default search action
Dengpan Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Guang Hua, Qingyi Wang, Dengpan Ye, Haijian Zhang, Guoyin Wang, Shuyin Xia:
Factors affecting forensic electric network frequency matching - A comprehensive study. Digit. Commun. Networks 10(4): 1121-1130 (2024) - [j44]Lv Chen, Dengpan Ye, Yueyun Shang:
Perceptual Video Hashing With Secure Anti-Noise Model for Social Video Retrieval. IEEE Internet Things J. 11(2): 2648-2664 (2024) - [j43]Chuanxi Chen, Dengpan Ye, Yiheng He, Long Tang, Yue Xu:
Improving Adversarial Robustness With Adversarial Augmentations. IEEE Internet Things J. 11(3): 5105-5117 (2024) - [j42]Rui Wang, Dengpan Ye, Long Tang, Yunming Zhang, Jiacheng Deng:
AVT$^{2}$-DWF: Improving Deepfake Detection With Audio-Visual Fusion and Dynamic Weighting Strategies. IEEE Signal Process. Lett. 31: 1960-1964 (2024) - [j41]Yunming Zhang, Dengpan Ye, Caiyun Xie, Long Tang, Xin Liao, Ziyi Liu, Chuanxi Chen, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping. IEEE Trans. Inf. Forensics Secur. 19: 4628-4641 (2024) - [c19]Long Tang, Dengpan Ye, Yunna Lv, Chuanxi Chen, Yunming Zhang:
Once and for All: Universal Transferable Adversarial Perturbation against Deep Hashing-Based Facial Image Retrieval. AAAI 2024: 5136-5144 - [c18]Wang Yang, Lingchen Zhao, Dengpan Ye:
Reputation Defender: Local Black-Box Adversarial Attack against Image-Translation-Based DeepFake. ICME 2024: 1-6 - [i15]Rui Wang, Dengpan Ye, Long Tang, Yunming Zhang, Jiacheng Deng:
AVT2-DWF: Improving Deepfake Detection with Audio-Visual Fusion and Dynamic Weighting Strategies. CoRR abs/2403.14974 (2024) - [i14]Yunming Zhang, Dengpan Ye, Sipeng Shen, Caiyun Xie, Ziyi Liu, Jiacheng Deng, Long Tang:
Double Privacy Guard: Robust Traceable Adversarial Watermarking against Face Recognition. CoRR abs/2404.14693 (2024) - [i13]Jiawei Song, Dengpan Ye, Yunming Zhang:
Trinity Detector:text-assisted and attention mechanisms based spectral fusion for diffusion generation image detection. CoRR abs/2404.17254 (2024) - [i12]Ziyi Liu, Dengpan Ye, Long Tang, Yunming Zhang, Jiacheng Deng:
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN. CoRR abs/2409.12472 (2024) - 2023
- [j40]Lv Chen, Dengpan Ye, Yueyun Shang:
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model. Comput. J. 66(11): 2741-2757 (2023) - [c17]Cong Tian, Dengpan Ye, Chuanxi Chen:
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis. ACNS (1) 2023: 237-259 - [c16]Baojin Huang, Zhongyuan Wang, Jifan Yang, Jiaxin Ai, Qin Zou, Qian Wang, Dengpan Ye:
Implicit Identity Driven Deepfake Face Swapping Detection. CVPR 2023: 4490-4499 - [c15]Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency. CVPR 2023: 16363-16372 - [c14]Qingqing Wang, Dengpan Ye:
Robust Anti-forensics on Audio Forensics System. ICIC (5) 2023: 589-599 - [c13]Jingyang Li, Dengpan Ye, Long Tang, Chuanxi Chen, Shengshan Hu:
Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain. IJCAI 2023: 4812-4820 - [c12]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. ACM Multimedia 2023: 7559-7568 - [i11]Long Tang, Dengpan Ye, Zhenhao Lu, Yunming Zhang, Shengshan Hu, Yue Xu, Chuanxi Chen:
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors. CoRR abs/2303.00200 (2023) - [i10]Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency. CoRR abs/2303.18191 (2023) - [i9]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. CoRR abs/2308.02369 (2023) - [i8]Yunming Zhang, Dengpan Ye, Caiyun Xie, Long Tang, Chuanxi Chen, Ziyi Liu, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping. CoRR abs/2310.16540 (2023) - 2022
- [j39]Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang:
Detection defense against adversarial attacks with saliency map. Int. J. Intell. Syst. 37(12): 10193-10210 (2022) - [j38]Yi Jiang, Dengpan Ye:
Black-Box Adversarial Attacks against Audio Forensics Models. Secur. Commun. Networks 2022: 6410478:1-6410478:8 (2022) - [j37]Muhammad Aslam, Dengpan Ye, Aqil Tariq, Muhammad Asad, Muhammad Hanif, David Ndzi, Samia Allaoua Chelloug, Mohamed Abd Elaziz, Mohammed Abdulaziz Aide Al-qaness, Syeda Fizzah Jilani:
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors 22(7): 2697 (2022) - [c11]Lv Chen, Dengpan Ye, Yueyun Shang, Jiaqing Huang:
Robust Video Hashing Based on Local Fluctuation Preserving for Tracking Deep Fake Videos. ICASSP 2022: 2894-2898 - [c10]Chuanxi Chen, Dengpan Ye, Hao Wang, Long Tang, Yue Xu:
Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning. TrustCom 2022: 184-191 - 2021
- [j36]Xinlei Jin, Dengpan Ye, Chuanxi Chen:
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals. Secur. Commun. Networks 2021: 6626974:1-6626974:8 (2021) - [j35]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j34]Guang Hua, Han Liao, Qingyi Wang, Haijian Zhang, Dengpan Ye:
Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors. IEEE Trans. Inf. Forensics Secur. 16: 236-248 (2021) - [j33]Guang Hua, Han Liao, Haijian Zhang, Dengpan Ye, Jiayi Ma:
Robust ENF Estimation Based on Harmonic Enhancement and Maximum Weight Clique. IEEE Trans. Inf. Forensics Secur. 16: 3874-3887 (2021) - [c9]Jiaqing Huang, Dengpan Ye:
Ground-to-Aerial Image Geo-Localization with Cross-View Image Synthesis. ICIG (3) 2021: 412-424 - [c8]Ziwei Zhang, Dengpan Ye:
Protecting Encrypted Video Stream Against Information Leak Using Adversarial Traces. ICIG (3) 2021: 765-776 - [c7]Shenhao Cao, Qin Zou, Xiuqing Mao, Dengpan Ye, Zhongyuan Wang:
Metric Learning for Anti-Compression Facial Forgery Detection. ACM Multimedia 2021: 1929-1937 - 2020
- [j32]Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun, Dengpan Ye, Xiangyang Luo:
NEXT: a neural network framework for next POI recommendation. Frontiers Comput. Sci. 14(2): 314-333 (2020) - [j31]Shunzhi Jiang, Dengpan Ye, Jiaqing Huang, Yueyun Shang, Zhuoyuan Zheng:
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application. J. Netw. Comput. Appl. 165: 102689 (2020) - [j30]Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:
Anti-steganalysis for image on convolutional neural networks. Multim. Tools Appl. 79(7-8): 4315-4331 (2020) - [j29]Ayesha Shafique, Guo Cao, Muhammad Aslam, Muhammad Asad, Dengpan Ye:
Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT). Sensors 20(12): 3521 (2020) - [c6]Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things. ML4CS (1) 2020: 180-194 - [c5]Lv Chen, Dengpan Ye, Shunzhi Jiang:
High Accuracy Perceptual Video Hashing via Low-Rank Decomposition and DWT. MMM (1) 2020: 802-812 - [c4]Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:
Adaptive Machine learning: A Framework for Active Malware Detection. MSN 2020: 57-64 - [i7]Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang:
Detection Defense Against Adversarial Attacks with Saliency Map. CoRR abs/2009.02738 (2020) - [i6]Guang Hua, Qingyi Wang, Dengpan Ye, Haijian Zhang:
Reliability of Power System Frequency on Times-Stamping Digital Recordings. CoRR abs/2011.00176 (2020) - [i5]Guang Hua, Han Liao, Haijian Zhang, Dengpan Ye, Jiayi Ma:
Robust ENF Estimation Based on Harmonic Enhancement and Maximum Weight Clique. CoRR abs/2011.03414 (2020)
2010 – 2019
- 2019
- [j28]Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Dengpan Ye:
Reversible Data Hiding With Image Enhancement Using Histogram Shifting. IEEE Access 7: 46506-46521 (2019) - [j27]Fei Ma, Xiaoke Zhu, Qinglong Liu, Chengfang Song, Xiao-Yuan Jing, Dengpan Ye:
Multi-view coupled dictionary learning for person re-identification. Neurocomputing 348: 16-26 (2019) - [j26]Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j25]Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j24]Dengpan Ye, Shunzhi Jiang, Shiyu Li, Changrui Liu:
Faster and transferable deep learning steganalysis on GPU. J. Real Time Image Process. 16(3): 623-633 (2019) - [j23]Zhenjun Tang, Shijie Xu, Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu:
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J. Real Time Image Process. 16(3): 709-724 (2019) - [j22]Artur Janicki, Wojciech Mazurczyk, Xiangyang Luo, Dengpan Ye:
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes. J. Univers. Comput. Sci. 25(9): 1039-1042 (2019) - [j21]Donghui Hu, Zhongjin Ma, Yuqi Fan, Shuli Zheng, Dengpan Ye, Lina Wang:
Study on the interaction between the cover source mismatch and texture complexity in steganalysis. Multim. Tools Appl. 78(6): 7643-7666 (2019) - [i4]Dengpan Ye, Shunzhi Jiang, Jiaqin Huang:
Heard More Than Heard: An Audio Steganography Method Based on GAN. CoRR abs/1907.04986 (2019) - [i3]Shichang Ding, Xiangyang Luo, Dengpan Ye, Fenlin Liu:
Delay-Distance Correlation Study for IP Geolocation. CoRR abs/1909.02439 (2019) - [i2]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Minghui Li, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. CoRR abs/1909.09472 (2019) - 2018
- [j20]Xiaoguang Niu, Qiongzan Ye, Yihao Zhang, Dengpan Ye:
A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems. IEEE Access 6: 15457-15467 (2018) - [j19]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Min Yang, Dengpan Ye:
On Improving Distortion Functions for JPEG Steganography. IEEE Access 6: 74917-74930 (2018) - [j18]Krzysztof Szczypiorski, Liqiang Wang, Xiangyang Luo, Dengpan Ye:
Big Data Analytics for Information Security. Secur. Commun. Networks 2018: 7657891:1-7657891:2 (2018) - [c3]Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:
Attack on Deep Steganalysis Neural Networks. ICCCS (4) 2018: 265-276 - 2017
- [j17]Fang Cao, Bowen An, Jinwei Wang, Dengpan Ye, Huili Wang:
Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46: 52-60 (2017) - [j16]Donghui Hu, Zhongjin Ma, Xiaotian Zhang, Peipei Li, Dengpan Ye, Baohong Ling:
The Concept Drift Problem in Android Malware Detection and Its Solution. Secur. Commun. Networks 2017: 4956386:1-4956386:13 (2017) - [c2]Fan Zhao, Jingning Chen, Dengpan Ye, Xiangyang Luo:
A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes. DSC 2017: 140-144 - [i1]Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun, Dengpan Ye, Xiangyang Luo:
NEXT: A Neural Network Framework for Next POI Recommendation. CoRR abs/1704.04576 (2017) - 2016
- [j15]Chuan Qin, Xueqin Chen, Dengpan Ye, Jinwei Wang, Xingming Sun:
A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361-362: 84-99 (2016) - [j14]Chuan Qin, Dengpan Ye, Xiangyang Luo:
Guest Editorial: Information Hiding and Forensics for Multimedia Security. Multim. Tools Appl. 75(21): 13421-13429 (2016) - [j13]Shuli Zheng, Dandan Li, Donghui Hu, Dengpan Ye, Lina Wang, Jinwei Wang:
Lossless data hiding algorithm for encrypted images with high capacity. Multim. Tools Appl. 75(21): 13765-13778 (2016) - [j12]Yanzhen Ren, Mengdi Fan, Dengpan Ye, Jing Yang, Lina Wang:
Detection of double MP3 compression Based on Difference of Calibration Histogram. Multim. Tools Appl. 75(21): 13855-13870 (2016) - [j11]Dengpan Ye, Yuan Mei, Yueyun Shang, Jixiang Zhu, Kun Ouyang:
Mobile crowd-sensing context aware based fine-grained access control mode. Multim. Tools Appl. 75(21): 13977-13993 (2016) - [j10]Wojciech Mazurczyk, Krzysztof Szczypiorski, Zoran Duric, Dengpan Ye:
Cyber Crime. Secur. Commun. Networks 9(15): 2861-2863 (2016) - [j9]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A framework of adaptive steganography resisting JPEG compression and detection. Secur. Commun. Networks 9(15): 2957-2971 (2016) - 2015
- [j8]Lingyu Yan, Hefei Ling, Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen:
Feature Fusion based Hashing for Large Scale Image Copy Detection. Int. J. Comput. Intell. Syst. 8(4): 725-734 (2015) - [c1]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. ARES 2015: 461-466 - 2014
- [j7]Yueyun Shang, Dengpan Ye, Zhuo Wei, Yajuan Xie:
GPU-Based MPEG-2 to Secure Scalable Video Transcoding. Int. J. Digit. Crime Forensics 6(2): 52-69 (2014) - 2012
- [j6]Dengpan Ye:
Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye. Int. J. Comput. Intell. Syst. 5(5): 913 (2012) - [j5]Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. Int. J. Comput. Intell. Syst. 5(5): 953-963 (2012) - [j4]Yajuan Xie, Shanzhen Yi, Zhongqian Tang, Dengpan Ye:
Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory. Int. J. Comput. Intell. Syst. 5(5): 975-984 (2012) - 2011
- [j3]Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng:
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method. Int. J. Comput. Intell. Syst. 4(5): 777-787 (2011) - [j2]Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin:
Adaptive Secret Sharing for Color Images. Int. J. Comput. Intell. Syst. 4(5): 797-805 (2011) - [j1]Lina Wang, Xiaqiu Jiang, Shiguo Lian, Donghui Hu, Dengpan Ye:
Image authentication based on perceptual hash using Gabor filters. Soft Comput. 15(3): 493-504 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint