Yu, Nenghai
469  Ergebnisse:
Personensuche X
?
1

DSIS: A Novel (K,N) Threshold Deniable Secret Image Sharing..:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Xu, Zikai ; Liu, Bin ; Hu, Fei.. - p. 3720-3724 , 2024
 
?
2

LDGM Codes-Based Near-Optimal Coding for Adaptive Steganogr..:

Yao, Qiyi ; Zhang, Weiming ; Chen, Kejiang.
IEEE Transactions on Communications.  72 (2024)  4 - p. 2138-2151 , 2024
 
?
3

PointCAT: Contrastive Adversarial Training for Robust Point..:

Huang, Qidong ; Dong, Xiaoyi ; Chen, Dongdong...
IEEE Transactions on Image Processing.  33 (2024)  - p. 2183-2196 , 2024
 
?
4

Toward Secure and Robust Steganography for Black-Box Genera..:

Zeng, Kai ; Chen, Kejiang ; Zhang, Jiansong..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3237-3250 , 2024
 
?
5

Robust Model Watermarking for Image Processing Networks via..:

Zhang, Jie ; Chen, Dongdong ; Liao, Jing...
IEEE Transactions on Pattern Analysis and Machine Intelligence.  , 2024
 
?
6

Attribute-Aware Head Swapping Guided by 3d Modeling:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Zhou, Wenbo ; Chen, Dongdong ; Liao, Jing... - p. 2790-2794 , 2024
 
?
7

Deep Image Matting With Sparse User Interactions:

Wei, Tianyi ; Chen, Dongdong ; Zhou, Wenbo...
IEEE Transactions on Pattern Analysis and Machine Intelligence.  46 (2024)  2 - p. 881-895 , 2024
 
?
8

Natias: Neuron Attribution-Based Transferable Image Adversa..:

Fan, Zexin ; Chen, Kejiang ; Zeng, Kai...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6636-6649 , 2024
 
?
9

SE-SIS: Shadow-Embeddable Lossless Secret Image Sharing for..:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Xu, Zikai ; Liu, Bin ; Hu, Fei.. - p. 4775-4779 , 2024
 
?
10

AAS: Automatic Virtual Data Augmentation for Deep Image Ste..:

Zhang, Jiansong ; Chen, Kejiang ; Qin, Chuan..
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3515-3527 , 2024
 
?
11

Steganography With Generated Images: Leveraging Volatility ..:

Zhang, Jiansong ; Chen, Kejiang ; Li, Weixiang..
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3994-4005 , 2024
 
?
12

Security-Enhanced WireGuard Protocol Design Using Quantum K..:

, In: 2024 International Conference on Computing, Networking and Communications (ICNC),
Chen, Lutong ; Xue, Kaiping ; Li, Jian.. - p. 718-723 , 2024
 
?
13

REDP: Reliable Entanglement Distribution Protocol Design fo..:

Chen, Lutong ; Xue, Kaiping ; Li, Jian...
IEEE Journal on Selected Areas in Communications.  42 (2024)  7 - p. 1723-1737 , 2024
 
?
14

Provably Secure Robust Image Steganography:

Yang, Zijin ; Chen, Kejiang ; Zeng, Kai..
IEEE Transactions on Multimedia.  26 (2024)  - p. 5040-5053 , 2024
 
?
15

Audio-Visual Contrastive Pre-train for Face Forgery Detecti..:

Zhao, Hanqing ; Zhou, Wenbo ; Chen, Dongdong...
ACM Transactions on Multimedia Computing, Communications, and Applications.  , 2024
 
1-15