default search action
Kejiang Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Haozhe Chen, Jie Zhang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition. IEEE Trans. Artif. Intell. 5(3): 1302-1315 (2024) - [j35]Qiyi Yao, Weiming Zhang, Kejiang Chen, Nenghai Yu:
LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography. IEEE Trans. Commun. 72(4): 2138-2151 (2024) - [j34]Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - [j33]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3515-3527 (2024) - [j32]Jiansong Zhang, Kejiang Chen, Weixiang Li, Weiming Zhang, Nenghai Yu:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3994-4005 (2024) - [j31]Xin Zhang, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. IEEE Trans. Inf. Forensics Secur. 19: 3148-3163 (2024) - [j30]Kai Zeng, Kejiang Chen, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Toward Secure and Robust Steganography for Black-Box Generated Images. IEEE Trans. Inf. Forensics Secur. 19: 3237-3250 (2024) - [j29]Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. IEEE Trans. Inf. Forensics Secur. 19: 6636-6649 (2024) - [j28]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu:
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models. IEEE Trans. Inf. Forensics Secur. 19: 8600-8615 (2024) - [j27]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang:
Upward Robust Steganography Based on Overflow Alleviation. IEEE Trans. Multim. 26: 299-312 (2024) - [j26]Zijin Yang, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu:
Provably Secure Robust Image Steganography. IEEE Trans. Multim. 26: 5040-5053 (2024) - [j25]Yue Jiang, Kejiang Chen, Wei Yan, Xuehu Yan, Guozheng Yang, Kai Zeng:
Robust Secret Image Sharing Resistant to JPEG Recompression Based on Stable Block Condition. IEEE Trans. Multim. 26: 10446-10461 (2024) - [c31]Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Data-Free Hard-Label Robustness Stealing Attack. AAAI 2024: 6853-6861 - [c30]BenLong Wu, Kejiang Chen, Yanru He, Guoqiang Chen, Weiming Zhang, Nenghai Yu:
CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation. ACM TUR-C 2024 - [c29]Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Weiming Zhang, Nenghai Yu:
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models. CVPR 2024: 12162-12171 - [c28]Xiao Yu, Kejiang Chen, Qi Yang, Weiming Zhang, Nenghai Yu:
Text Fluoroscopy: Detecting LLM-Generated Text through Intrinsic Features. EMNLP 2024: 15838-15846 - [c27]Wenbo Zhou, Dongdong Chen, Jing Liao, Jie Zhang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Attribute-Aware Head Swapping Guided by 3d Modeling. ICASSP 2024: 2790-2794 - [c26]Han Fang, Kejiang Chen, Yupeng Qiu, Zehua Ma, Weiming Zhang, Ee-Chien Chang:
DERO: Diffusion-Model-Erasure Robust Watermarking. ACM Multimedia 2024: 2973-2981 - [c25]Yinyin Peng, Yaofei Wang, Donghui Hu, Kejiang Chen, Xianjin Rong, Weiming Zhang:
LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models. ACM Multimedia 2024: 3001-3009 - [c24]Xiao Yu, Kejiang Chen, Kai Zeng, Han Fang, Zijin Yang, Xiuwei Shang, Yuang Qi, Weiming Zhang, Nenghai Yu:
SemGIR: Semantic-Guided Image Regeneration Based Method for AI-generated Image Detection and Attribution. ACM Multimedia 2024: 8480-8488 - [i32]Yuang Qi, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu:
Provably Secure Disambiguating Neural Linguistic Steganography. CoRR abs/2403.17524 (2024) - [i31]Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Wei Ming Zhang, Nenghai Yu:
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models. CoRR abs/2404.04956 (2024) - [i30]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang:
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks. CoRR abs/2408.08924 (2024) - [i29]Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Natias: Neuron Attribution based Transferable Image Adversarial Steganography. CoRR abs/2409.04968 (2024) - [i28]Xiaojian Yuan, Tianyu Pang, Chao Du, Kejiang Chen, Weiming Zhang, Min Lin:
A Closer Look at Machine Unlearning for Large Language Models. CoRR abs/2410.08109 (2024) - [i27]Meng Tong, Kejiang Chen, Xiaojian Yuan, Jiayang Liu, Weiming Zhang, Nenghai Yu, Jie Zhang:
On the Vulnerability of Text Sanitization. CoRR abs/2410.17052 (2024) - [i26]BenLong Wu, Guoqiang Chen, Kejiang Chen, Xiuwei Shang, Jiapeng Han, Yanru He, Weiming Zhang, Nenghai Yu:
AutoPT: How Far Are We from the End2End Automated Web Penetration Testing? CoRR abs/2411.01236 (2024) - [i25]Jiawei Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu:
SQL Injection Jailbreak: a structural disaster of large language models. CoRR abs/2411.01565 (2024) - 2023
- [b1]Hang Zhou, Kejiang Chen, Zehua Ma, Feng Wang, Weiming Zhang:
Triangle Mesh Watermarking and Steganography. Springer 2023, ISBN 978-981-19-7719-0, pp. 1-184 - [j24]Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang:
Invertible mask network for face privacy preservation. Inf. Sci. 629: 566-579 (2023) - [j23]Chuan Qin, Yuefeng Chen, Kejiang Chen, Xiaoyi Dong, Weiming Zhang, Xiaofeng Mao, Yuan He, Nenghai Yu:
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks. IEEE Trans. Artif. Intell. 4(5): 1029-1040 (2023) - [j22]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Robust Steganography for High Quality Images. IEEE Trans. Circuits Syst. Video Technol. 33(9): 4893-4906 (2023) - [j21]Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. IEEE Trans. Dependable Secur. Comput. 20(5): 3787-3798 (2023) - [j20]Haozhe Chen, Hang Zhou, Jie Zhang, Dongdong Chen, Weiming Zhang, Kejiang Chen, Gang Hua, Nenghai Yu:
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 123:1-123:20 (2023) - [c23]Xiaojian Yuan, Kejiang Chen, Jie Zhang, Weiming Zhang, Nenghai Yu, Yang Zhang:
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. AAAI 2023: 3349-3357 - [c22]Han Fang, Yupeng Qiu, Kejiang Chen, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. AAAI 2023: 5054-5061 - [c21]Zexin Fan, Kejiang Chen, Chuan Qin, Kai Zeng, Weiming Zhang, Nenghai Yu:
Image Adversarial Steganography Based on Joint Distortion. ICASSP 2023: 1-5 - [c20]Xilong Wang, Yaofei Wang, Kejiang Chen, Jinyang Ding, Weiming Zhang, Nenghai Yu:
ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography. ICASSP 2023: 1-5 - [c19]Na Zhao, Kejiang Chen, Chuan Qin, Yi Yin, Weiming Zhang, Nenghai Yu:
Calibration-based Steganalysis for Neural Network Steganography. IH&MMSec 2023: 91-96 - [c18]Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. ASE 2023: 774-786 - [c17]Yinyin Peng, Donghui Hu, Yaofei Wang, Kejiang Chen, Gang Pei, Weiming Zhang:
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model. ACM Multimedia 2023: 7143-7151 - [c16]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [c15]Yanru He, Kejiang Chen, Guoqiang Chen, Zehua Ma, Kui Zhang, Jie Zhang, Huanyu Bian, Han Fang, Weiming Zhang, Nenghai Yu:
ProTegO: Protect Text Content against OCR Extraction Attack. ACM Multimedia 2023: 7424-7434 - [c14]Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu:
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies". SP 2023: 2238-2255 - [i24]Xiaojian Yuan, Kejiang Chen, Jie Zhang, Weiming Zhang, Nenghai Yu, Yang Zhang:
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. CoRR abs/2302.09814 (2023) - [i23]Xilong Wang, Yaofei Wang, Kejiang Chen, Jinyang Ding, Weiming Zhang, Nenghai Yu:
ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography. CoRR abs/2303.05830 (2023) - [i22]Xi Yang, Kejiang Chen, Weiming Zhang, Chang Liu, Yuang Qi, Jie Zhang, Han Fang, Nenghai Yu:
Watermarking Text Generated by Black-Box Language Models. CoRR abs/2305.08883 (2023) - [i21]Xiao Yu, Yuang Qi, Kejiang Chen, Guoqiang Chen, Xi Yang, Pengyuan Zhu, Weiming Zhang, Nenghai Yu:
GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance. CoRR abs/2305.12519 (2023) - [i20]Meng Tong, Kejiang Chen, Yuang Qi, Jie Zhang, Weiming Zhang, Nenghai Yu:
PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model. CoRR abs/2310.12214 (2023) - [i19]Shuai Li, Kejiang Chen, Kunsheng Tang, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
FunctionMarker: Watermarking Language Datasets via Knowledge Injection. CoRR abs/2311.09535 (2023) - [i18]Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Data-Free Hard-Label Robustness Stealing Attack. CoRR abs/2312.05924 (2023) - [i17]Na Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Performance-lossless Black-box Model Watermarking. CoRR abs/2312.06488 (2023) - [i16]Jiyan He, Weitao Feng, Yaosen Min, Jingwei Yi, Kunsheng Tang, Shuai Li, Jie Zhang, Kejiang Chen, Wenbo Zhou, Xing Xie, Weiming Zhang, Nenghai Yu, Shuxin Zheng:
Control Risk for Potential Misuse of Artificial Intelligence in Science. CoRR abs/2312.06632 (2023) - [i15]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu:
Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models. CoRR abs/2312.09669 (2023) - 2022
- [j19]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving robust adaptive steganography via minimizing channel errors. Signal Process. 195: 108498 (2022) - [j18]Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. IEEE Trans. Dependable Secur. Comput. 19(5): 3343-3356 (2022) - [j17]Yao Zhu, Yuefeng Chen, Xiaodan Li, Kejiang Chen, Yuan He, Xiang Tian, Bolun Zheng, Yaowu Chen, Qingming Huang:
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective. IEEE Trans. Image Process. 31: 6487-6501 (2022) - [j16]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis. IEEE Trans. Multim. 24: 4538-4550 (2022) - [j15]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. IEEE Trans. Vis. Comput. Graph. 28(12): 5006-5025 (2022) - [c13]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. AAAI 2022: 11613-11621 - [c12]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition. ICASSP 2022: 3059-3063 - [c11]Jinliu Feng, Yaofei Wang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression. ICASSP 2022: 3084-3088 - [c10]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. ICME 2022: 1-6 - [i14]Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Invertible Mask Network for Face Privacy-Preserving. CoRR abs/2204.08895 (2022) - [i13]Yao Zhu, Yuefeng Chen, Xiaodan Li, Kejiang Chen, Yuan He, Xiang Tian, Bolun Zheng, Yaowu Chen, Qingming Huang:
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective. CoRR abs/2210.04213 (2022) - [i12]Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. CoRR abs/2210.14632 (2022) - 2021
- [j14]Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181: 107920 (2021) - [j13]Kejiang Chen, Hang Zhou, Dongdong Hou, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric. IEEE Trans. Circuits Syst. Video Technol. 31(10): 3942-3953 (2021) - [j12]Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin, Nenghai Yu:
Feature-Preserving Tensor Voting Model for Mesh Steganalysis. IEEE Trans. Vis. Comput. Graph. 27(1): 57-67 (2021) - [c9]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection Beyond Image Space. ICASSP 2021: 3850-3854 - [i11]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection beyond Image Space. CoRR abs/2102.11586 (2021) - [i10]Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, In So Kweon:
A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs/2103.01607 (2021) - [i9]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. CoRR abs/2104.10203 (2021) - [i8]Kai Zeng, Kejiang Chen, Yaofei Wang, Weiming Zhang, Nenghai Yu:
Improving Dither Modulation based Robust Steganography by Overflow Suppression. CoRR abs/2110.08697 (2021) - [i7]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition. CoRR abs/2110.09814 (2021) - [i6]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. CoRR abs/2112.07873 (2021) - [i5]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. CoRR abs/2112.14420 (2021) - 2020
- [j11]Xinzhi Yu, Kejiang Chen, Yaofei Wang, Weixiang Li, Weiming Zhang, Nenghai Yu:
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process. 168 (2020) - [j10]Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang, Nenghai Yu:
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2027-2032 (2020) - [j9]Weixiang Li, Kejiang Chen, Weiming Zhang, Hang Zhou, Yaofei Wang, Nenghai Yu:
JPEG Steganography With Estimated Side-Information. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2288-2294 (2020) - [j8]Li Li, Weiming Zhang, Kejiang Chen, Nenghai Yu:
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks. IEEE Trans. Multim. 22(10): 2526-2536 (2020) - [c8]Hang Zhou, Dongdong Chen, Jing Liao, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Weiming Zhang, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks. CVPR 2020: 10353-10362 - [c7]Kejiang Chen, Yuefeng Chen, Hang Zhou, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-Supervised Adversarial Training. ICASSP 2020: 2218-2222 - [i4]Hang Zhou, Dongdong Chen, Jing Liao, Weiming Zhang, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks. CoRR abs/2011.00566 (2020)
2010 – 2019
- 2019
- [j7]Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Controversial 'pixel' prior rule for JPEG adaptive steganography. IET Image Process. 13(1): 24-33 (2019) - [j6]Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, Nenghai Yu:
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection. Multim. Tools Appl. 78(7): 8041-8055 (2019) - [j5]Dongdong Hou, Weiming Zhang, Kejiang Chen, Sian-Jheng Lin, Nenghai Yu:
Reversible Data Hiding in Color Image With Grayscale Invariance. IEEE Trans. Circuits Syst. Video Technol. 29(2): 363-374 (2019) - [j4]Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. IEEE Trans. Inf. Forensics Secur. 14(4): 1052-1066 (2019) - [j3]Hang Zhou, Kejiang Chen, Weiming Zhang, Yuanzhi Yao, Nenghai Yu:
Distortion Design for Secure Adaptive 3-D Mesh Steganography. IEEE Trans. Multim. 21(6): 1384-1398 (2019) - [c6]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense. ICCV 2019: 1961-1970 - [i3]Kejiang Chen, Hang Zhou, Yuefeng Chen, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-supervised Adversarial Training. CoRR abs/1911.06470 (2019) - 2018
- [j2]Hang Zhou, Kejiang Chen, Weiming Zhang, Zhenxing Qian, Nenghai Yu:
Targeted attack and security enhancement on texture synthesis based steganography. J. Vis. Commun. Image Represent. 54: 100-107 (2018) - [c5]Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. IH&MMSec 2018: 5-16 - [c4]Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu:
Adversarial Examples Against Deep Neural Network based Steganalysis. IH&MMSec 2018: 67-72 - [c3]Kuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. IWDW 2018: 55-68 - [c2]Xinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. IWDW 2018: 248-260 - [i2]Kejiang Chen, Hang Zhou, Dongdong Hou, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Provably Secure Steganography on Generative Media. CoRR abs/1811.03732 (2018) - [i1]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. CoRR abs/1812.11017 (2018) - 2017
- [j1]Hang Zhou, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Comments on "Steganography Using Reversible Texture Synthesis". IEEE Trans. Image Process. 26(4): 1623-1625 (2017) - 2016
- [c1]Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. WIFS 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint