Chen, Kejiang
230  results:
Search for persons X
?
1

Provably Secure Public-Key Steganography Based on Elliptic ..:

Zhang, Xin ; Chen, Kejiang ; Ding, Jinyang...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3148-3163 , 2024
 
?
2

Upward Robust Steganography Based on Overflow Alleviation:

Zeng, Kai ; Chen, Kejiang ; Zhang, Weiming.
IEEE Transactions on Multimedia.  26 (2024)  - p. 299-312 , 2024
 
?
3

Toward Secure and Robust Steganography for Black-Box Genera..:

Zeng, Kai ; Chen, Kejiang ; Zhang, Jiansong..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3237-3250 , 2024
 
?
4

LDGM Codes-Based Near-Optimal Coding for Adaptive Steganogr..:

Yao, Qiyi ; Zhang, Weiming ; Chen, Kejiang.
IEEE Transactions on Communications.  72 (2024)  4 - p. 2138-2151 , 2024
 
?
5

Provably Secure Robust Image Steganography:

Yang, Zijin ; Chen, Kejiang ; Zeng, Kai..
IEEE Transactions on Multimedia.  26 (2024)  - p. 5040-5053 , 2024
 
?
6

DP2Dataset Protection by Data Poisoning:

Fang, Han ; Qiu, Yupeng ; Qin, Guorui...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  2 - p. 636-649 , 2024
 
?
8

AAS: Automatic Virtual Data Augmentation for Deep Image Ste..:

Zhang, Jiansong ; Chen, Kejiang ; Qin, Chuan..
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3515-3527 , 2024
 
?
9

Attribute-Aware Head Swapping Guided by 3d Modeling:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Zhou, Wenbo ; Chen, Dongdong ; Liao, Jing... - p. 2790-2794 , 2024
 
?
11

Natias: Neuron Attribution-Based Transferable Image Adversa..:

Fan, Zexin ; Chen, Kejiang ; Zeng, Kai...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6636-6649 , 2024
 
?
12

Steganography With Generated Images: Leveraging Volatility ..:

Zhang, Jiansong ; Chen, Kejiang ; Li, Weixiang..
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3994-4005 , 2024
 
?
13

CodeWMBench: An Automated Benchmark for Code Watermarking E..:

, In: Proceedings of the ACM Turing Award Celebration Conference - China 2024,
Wu, BenLong ; Chen, Kejiang ; He, Yanru... - p. 120-125 , 2024
 
?
14

Model Access Control Based on Hidden Adversarial Examples f..:

Chen, Haozhe ; Zhang, Jie ; Chen, Kejiang..
IEEE Transactions on Artificial Intelligence.  5 (2024)  3 - p. 1302-1315 , 2024
 
?
15

Cover Reproducible Steganography via Deep Generative Models:

Chen, Kejiang ; Zhou, Hang ; Wang, Yaofei...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  5 - p. 3787-3798 , 2023
 
1-15