similarity
|
期刊论文 |
Z. Wang;G. Feng;L. Shen;X. Zhang |
102 |
Semi-Supervised Structured Subspace Learning for Multi-View Clustering
|
期刊论文 |
Y. Qin;H. Wu;X. Zhang;G. Feng |
103 |
Watermarking Neural Networks With Watermarked Images
|
期刊论文 |
H. Wu;G. Liu;Y. Yao;X. Zhang |
104 |
Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor
|
会议论文 |
Y. Zeng;J. Tan;Z. You;Z. Qian;X. Zhang |
105 |
Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning
|
期刊论文 |
L. Feng;Z. Qian;X. Zhang;S. Li |
106 |
Consistency-Induced Multiview Subspace Clustering
|
期刊论文 |
Y. Qin;G. Feng;Y. Ren;X. Zhang |
107 |
On Security Enhancement of Steganography via Generative Adversarial Image
|
期刊论文 |
L. Zhou;G. Feng;L. Shen;X. Zhang |
108 |
Perceptual Hash of Neural Networks
|
期刊论文 |
Z. Zhu;H. Zhou;S. Xing;Z. Qian;S. Li;X. Zhang |
109 |
RGB-T Semantic Segmentation with Location, Activation, and Sharpening
|
期刊论文 |
G. Li;Y. Wang;Z. Liu;X. Zhang;D. Zeng |
110 |
Imperceptible Backdoor Attack: From Input Space to Feature Representation
|
会议论文 |
N. Zhong;Z. Qian;X. Zhang |
111 |
Deep Neural Network Watermarking against Model Extraction Attack
|
会议论文 |
J. Tan;N. Zhong;Z. Qian;X. Zhang;S. Li |
112 |
Undetectable Adversarial Examples Based on Microscopical Regularization
|
会议论文 |
N. Zhong;Z. Qian;X. Zhang |
113 |
Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts
|
会议论文 |
G. Luo;M. Zhang;Y. Ma;S. Li;Z. Qian;X. Zhang |
114 |
Securing Fixed Neural Network Steganography
|
会议论文 |
Z. Luo;S. Li;G. Li;Z. Qian;X. Zhang |
115 |
Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers
|
期刊论文 |
H. Hu;X. Lu;X. Zhang;T. Zhang;G. Sun |
116 |
Reducing Invertible Embedding Distortion Using Graph Matching Model
|
期刊论文 |
H. Wu;X. Zhang |
117 |
基于DT CWT-SVD以及三维子带侧视图的盲鲁棒视频水印方法
|
专利 |
王翌妃;钱振兴;张新鹏;李晟 |
118 |
Generative Steganographic Flow
|
会议论文 |
P. Wei;G. Luo;Q. Song;X. Zhang;Z. Qian;S. Li |
119 |
Image Steganalysis with Convolutional Vision Transformer
|
会议论文 |
G. Luo;P. Wei;S. Zhu;X. Zhang;Z. Qian;S. Li |
120 |
Hiding Images Into Images with Real-World Robustness
|
会议论文 |
Q. Ying;H. Zhou;X. Zeng;H. Xu;Z. Qian;X. Zhang |
121 |
Watermarking Graph Neural Networks by Random Graphs
|
会议论文 |
X. Zhao;H. Wu;X. Zhang |
122 |
On Generating Identifiable Virtual Faces
|
会议论文 |
Z. Yuan;Z. You;S. Li;Z. Qian;X. Zhang;A. Kot |
123 |
Multichannel Steganography in Digital Images for Multiple Receivers
|
期刊论文 |
Z. Wang;G. Feng;Y. Ren;X. Zhang |
124 |
A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion
|
会议论文 |
Y. Wang;Q. Ying;Y. Sun;Z. Qian;X. Zhang |
125 |
抑制图像非语义信息的通用后门防御策略
|
期刊论文 |
郭钰生;钱振兴;张新鹏;柴洪峰 |
126 |
Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords
|
期刊论文 |
H. Kang;H. Wu;X. Zhang |
127 |
Watermarking in Deep Neural Networks via Error Back-propagation
|
期刊论文 |
J. Wang;H. Wu;X. Zhang;Y. Yao |
128 |
Defeating data hiding in social networks using generative adversarial network
|
期刊论文 |
H. Wang;Z. Qian;G. Feng;X. Zhang |
129 |
A Novel Location Privacy Protection Algorithm for Social Discovery Application
|
期刊论文 |
Y. Yao;X. Zhang;H. Wu;Z. Wang;J. Wang |