default search action
Weiqi Luo 0001
Person information
- affiliation (PhD 2008): Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China
- affiliation: Fujian Normal University, Key Lab of Network Security and Cryptology, Fuzhou
Other persons with the same name
- Weiqi Luo — disambiguation page
- Weiqi Luo 0002 — Jinan University, Guangdong Institute of Smart Education, Guangdong Institute of Smart Education, College of Cyber Security, Guangzhou, China (and 1 more)
- Weiqi Luo 0003 — North Carolina State University, Raleigh, NC, USA (and 2 more)
- Weiqi Luo 0004 — Dalian University of Technology, Mechanical Engineering Department, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Wenmin Huang, Weiqi Luo, Xiaochun Cao, Jiwu Huang:
Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8215-8229 (2024) - [j35]Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. IEEE Trans. Inf. Forensics Secur. 19: 15-29 (2024) - [j34]Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. IEEE Trans. Inf. Forensics Secur. 19: 2581-2593 (2024) - [j33]Kangkang Wei, Weiqi Luo, Jiwu Huang:
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling. IEEE Trans. Inf. Forensics Secur. 19: 9970-9983 (2024) - [c40]Wenmin Huang, Weiqi Luo, Jiwu Huang, Xiaochun Cao:
SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing. AAAI 2024: 2374-2381 - [c39]Miaoxin Ye, Dongxia Huang, Kangkang Wei, Weiqi Luo:
A Novel Residual-Guided Learning Method for Image Steganography. ICASSP 2024: 4565-4569 - [c38]Qingfeng Zheng, Peijia Zheng, Weiqi Luo, Wei Lu:
A Fast and Tunable Privacy-Preserving Action Recognition Framework over Compressed Video. ICME 2024: 1-6 - [c37]Qianyi Chen, Peijia Zheng, Yusong Du, Weiqi Luo, Hongmei Liu:
FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking. ICMLC 2024: 80-86 - [c36]Miaoxin Ye, Saixing Zhou, Weiqi Luo, Shunquan Tan, Jiwu Huang:
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security. ACM Multimedia 2024: 7046-7054 - 2023
- [j32]Hao Lin, Wenmin Huang, Weiqi Luo, Wei Lu:
DeepFake detection with multi-scale convolution and vision transformer. Digit. Signal Process. 134: 103895 (2023) - [j31]Kangkang Wei, Weiqi Luo, Minglin Liu, Miaoxin Ye:
Residual guided coordinate attention for selection channel aware image steganalysis. Multim. Syst. 29(4): 2125-2135 (2023) - [j30]Peijia Zheng, Ziyan Cheng, Xianhao Tian, Hongmei Liu, Weiqi Luo, Jiwu Huang:
Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 11(4): 3452-3468 (2023) - [j29]Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Adversarial Steganography Embedding via Stego Generation and Selection. IEEE Trans. Dependable Secur. Comput. 20(3): 2375-2389 (2023) - [c35]Ziyi Xi, Wenmin Huang, Kangkang Wei, Weiqi Luo, Peijia Zheng:
AI-Generated Image Detection using a Cross-Attention Enhanced Dual-Stream Network. APSIPA ASC 2023: 1463-1470 - [c34]Donger Mo, Peijia Zheng, Yufei Zhou, Jingyi Chen, Shan Huang, Weiqi Luo, Wei Lu, Chunfang Yang:
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption. IWDW 2023: 63-78 - [c33]Jinkun Huang, Weiqi Luo, Wenmin Huang, Ziyi Xi, Kangkang Wei, Jiwu Huang:
Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization. IWDW 2023: 151-165 - [c32]Dongxia Huang, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks. ACM Multimedia 2023: 8316-8326 - [c31]Chenyu Dong, Peijia Zheng, Weiqi Luo:
Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition. TrustCom 2023: 1592-1597 - [i10]Ziyi Xi, Wenmin Huang, Kangkang Wei, Weiqi Luo, Peijia Zheng:
AI-Generated Image Detection using a Cross-Attention Enhanced Dual-Stream Network. CoRR abs/2306.07005 (2023) - [i9]Miaoxin Ye, Dongxia Huang, Kangkang Wei, Weiqi Luo:
A Novel Residual-guided Learning Method for Image Steganography. CoRR abs/2312.01080 (2023) - 2022
- [j28]Xiaoqing Deng, Bolin Chen, Weiqi Luo, Da Luo:
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling. J. Comput. Sci. Technol. 37(5): 1134-1145 (2022) - [j27]Minglin Liu, Hangyu Fan, Kangkang Wei, Weiqi Luo, Wei Lu:
Adversarial robust image steganography against lossy JPEG compression. Signal Process. 200: 108668 (2022) - [j26]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. IEEE Trans. Inf. Forensics Secur. 17: 3022-3036 (2022) - [c30]Ruopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu, Wei Lu, Weiqi Luo:
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption. ICAIS (3) 2022: 373-385 - [c29]Huicong Zeng, Zhiwei Cai, Peijia Zheng, Hongmei Liu, Weiqi Luo:
Secure Evaluation of Discrete Sine Transform in Homomorphic Encrypted Domain. ICAIS (2) 2022: 513-525 - [c28]Hao Lin, Weiqi Luo, Kangkang Wei, Minglin Liu:
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION. ICDIS 2022: 208-212 - [i8]Ziyi Xi, Hao Lin, Weiqi Luo:
Dual Stream Computer-Generated Image Detection Network Based On Channel Joint And Softpool. CoRR abs/2207.03205 (2022) - 2021
- [j25]Minglin Liu, Weiqi Luo, Peijia Zheng, Jiwu Huang:
A New Adversarial Embedding Method for Enhancing Image Steganography. IEEE Trans. Inf. Forensics Secur. 16: 4621-4634 (2021) - [c27]Tingting Song, Minglin Liu, Weiqi Luo, Peijia Zheng:
Enhancing Image Steganography Via Stego Generation And Selection. ICASSP 2021: 2695-2699 - [c26]Xiaoqing Deng, Weiqi Luo, Yanmei Fang:
Spatial Steganalysis Based on Gradient-Based Neural Architecture Search. ProvSec 2021: 365-375 - [c25]Zhiwei Cai, Huicong Zeng, Peijia Zheng, Ziyan Cheng, Weiqi Luo, Hongmei Liu:
Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision. TrustCom 2021: 266-272 - [c24]Delin Chen, Peijia Zheng, Ziyang Chen, Ruopan Lai, Weiqi Luo, Hongmei Liu:
Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images. TrustCom 2021: 486-493 - [i7]Hao Lin, Weiqi Luo, Kangkang Wei, Minglin Liu:
Improved Xception with Dual Attention Mechanism and Feature Fusion for Face Forgery Detection. CoRR abs/2109.14136 (2021) - [i6]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image based on Channel Representation. CoRR abs/2111.12231 (2021) - 2020
- [j24]Bolin Chen, Haodong Li, Weiqi Luo, Jiwu Huang:
Image processing operations identification via convolutional neural network. Sci. China Inf. Sci. 63(3) (2020) - [j23]Bolin Chen, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Universal stego post-processing for enhancing image steganography. J. Inf. Secur. Appl. 55: 102664 (2020) - [j22]Junhui He, Yuzhang Xu, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process. Image Commun. 89: 115994 (2020) - [j21]Junqi Wu, Bolin Chen, Weiqi Luo, Yanmei Fang:
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 15: 2282-2294 (2020) - [c23]Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, Zhenghui Liu:
Compression Detection of Audio Waveforms Based on Stacked Autoencoders. ICAIS (2) 2020: 393-404
2010 – 2019
- 2019
- [j20]Junhui He, Junxi Chen, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3501-3515 (2019) - [c22]Bolin Chen, Weiqi Luo, Peijia Zheng:
Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference. IH&MMSec 2019: 63-68 - [c21]Xiaoqing Deng, Bolin Chen, Weiqi Luo, Da Luo:
Fast and Effective Global Covariance Pooling Network for Image Steganalysis. IH&MMSec 2019: 230-234 - [c20]Yonghong Zhang, Peijia Zheng, Weiqi Luo:
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain. TrustCom/BigDataSE 2019: 389-396 - [c19]Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. WIFS 2019: 1-6 - [i5]Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. CoRR abs/1909.07556 (2019) - [i4]Bolin Chen, Weiqi Luo, Jiwu Huang:
Universal Stego Post-processing for Enhancing Image Steganography. CoRR abs/1912.03878 (2019) - 2018
- [j19]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Identification of Various Image Operations Using Residual-Based Features. IEEE Trans. Circuits Syst. Video Technol. 28(1): 31-45 (2018) - [j18]Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, Jiwu Huang:
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics. ACM Trans. Multim. Comput. Commun. Appl. 14(2): 43:1-43:14 (2018) - [c18]Huaxiao Mo, Bolin Chen, Weiqi Luo:
Fake Faces Identification via Convolutional Neural Network. IH&MMSec 2018: 43-47 - [c17]Bolin Chen, Weiqi Luo, Da Luo:
Identification of Audio Processing Operations Based on Convolutional Neural Network. IH&MMSec 2018: 73-77 - 2017
- [j17]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Image Forgery Localization via Integrating Tampering Possibility Maps. IEEE Trans. Inf. Forensics Secur. 12(5): 1240-1252 (2017) - [j16]Haodong Li, Weiqi Luo, Jiwu Huang:
Localization of Diffusion-Based Inpainting in Digital Images. IEEE Trans. Inf. Forensics Secur. 12(12): 3050-3064 (2017) - [c16]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing Video Forgeries by Detecting Misaligned Double Compression. ICVIP 2017: 44-48 - [c15]Bolin Chen, Weiqi Luo, Haodong Li:
Audio Steganalysis with Convolutional Neural Network. IH&MMSec 2017: 85-90 - [c14]Weiqi Luo, Yue Zhang, Haodong Li:
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding. IWDW 2017: 177-186 - [i3]Haodong Li, Weiqi Luo, Quanquan Rao, Jiwu Huang:
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack. CoRR abs/1707.07795 (2017) - [i2]Bolin Chen, Haodong Li, Weiqi Luo:
Image Processing Operations Identification via Convolutional Neural Network. CoRR abs/1709.02908 (2017) - 2016
- [j15]Weixuan Tang, Bin Li, Weiqi Luo, Jiwu Huang:
Clustering Steganographic Modification Directions for Color Components. IEEE Signal Process. Lett. 23(2): 197-201 (2016) - [j14]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive Steganalysis Based on Embedding Probabilities of Pixels. IEEE Trans. Inf. Forensics Secur. 11(4): 734-745 (2016) - 2015
- [j13]Haodong Li, Weiqi Luo, Jiwu Huang:
Anti-forensics of double JPEG compression with the same quantization matrix. Multim. Tools Appl. 74(17): 6729-6744 (2015) - [i1]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Identification of Image Operations Based on Steganalytic Features. CoRR abs/1503.04718 (2015) - 2014
- [j12]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics. Sci. China Inf. Sci. 57(2): 1-18 (2014) - [j11]Shan Bian, Weiqi Luo, Jiwu Huang:
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity. Multim. Tools Appl. 72(1): 437-451 (2014) - [j10]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing Fake Bit Rate Videos and Estimating Original Bit Rates. IEEE Trans. Circuits Syst. Video Technol. 24(12): 2144-2154 (2014) - [j9]Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang:
Identifying Compression History of Wave Audio and Its Applications. ACM Trans. Multim. Comput. Commun. Appl. 10(3): 30:1-30:19 (2014) - [c13]Chao Chen, Haodong Li, Weiqi Luo, Rui Yang, Jiwu Huang:
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement. ICPR 2014: 672-677 - [c12]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. IH&MMSec 2014: 91-96 - [c11]Xiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang:
A universal image forensic strategy based on steganalytic model. IH&MMSec 2014: 165-170 - 2013
- [c10]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing fake bitrate video and its original bitrate. ICIP 2013: 4492-4496 - [c9]Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi:
Distortion function designing for JPEG steganography with uncompressed side-image. IH&MMSec 2013: 69-76 - 2012
- [j8]Yanqiang Lei, Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. Circuits Syst. Video Technol. 22(9): 1332-1343 (2012) - [c8]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics. CVM 2012: 1-8 - [c7]Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang:
Compression history identification for digital audio signal. ICASSP 2012: 1733-1736 - [c6]Haodong Li, Weiqi Luo, Jiwu Huang:
Countering anti-JPEG compression forensics. ICIP 2012: 241-244 - 2011
- [j7]Fangjun Huang, Weiqi Luo, Jiwu Huang:
Steganalysis of JPEG steganography with complementary embedding strategy. IET Inf. Secur. 5(1): 10-18 (2011) - [j6]Weiqi Luo, Fangjun Huang, Jiwu Huang:
A more secure steganography based on adaptive pixel-value differencing scheme. Multim. Tools Appl. 52(2-3): 407-430 (2011) - [j5]Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Security Analysis on Spatial ± 1 Steganography for JPEG Decompressed Images. IEEE Signal Process. Lett. 18(1): 39-42 (2011) - 2010
- [j4]Weiqi Luo, Fangjun Huang, Jiwu Huang:
Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2): 201-214 (2010) - [j3]Weiqi Luo, Jiwu Huang, Guoping Qiu:
JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3): 480-491 (2010) - [j2]Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. Inf. Forensics Secur. 5(4): 810-815 (2010)
2000 – 2009
- 2008
- [c5]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. ICASSP 2008: 1661-1664 - [c4]Weiqi Luo, Jiwu Huang, Guoping Qiu:
A Novel Method for Block Size Forensics Based on Morphological Operations. IWDW 2008: 229-239 - [c3]Weiqi Luo, Min Wu, Jiwu Huang:
MPEG recompression detection based on block artifacts. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190X - 2007
- [j1]Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics. Frontiers Comput. Sci. China 1(2): 166-179 (2007) - [c2]Weiqi Luo, Zhenhua Qu, Jiwu Huang, Guoping Qiu:
A Novel Method for Detecting Cropped and Recompressed Image Block. ICASSP (2) 2007: 217-220 - 2006
- [c1]Weiqi Luo, Jiwu Huang, Guoping Qiu:
Robust Detection of Region-Duplication Forgery in Digital Image. ICPR (4) 2006: 746-749
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint