Chen, Kejiang
240  results:
Search for persons X
?
1

Provably Secure Robust Image Steganography:

Yang, Zijin ; Chen, Kejiang ; Zeng, Kai..
IEEE Transactions on Multimedia.  26 (2024)  - p. 5040-5053 , 2024
 
?
 
?
5

DP2Dataset Protection by Data Poisoning:

Fang, Han ; Qiu, Yupeng ; Qin, Guorui...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  2 - p. 636-649 , 2024
 
?
6

Provably Secure Public-Key Steganography Based on Elliptic ..:

Zhang, Xin ; Chen, Kejiang ; Ding, Jinyang...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3148-3163 , 2024
 
?
7

Natias: Neuron Attribution based Transferable Image Adversa..:

Fan, Zexin ; Chen, Kejiang ; Zeng, Kai...
IEEE Transactions on Information Forensics and Security.  , 2024
 
?
8

Upward Robust Steganography Based on Overflow Alleviation:

Zeng, Kai ; Chen, Kejiang ; Zhang, Weiming.
IEEE Transactions on Multimedia.  26 (2024)  - p. 299-312 , 2024
 
?
9

Model Access Control Based on Hidden Adversarial Examples f..:

Chen, Haozhe ; Zhang, Jie ; Chen, Kejiang..
IEEE Transactions on Artificial Intelligence.  5 (2024)  3 - p. 1302-1315 , 2024
 
?
10

Toward Secure and Robust Steganography for Black-Box Genera..:

Zeng, Kai ; Chen, Kejiang ; Zhang, Jiansong..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3237-3250 , 2024
 
?
11

LDGM Codes-Based Near-Optimal Coding for Adaptive Steganogr..:

Yao, Qiyi ; Zhang, Weiming ; Chen, Kejiang.
IEEE Transactions on Communications.  72 (2024)  4 - p. 2138-2151 , 2024
 
?
12

Perceptual Hashing of Deep Convolutional Neural Networks fo..:

Chen, Haozhe ; Zhou, Hang ; Zhang, Jie...
ACM Transactions on Multimedia Computing, Communications, and Applications.  19 (2023)  3 - p. 1-20 , 2023
 
?
14

StegaDDPM: Generative Image Steganography based on Denoisin..:

, In: Proceedings of the 31st ACM International Conference on Multimedia,
Peng, Yinyin ; Hu, Donghui ; Wang, Yaofei... - p. 7143-7151 , 2023
 
?
 
1-15