default search action
Weiming Zhang 0001
Person information
- affiliation: University of Science and Technology of China, School of Cyber Science and Security, CAS Key Laboratory of Electro-magnetic Space Information, Hefei, Anhui, China
- affiliation (PhD 2005): Zhengzhou Information Science and Technology Institute, Zhengzhou, China
Other persons with the same name
- Weiming Zhang (aka: Wei Ming Zhang) — disambiguation page
- Weiming Zhang 0002 — Jiangnan University, School of Internet of Things Engineering, Wuxi, China
- Weiming Zhang 0003 — National University of Defense Technology, Science and Technology on Information Systems Engineering Laboratory, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j156]Xuehai Zhang, Wenbo Zhou, Kunlin Liu, Hao Tang, Zhenyu Zhang, Weiming Zhang, Nenghai Yu:
ControlFace: Feature Disentangling for Controllable Face Swapping. J. Imaging 10(1): 21 (2024) - [j155]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Hanqing Zhao, Weiming Zhang, Gang Hua, Nenghai Yu:
Deep Image Matting With Sparse User Interactions. IEEE Trans. Pattern Anal. Mach. Intell. 46(2): 881-895 (2024) - [j154]Jie Zhang, Dongdong Chen, Jing Liao, Zehua Ma, Han Fang, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Robust Model Watermarking for Image Processing Networks via Structure Consistency. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6985-6992 (2024) - [j153]Haozhe Chen, Jie Zhang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition. IEEE Trans. Artif. Intell. 5(3): 1302-1315 (2024) - [j152]Yexin Liu, Weiming Zhang, Guoyang Zhao, Jinjing Zhu, Athanasios V. Vasilakos, Lin Wang:
Test-Time Adaptation for Nighttime Color-Thermal Semantic Segmentation. IEEE Trans. Artif. Intell. 5(10): 4893-4904 (2024) - [j151]Qiyi Yao, Weiming Zhang, Kejiang Chen, Nenghai Yu:
LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography. IEEE Trans. Commun. 72(4): 2138-2151 (2024) - [j150]Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. IEEE Trans. Dependable Secur. Comput. 21(2): 636-649 (2024) - [j149]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3515-3527 (2024) - [j148]Jiansong Zhang, Kejiang Chen, Weixiang Li, Weiming Zhang, Nenghai Yu:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3994-4005 (2024) - [j147]Zhaopin Su, Guofu Zhang, Zhiyuan Shi, Donghui Hu, Weiming Zhang:
Message-Driven Generative Music Steganography Using MIDI-GAN. IEEE Trans. Dependable Secur. Comput. 21(6): 5196-5207 (2024) - [j146]Xin Zhang, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. IEEE Trans. Inf. Forensics Secur. 19: 3148-3163 (2024) - [j145]Kai Zeng, Kejiang Chen, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Toward Secure and Robust Steganography for Black-Box Generated Images. IEEE Trans. Inf. Forensics Secur. 19: 3237-3250 (2024) - [j144]Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. IEEE Trans. Inf. Forensics Secur. 19: 6636-6649 (2024) - [j143]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu:
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models. IEEE Trans. Inf. Forensics Secur. 19: 8600-8615 (2024) - [j142]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Hang Zhou, Weiming Zhang, Kui Zhang, Gang Hua, Yueqiang Cheng, Nenghai Yu:
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition. IEEE Trans. Image Process. 33: 2183-2196 (2024) - [j141]Zhiwen Ren, Han Fang, Jie Zhang, Zehua Ma, Ronghao Lin, Weiming Zhang, Nenghai Yu:
A Robust Database Watermarking Scheme That Preserves Statistical Characteristics. IEEE Trans. Knowl. Data Eng. 36(6): 2329-2342 (2024) - [j140]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang:
Upward Robust Steganography Based on Overflow Alleviation. IEEE Trans. Multim. 26: 299-312 (2024) - [j139]Zijin Yang, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu:
Provably Secure Robust Image Steganography. IEEE Trans. Multim. 26: 5040-5053 (2024) - [j138]Li Li, Weiming Zhang, Mauro Barni:
Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information. IEEE Trans. Neural Networks Learn. Syst. 35(7): 10159-10166 (2024) - [c119]Guanjie Wang, Zehua Ma, Chang Liu, Xi Yang, Han Fang, Weiming Zhang, Nenghai Yu:
MuST: Robust Image Watermarking for Multi-Source Tracing. AAAI 2024: 5364-5371 - [c118]Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Data-Free Hard-Label Robustness Stealing Attack. AAAI 2024: 6853-6861 - [c117]Zhongyi Zhang, Tianyi Wei, Wenbo Zhou, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
FaceRSA: RSA-Aware Facial Identity Cryptography Framework. AAAI 2024: 7423-7431 - [c116]BenLong Wu, Kejiang Chen, Yanru He, Guoqiang Chen, Weiming Zhang, Nenghai Yu:
CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation. ACM TUR-C 2024 - [c115]Chi Zhang, Wenbo Zhou, Kui Zhang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency. ACM TUR-C 2024 - [c114]Deng Zhijian, Wenbo Zhou, Kunlin Liu, Weiming Zhang, Nenghai Yu:
Temporal Optimization for Face Swapping Video based on Consistency Inheritance. ACM TUR-C 2024 - [c113]Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu:
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. CCS 2024: 1196-1210 - [c112]Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Weiming Zhang, Nenghai Yu:
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models. CVPR 2024: 12162-12171 - [c111]Qidong Huang, Xiaoyi Dong, Pan Zhang, Bin Wang, Conghui He, Jiaqi Wang, Dahua Lin, Weiming Zhang, Nenghai Yu:
OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation. CVPR 2024: 13418-13427 - [c110]Linfeng Ma, Han Fang, Tianyi Wei, Zijin Yang, Zehua Ma, Weiming Zhang, Nenghai Yu:
A Geometric Distortion Immunized Deep Watermarking Framework with Robustness Generalizability. ECCV (67) 2024: 268-285 - [c109]Xiao Yu, Kejiang Chen, Qi Yang, Weiming Zhang, Nenghai Yu:
Text Fluoroscopy: Detecting LLM-Generated Text through Intrinsic Features. EMNLP 2024: 15838-15846 - [c108]Wenbo Zhou, Dongdong Chen, Jing Liao, Jie Zhang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Attribute-Aware Head Swapping Guided by 3d Modeling. ICASSP 2024: 2790-2794 - [c107]Weitao Feng, Wenbo Zhou, Jiyan He, Jie Zhang, Tianyi Wei, Guanlin Li, Tianwei Zhang, Weiming Zhang, Nenghai Yu:
AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA. ICML 2024 - [c106]Kui Zhang, Hang Zhou, Jie Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation. ICML 2024 - [c105]Han Fang, Kejiang Chen, Yupeng Qiu, Zehua Ma, Weiming Zhang, Ee-Chien Chang:
DERO: Diffusion-Model-Erasure Robust Watermarking. ACM Multimedia 2024: 2973-2981 - [c104]Yinyin Peng, Yaofei Wang, Donghui Hu, Kejiang Chen, Xianjin Rong, Weiming Zhang:
LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models. ACM Multimedia 2024: 3001-3009 - [c103]Xiao Yu, Kejiang Chen, Kai Zeng, Han Fang, Zijin Yang, Xiuwei Shang, Yuang Qi, Weiming Zhang, Nenghai Yu:
SemGIR: Semantic-Guided Image Regeneration Based Method for AI-generated Image Detection and Attribution. ACM Multimedia 2024: 8480-8488 - [c102]Yanghao Su, Jie Zhang, Ting Xu, Tianwei Zhang, Weiming Zhang, Nenghai Yu:
Model X-ray: Detecting Backdoored Models via Decision Boundary. ACM Multimedia 2024: 10296-10305 - [c101]Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu:
Detecting Voice Cloning Attacks via Timbre Watermarking. NDSS 2024 - [i100]Yanghao Su, Jie Zhang, Ting Xu, Tianwei Zhang, Weiming Zhang, Nenghai Yu:
Model X-ray: Detect Backdoored Models via Decision Boundary. CoRR abs/2402.17465 (2024) - [i99]Haoxiang Guan, Jiyan He, Shuxin Zheng, En-Hong Chen, Weiming Zhang, Nenghai Yu:
Towards Generalist Prompting for Large Language Models by Mental Models. CoRR abs/2402.18252 (2024) - [i98]Weiming Zhang, Yexin Liu, Xu Zheng, Lin Wang:
GoodSAM: Bridging Domain and Capacity Gaps via Segment Anything Model for Distortion-aware Panoramic Semantic Segmentation. CoRR abs/2403.16370 (2024) - [i97]Yuang Qi, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu:
Provably Secure Disambiguating Neural Linguistic Steganography. CoRR abs/2403.17524 (2024) - [i96]Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng, Yanming Zhang, Weiming Zhang, Nenghai Yu:
FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs. CoRR abs/2403.18403 (2024) - [i95]Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Wei Ming Zhang, Nenghai Yu:
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models. CoRR abs/2404.04956 (2024) - [i94]Yexin Liu, Weiming Zhang, Athanasios V. Vasilakos, Lin Wang:
Unsupervised Visible-Infrared ReID via Pseudo-label Correction and Modality-level Alignment. CoRR abs/2404.06683 (2024) - [i93]Xiuwei Shang, Shaoyin Cheng, Guoqiang Chen, Yanming Zhang, Li Hu, Xiao Yu, Gangyang Li, Weiming Zhang, Nenghai Yu:
How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models. CoRR abs/2404.09836 (2024) - [i92]Chao Zhou, Huishuai Zhang, Jiang Bian, Weiming Zhang, Nenghai Yu:
\copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model. CoRR abs/2404.11962 (2024) - [i91]Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu:
SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy. CoRR abs/2405.04936 (2024) - [i90]Weitao Feng, Wenbo Zhou, Jiyan He, Jie Zhang, Tianyi Wei, Guanlin Li, Tianwei Zhang, Weiming Zhang, Nenghai Yu:
AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA. CoRR abs/2405.11135 (2024) - [i89]Xinghui Zhou, Wenbo Zhou, Tianyi Wei, Shen Chen, Taiping Yao, Shouhong Ding, Weiming Zhang, Nenghai Yu:
Rank-based No-reference Quality Assessment for Face Swapping. CoRR abs/2406.01884 (2024) - [i88]Zidong Cao, Jinjing Zhu, Weiming Zhang, Lin Wang:
Any360D: Towards 360 Depth Anything with Unlabeled 360 Data and Möbius Spatial Augmentation. CoRR abs/2406.13378 (2024) - [i87]Ziyuan Fang, Hanqing Zhao, Tianyi Wei, Wenbo Zhou, Ming Wan, Zhanyi Wang, Weiming Zhang, Nenghai Yu:
UniForensics: Face Forgery Detection via General Facial Representation. CoRR abs/2407.19079 (2024) - [i86]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang:
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks. CoRR abs/2408.08924 (2024) - [i85]Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu:
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. CoRR abs/2408.12494 (2024) - [i84]Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Natias: Neuron Attribution based Transferable Image Adversarial Steganography. CoRR abs/2409.04968 (2024) - [i83]Qidong Huang, Xiaoyi Dong, Pan Zhang, Yuhang Zang, Yuhang Cao, Jiaqi Wang, Dahua Lin, Weiming Zhang, Nenghai Yu:
Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration Rate. CoRR abs/2410.07167 (2024) - [i82]Xiaojian Yuan, Tianyu Pang, Chao Du, Kejiang Chen, Weiming Zhang, Min Lin:
A Closer Look at Machine Unlearning for Large Language Models. CoRR abs/2410.08109 (2024) - [i81]Meng Tong, Kejiang Chen, Xiaojian Yuan, Jiayang Liu, Weiming Zhang, Nenghai Yu, Jie Zhang:
On the Vulnerability of Text Sanitization. CoRR abs/2410.17052 (2024) - [i80]Xiuwei Shang, Li Hu, Shaoyin Cheng, Guoqiang Chen, BenLong Wu, Weiming Zhang, Nenghai Yu:
Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations. CoRR abs/2410.18561 (2024) - 2023
- [b1]Hang Zhou, Kejiang Chen, Zehua Ma, Feng Wang, Weiming Zhang:
Triangle Mesh Watermarking and Steganography. Springer 2023, ISBN 978-981-19-7719-0, pp. 1-184 - [j137]Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang:
Invertible mask network for face privacy preservation. Inf. Sci. 629: 566-579 (2023) - [j136]Davide Salvi, Honggu Liu, Sara Mandelli, Paolo Bestagini, Wenbo Zhou, Weiming Zhang, Stefano Tubaro:
A Robust Approach to Multimodal Deepfake Detection. J. Imaging 9(6): 122 (2023) - [j135]Kunlin Liu, Wenbo Zhou, Zhenyu Zhang, Yanhao Ge, Hao Tang, Weiming Zhang, Nenghai Yu:
Measuring the Consistency and Diversity of 3D Face Generation. IEEE J. Sel. Top. Signal Process. 17(6): 1208-1220 (2023) - [j134]Jiayang Liu, Weiming Zhang, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma:
Unauthorized AI cannot recognize me: Reversible adversarial example. Pattern Recognit. 134: 109048 (2023) - [j133]Kunlin Liu, Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Wenbo Zhou, Weiming Zhang:
Deepfacelab: Integrated, flexible and extensible face-swapping framework. Pattern Recognit. 141: 109628 (2023) - [j132]Honggu Liu, Wenbo Zhou, Dongdong Chen, Han Fang, Huanyu Bian, Kunlin Liu, Weiming Zhang, Nenghai Yu:
Coherent adversarial deepfake video generation. Signal Process. 203: 108790 (2023) - [j131]Xi Yang, Weiming Zhang, Han Fang, Zehua Ma, Nenghai Yu:
Language universal font watermarking with multiple cross-media robustness. Signal Process. 203: 108791 (2023) - [j130]Hongyue Zha, Weiming Zhang, Nenghai Yu, Zexin Fan:
Enhancing image steganography via adversarial optimization of the stego distribution. Signal Process. 212: 109155 (2023) - [j129]Li Li, Weiming Zhang, Mauro Barni:
Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks. IEEE Signal Process. Lett. 30: 36-40 (2023) - [j128]Chuan Qin, Yuefeng Chen, Kejiang Chen, Xiaoyi Dong, Weiming Zhang, Xiaofeng Mao, Yuan He, Nenghai Yu:
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks. IEEE Trans. Artif. Intell. 4(5): 1029-1040 (2023) - [j127]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Robust Steganography for High Quality Images. IEEE Trans. Circuits Syst. Video Technol. 33(9): 4893-4906 (2023) - [j126]Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. IEEE Trans. Dependable Secur. Comput. 20(5): 3787-3798 (2023) - [j125]Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao:
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM. IEEE Trans. Dependable Secur. Comput. 20(5): 4016-4031 (2023) - [j124]Kaimeng Chen, Qingxiao Guan, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code. IEEE Trans. Dependable Secur. Comput. 20(6): 4519-4535 (2023) - [j123]Qingxiao Guan, Peng Liu, Weiming Zhang, Wei Lu, Xinpeng Zhang:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. IEEE Trans. Inf. Forensics Secur. 18: 501-516 (2023) - [j122]Weixiang Li, Bin Li, Weiming Zhang, Shengli Zhang:
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 18: 5026-5040 (2023) - [j121]Han Fang, Zhaoyang Jia, Hang Zhou, Zehua Ma, Weiming Zhang:
Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes. IEEE Trans. Multim. 25: 2648-2660 (2023) - [j120]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-Driven Watermarking Network. IEEE Trans. Multim. 25: 7571-7581 (2023) - [j119]Zehua Ma, Xi Yang, Han Fang, Weiming Zhang, Nenghai Yu:
OAcode: Overall Aesthetic 2D Barcode on Screen. IEEE Trans. Multim. 25: 8687-8698 (2023) - [j118]Yang Yang, Yingqiu Ding, Ming Cheng, Weiming Zhang:
No-reference Quality Assessment for Contrast-distorted Images Based on Gray and Color-gray-difference Space. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 64:1-64:20 (2023) - [j117]Haozhe Chen, Hang Zhou, Jie Zhang, Dongdong Chen, Weiming Zhang, Kejiang Chen, Gang Hua, Nenghai Yu:
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 123:1-123:20 (2023) - [j116]Yang Yang, Ming Cheng, Yingqiu Ding, Weiming Zhang:
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding. IEEE Trans. Serv. Comput. 16(4): 2387-2401 (2023) - [c100]Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu, Baining Guo:
PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers. AAAI 2023: 552-560 - [c99]Xi Yang, Jie Zhang, Han Fang, Chang Liu, Zehua Ma, Weiming Zhang, Nenghai Yu:
AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents. AAAI 2023: 3198-3205 - [c98]Xiaojian Yuan, Kejiang Chen, Jie Zhang, Weiming Zhang, Nenghai Yu, Yang Zhang:
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. AAAI 2023: 3349-3357 - [c97]Han Fang, Yupeng Qiu, Kejiang Chen, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. AAAI 2023: 5054-5061 - [c96]Chang Liu, Jie Zhang, Han Fang, Zehua Ma, Weiming Zhang, Nenghai Yu:
DeAR: A Deep-Learning-Based Audio Re-recording Resilient Watermarking. AAAI 2023: 13201-13209 - [c95]Zehua Ma, Hang Zhou, Weiming Zhang:
AnisoTag: 3D Printed Tag on 2D Surface via Reflection Anisotropy. CHI 2023: 420:1-420:15 - [c94]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Weiming Zhang, Feifei Wang, Gang Hua, Nenghai Yu:
Diversity-Aware Meta Visual Prompting. CVPR 2023: 10878-10887 - [c93]Xiaoyi Dong, Jianmin Bao, Yinglin Zheng, Ting Zhang, Dongdong Chen, Hao Yang, Ming Zeng, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining. CVPR 2023: 10995-11005 - [c92]Zexin Fan, Kejiang Chen, Chuan Qin, Kai Zeng, Weiming Zhang, Nenghai Yu:
Image Adversarial Steganography Based on Joint Distortion. ICASSP 2023: 1-5 - [c91]Xilong Wang, Yaofei Wang, Kejiang Chen, Jinyang Ding, Weiming Zhang, Nenghai Yu:
ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography. ICASSP 2023: 1-5 - [c90]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Yinpeng Chen, Lu Yuan, Gang Hua, Weiming Zhang, Nenghai Yu:
Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting. ICCV 2023: 1600-1610 - [c89]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Gang Hua, Nenghai Yu:
HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending. ICCV 2023: 23532-23542 - [c88]Weiming Zhang, Qingjie Liu, Wei Wang, Yunhong Wang:
Transbuilding: An End-to-End Polygonal Building Extraction with Transformers. ICIP 2023: 460-464 - [c87]Honggu Liu, Paolo Bestagini, Lin Huang, Wenbo Zhou, Stefano Tubaro, Weiming Zhang, Nenghai Yu:
It Wasn't Me: Irregular Identity in Deepfake Videos. ICIP 2023: 2770-2774 - [c86]Hanqing Zhao, Dianmo Sheng, Jianmin Bao, Dongdong Chen, Dong Chen, Fang Wen, Lu Yuan, Ce Liu, Wenbo Zhou, Qi Chu, Weiming Zhang, Nenghai Yu:
X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion. ICML 2023: 42098-42109 - [c85]Na Zhao, Kejiang Chen, Chuan Qin, Yi Yin, Weiming Zhang, Nenghai Yu:
Calibration-based Steganalysis for Neural Network Steganography. IH&MMSec 2023: 91-96 - [c84]Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. ASE 2023: 774-786 - [c83]Honggu Liu, Xiaodan Li, Wenbo Zhou, Han Fang, Paolo Bestagini, Weiming Zhang, Yuefeng Chen, Stefano Tubaro, Nenghai Yu, Yuan He, Hui Xue:
BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake. ACM Multimedia 2023: 7075-7084 - [c82]Yinyin Peng, Donghui Hu, Yaofei Wang, Kejiang Chen, Gang Pei, Weiming Zhang:
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model. ACM Multimedia 2023: 7143-7151 - [c81]Han Fang, Kejiang Chen, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Weiming Zhang, Ee-Chien Chang:
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness. ACM Multimedia 2023: 7345-7353 - [c80]Yanru He, Kejiang Chen, Guoqiang Chen, Zehua Ma, Kui Zhang, Jie Zhang, Huanyu Bian, Han Fang, Weiming Zhang, Nenghai Yu:
ProTegO: Protect Text Content against OCR Extraction Attack. ACM Multimedia 2023: 7424-7434 - [c79]Kui Zhang, Hang Zhou, Jie Zhang, Qidong Huang, Weiming Zhang, Nenghai Yu:
Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion. ACM Multimedia 2023: 8849-8859 - [c78]Guoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng, Weiming Zhang:
Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation. PST 2023: 1-11 - [c77]Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu:
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies". SP 2023: 2238-2255 - [c76]Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu:
SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy. TrustCom 2023: 896-903 - [i79]Huanyu Bian, Zhilong Jia, Menghan Dou, Yuan Fang, Lei Li, Yiming Zhao, Hanchao Wang, Zhaohui Zhou, Wei Wang, Wenyu Zhu, Ye Li, Yang Yang, Weiming Zhang, Nenghai Yu, Zhaoyun Chen, Guoping Guo:
VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum. CoRR abs/2301.03251 (2023) - [i78]Zehua Ma, Hang Zhou, Weiming Zhang:
AnisoTag: 3D Printed Tag on 2D Surface via Reflection Anisotropy. CoRR abs/2301.10599 (2023) - [i77]Zehua Ma, Xi Yang, Han Fang, Weiming Zhang, Nenghai Yu:
OAcode: Overall Aesthetic 2D Barcode on Screen. CoRR abs/2302.02396 (2023) - [i76]Xu Zheng, Yexin Liu, Yunfan Lu, Tongyan Hua, Tianbo Pan, Weiming Zhang, Dacheng Tao, Lin Wang:
Deep Learning for Event-based Vision: A Comprehensive Survey and Benchmarks. CoRR abs/2302.08890 (2023) - [i75]Xiaojian Yuan, Kejiang Chen, Jie Zhang, Weiming Zhang, Nenghai Yu, Yang Zhang:
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. CoRR abs/2302.09814 (2023) - [i74]Xilong Wang, Yaofei Wang, Kejiang Chen, Jinyang Ding, Weiming Zhang, Nenghai Yu:
ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography. CoRR abs/2303.05830 (2023) - [i73]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Weiming Zhang, Feifei Wang, Gang Hua, Nenghai Yu:
Diversity-Aware Meta Visual Prompting. CoRR abs/2303.08138 (2023) - [i72]Xi Yang, Kejiang Chen, Weiming Zhang, Chang Liu, Yuang Qi, Jie Zhang, Han Fang, Nenghai Yu:
Watermarking Text Generated by Black-Box Language Models. CoRR abs/2305.08883 (2023) - [i71]Xiao Yu, Yuang Qi, Kejiang Chen, Guoqiang Chen, Xi Yang, Pengyuan Zhu, Weiming Zhang, Nenghai Yu:
GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance. CoRR abs/2305.12519 (2023) - [i70]Yexin Liu, Weiming Zhang, Guoyang Zhao, Jinjing Zhu, Athanasios V. Vasilakos, Lin Wang:
Test-Time Adaptation for Nighttime Color-Thermal Semantic Segmentation. CoRR abs/2307.04470 (2023) - [i69]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Yinpeng Chen, Lu Yuan, Gang Hua, Weiming Zhang, Nenghai Yu:
Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting. CoRR abs/2308.10315 (2023) - [i68]Zhe Lei, Jie Zhang, Jingtao Li, Weiming Zhang, Nenghai Yu:
Aparecium: Revealing Secrets from Physical Photographs. CoRR abs/2308.12141 (2023) - [i67]Weitao Feng, Jiyan He, Jie Zhang, Tianwei Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking. CoRR abs/2309.05940 (2023) - [i66]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Gang Hua, Nenghai Yu:
HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending. CoRR abs/2310.10651 (2023) - [i65]Meng Tong, Kejiang Chen, Yuang Qi, Jie Zhang, Weiming Zhang, Nenghai Yu:
PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model. CoRR abs/2310.12214 (2023) - [i64]Zhiling Zhang, Jie Zhang, Kui Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World. CoRR abs/2310.16061 (2023) - [i63]Shuai Li, Kejiang Chen, Kunsheng Tang, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
FunctionMarker: Watermarking Language Datasets via Knowledge Injection. CoRR abs/2311.09535 (2023) - [i62]Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang:
Improving Adversarial Transferability by Stable Diffusion. CoRR abs/2311.11017 (2023) - [i61]Qidong Huang, Xiaoyi Dong, Pan Zhang, Bin Wang, Conghui He, Jiaqi Wang, Dahua Lin, Weiming Zhang, Nenghai Yu:
OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation. CoRR abs/2311.17911 (2023) - [i60]Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu:
Detecting Voice Cloning Attacks via Timbre Watermarking. CoRR abs/2312.03410 (2023) - [i59]Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Data-Free Hard-Label Robustness Stealing Attack. CoRR abs/2312.05924 (2023) - [i58]Na Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Performance-lossless Black-box Model Watermarking. CoRR abs/2312.06488 (2023) - [i57]Jiyan He, Weitao Feng, Yaosen Min, Jingwei Yi, Kunsheng Tang, Shuai Li, Jie Zhang, Kejiang Chen, Wenbo Zhou, Xing Xie, Weiming Zhang, Nenghai Yu, Shuxin Zheng:
Control Risk for Potential Misuse of Artificial Intelligence in Science. CoRR abs/2312.06632 (2023) - [i56]Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu:
Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models. CoRR abs/2312.09669 (2023) - 2022
- [j115]Kui Zhang, Hang Zhou, Huanyu Bian, Weiming Zhang, Nenghai Yu:
Certified defense against patch attacks via mask-guided randomized smoothing. Sci. China Inf. Sci. 65(7): 1-12 (2022) - [j114]Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu:
Deep 3D mesh watermarking with self-adaptive robustness. Cybersecur. 5(1): 24 (2022) - [j113]Chuan Qin, Wei Ming Zhang, Hang Zhou, Jiayang Liu, Yuan He, Nenghai Yu:
Robustness enhancement against adversarial steganography via steganalyzer outputs. J. Inf. Secur. Appl. 68: 103252 (2022) - [j112]Zhenyu Du, Xingxing Wei, Weiming Zhang, Fangzheng Liu, Huanyu Bian, Jiayang Liu:
A motional but temporally consistent physical video examples. J. Inf. Secur. Appl. 69: 103278 (2022) - [j111]Ming Shi, Yang Yang, Jian Meng, Weiming Zhang:
Reversible data hiding with enhancing contrast and preserving brightness in medical image. J. Inf. Secur. Appl. 70: 103324 (2022) - [j110]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Deep Model Intellectual Property Protection via Deep Watermarking. IEEE Trans. Pattern Anal. Mach. Intell. 44(8): 4005-4020 (2022) - [j109]Kai Zeng, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving robust adaptive steganography via minimizing channel errors. Signal Process. 195: 108498 (2022) - [j108]Yang Yang, Tianrui Zou, Genyan Huang, Weiming Zhang:
A High Visual Quality Color Image Reversible Data Hiding Scheme Based on B-R-G Embedding Principle and CIEDE2000 Assessment Metric. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1860-1874 (2022) - [j107]Qingxiao Guan, Kaimeng Chen, Hefeng Chen, Weiming Zhang, Nenghai Yu:
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix. IEEE Trans. Circuits Syst. Video Technol. 32(9): 6002-6016 (2022) - [j106]Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. IEEE Trans. Dependable Secur. Comput. 19(5): 3343-3356 (2022) - [j105]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Lu Yuan, Gang Hua, Nenghai Yu:
E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion. IEEE Trans. Image Process. 31: 3267-3280 (2022) - [j104]Jie Zhang, Dongdong Chen, Qidong Huang, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Poison Ink: Robust and Invisible Backdoor Attack. IEEE Trans. Image Process. 31: 5691-5705 (2022) - [j103]Han Fang, Dongdong Chen, Feng Wang, Zehua Ma, Honggu Liu, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability. IEEE Trans. Multim. 24: 955-967 (2022) - [j102]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis. IEEE Trans. Multim. 24: 4538-4550 (2022) - [j101]Xiaojuan Dong, Weiming Zhang, Mohsin Shah, Bei Wang, Nenghai Yu:
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud. IEEE Trans. Serv. Comput. 15(3): 1678-1692 (2022) - [j100]Kunlin Liu, Dongdong Chen, Jing Liao, Weiming Zhang, Hang Zhou, Jie Zhang, Wenbo Zhou, Nenghai Yu:
JPEG Robust Invertible Grayscale. IEEE Trans. Vis. Comput. Graph. 28(12): 4403-4417 (2022) - [j99]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. IEEE Trans. Vis. Comput. Graph. 28(12): 5006-5025 (2022) - [c75]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. AAAI 2022: 11613-11621 - [c74]Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Ting Zhang, Weiming Zhang, Nenghai Yu, Dong Chen, Fang Wen, Baining Guo:
Protecting Celebrities from DeepFake with Identity Consistency Transformer. CVPR 2022: 9458-9468 - [c73]Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Weiming Zhang, Nenghai Yu, Lu Yuan, Dong Chen, Baining Guo:
CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows. CVPR 2022: 12114-12124 - [c72]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Shape-invariant 3D Adversarial Point Clouds. CVPR 2022: 15314-15323 - [c71]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Zhentao Tan, Lu Yuan, Weiming Zhang, Nenghai Yu:
HairCLIP: Design Your Hair by Text and Reference Image. CVPR 2022: 18051-18060 - [c70]Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
Bootstrapped Masked Autoencoders for Vision BERT Pretraining. ECCV (30) 2022: 247-264 - [c69]Ping Wang, Kunlin Liu, Wenbo Zhou, Hang Zhou, Honggu Liu, Weiming Zhang, Nenghai Yu:
ADT: Anti-Deepfake Transformer. ICASSP 2022: 2899-1903 - [c68]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition. ICASSP 2022: 3059-3063 - [c67]Chuan Qin, Na Zhao, Weiming Zhang, Nenghai Yu:
Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography. ICASSP 2022: 3079-3083 - [c66]Jinliu Feng, Yaofei Wang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression. ICASSP 2022: 3084-3088 - [c65]Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu:
Noise Simulation-Based Deep Optical Watermarking. ICAIS (3) 2022: 283-298 - [c64]Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang, Nenghai Yu:
Capturing the Lighting Inconsistency for Deepfake Detection. ICAIS (2) 2022: 637-647 - [c63]Yinan Li, Weiming Zhang, Han Fang, Xi Yang, Zehua Ma, Nenghai Yu:
Font Watermarking Network for Text Images. ICIP 2022: 486-490 - [c62]Han Fang, Zhaoyang Jia, Zehua Ma, Ee-Chien Chang, Weiming Zhang:
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. ACM Multimedia 2022: 2267-2275 - [c61]Qiyi Yao, Weiming Zhang, Nenghai Yu:
Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile. WCSP 2022: 404-408 - [i55]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Weiming Zhang, Nenghai Yu:
Self-supervised Transformer for Deepfake Detection. CoRR abs/2203.01265 (2022) - [i54]Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Ting Zhang, Weiming Zhang, Nenghai Yu, Dong Chen, Fang Wen, Baining Guo:
Protecting Celebrities with Identity Consistency Transformer. CoRR abs/2203.01318 (2022) - [i53]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Shape-invariant 3D Adversarial Point Clouds. CoRR abs/2203.04041 (2022) - [i52]Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Invertible Mask Network for Face Privacy-Preserving. CoRR abs/2204.08895 (2022) - [i51]Zhaoyang Jia, Han Fang, Zehua Ma, Weiming Zhang:
Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images. CoRR abs/2204.11513 (2022) - [i50]Han Fang, Zhaoyang Jia, Yupeng Qiu, Jiyi Zhang, Weiming Zhang, Ee-Chien Chang:
De-END: Decoder-driven Watermarking Network. CoRR abs/2206.13032 (2022) - [i49]Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
Bootstrapped Masked Autoencoders for Vision BERT Pretraining. CoRR abs/2207.07116 (2022) - [i48]Xiaoyi Dong, Yinglin Zheng, Jianmin Bao, Ting Zhang, Dongdong Chen, Hao Yang, Ming Zeng, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining. CoRR abs/2208.12262 (2022) - [i47]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Hang Zhou, Weiming Zhang, Kui Zhang, Gang Hua, Nenghai Yu:
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition. CoRR abs/2209.07788 (2022) - [i46]Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. CoRR abs/2210.14632 (2022) - [i45]Kui Zhang, Hang Zhou, Jie Zhang, Qidong Huang, Weiming Zhang, Nenghai Yu:
Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion. CoRR abs/2211.16247 (2022) - [i44]Chang Liu, Jie Zhang, Han Fang, Zehua Ma, Weiming Zhang, Nenghai Yu:
DeAR: A Deep-learning-based Audio Re-recording Resilient Watermarking. CoRR abs/2212.02339 (2022) - [i43]Hanqing Zhao, Dianmo Sheng, Jianmin Bao, Dongdong Chen, Dong Chen, Fang Wen, Lu Yuan, Ce Liu, Wenbo Zhou, Qi Chu, Weiming Zhang, Nenghai Yu:
X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion. CoRR abs/2212.03863 (2022) - [i42]Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Shuyang Gu, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet. CoRR abs/2212.06138 (2022) - 2021
- [j98]Han Gao, Shaoyin Cheng, Weiming Zhang:
GDroid: Android malware detection and classification with graph convolutional network. Comput. Secur. 106: 102264 (2021) - [j97]Kunlin Liu, Ping Wang, Wenbo Zhou, Zhenyu Zhang, Yanhao Ge, Honggu Liu, Weiming Zhang, Nenghai Yu:
Face Swapping Consistency Transfer with Neural Identity Carrier. Future Internet 13(11): 298 (2021) - [j96]Yang Yang, Genyan Huang, Tianrui Zou, Weiming Zhang:
A novel reversible data hiding based on adaptive block-partition and payload-allocation method. IET Image Process. 15(2): 571-585 (2021) - [j95]Huanyu Bian, Dongdong Chen, Kui Zhang, Hang Zhou, Xiaoyi Dong, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Adversarial defense via self-orthogonal randomization super-network. Neurocomputing 452: 147-158 (2021) - [j94]Huanyu Bian, Hao Cui, Kunlin Liu, Hang Zhou, Dongdong Chen, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
CDAE: Color decomposition-based adversarial examples for screen devices. Inf. Sci. 569: 287-301 (2021) - [j93]Chuan Qin, Weiming Zhang, Xiaoyi Dong, Hongyue Zha, Nenghai Yu:
Adversarial steganography based on sparse cover enhancement. J. Vis. Commun. Image Represent. 80: 103325 (2021) - [j92]Qingxiao Guan, Hefeng Chen, Weiming Zhang, Nenghai Yu:
Improving UNIWARD distortion function via isotropic construction and hierarchical merging. J. Vis. Commun. Image Represent. 81: 103333 (2021) - [j91]Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181: 107920 (2021) - [j90]Han Fang, Dongdong Chen, Qidong Huang, Jie Zhang, Zehua Ma, Weiming Zhang, Nenghai Yu:
Deep Template-Based Watermarking. IEEE Trans. Circuits Syst. Video Technol. 31(4): 1436-1451 (2021) - [j89]Yaofei Wang, Weixiang Li, Weiming Zhang, Xinzhi Yu, Kunlin Liu, Nenghai Yu:
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 31(5): 2082-2088 (2021) - [j88]Wei Lu, Junhong Zhang, Xianfeng Zhao, Weiming Zhang, Jiwu Huang:
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2909-2922 (2021) - [j87]Kejiang Chen, Hang Zhou, Dongdong Hou, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric. IEEE Trans. Circuits Syst. Video Technol. 31(10): 3942-3953 (2021) - [j86]Zehua Ma, Weiming Zhang, Han Fang, Xiaoyi Dong, Linfeng Geng, Nenghai Yu:
Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry. IEEE Trans. Circuits Syst. Video Technol. 31(12): 4826-4839 (2021) - [j85]Yaofei Wang, Weiming Zhang, Weixiang Li, Nenghai Yu:
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance. IEEE Trans. Inf. Forensics Secur. 16: 1117-1130 (2021) - [j84]Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin, Nenghai Yu:
Feature-Preserving Tensor Voting Model for Mesh Steganalysis. IEEE Trans. Vis. Comput. Graph. 27(1): 57-67 (2021) - [c60]Qidong Huang, Jie Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Initiative Defense against Facial Manipulation. AAAI 2021: 1619-1627 - [c59]Honggu Liu, Xiaodan Li, Wenbo Zhou, Yuefeng Chen, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain. CVPR 2021: 772-781 - [c58]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, Nenghai Yu:
Multi-Attentional Deepfake Detection. CVPR 2021: 2185-2194 - [c57]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation. CVPR 2021: 15374-15383 - [c56]Ming Cheng, Yang Yang, Yingqiu Ding, Weiming Zhang:
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding. FCS 2021: 288-307 - [c55]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection Beyond Image Space. ICASSP 2021: 3850-3854 - [c54]Jiabin Zhang, Qi Chu, Weihai Li, Bin Liu, Weiming Zhang, Nenghai Yu:
Towards More Powerful Multi-column Convolutional Network for Crowd Counting. ICIG (1) 2021: 381-392 - [c53]Han Gao, Shaoyin Cheng, Yinxing Xue, Weiming Zhang:
A lightweight framework for function name reassignment based on large-scale stripped binaries. ISSTA 2021: 607-619 - [c52]Zhaoyang Jia, Han Fang, Weiming Zhang:
MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression. ACM Multimedia 2021: 41-49 - [c51]Yanmei Chen, Zehua Ma, Hang Zhou, Weiming Zhang:
3D Print-Scan Resilient Localized Mesh Watermarking. WIFS 2021: 1-6 - [i41]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection beyond Image Space. CoRR abs/2102.11586 (2021) - [i40]Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, In So Kweon:
A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs/2103.01607 (2021) - [i39]Honggu Liu, Xiaodan Li, Wenbo Zhou, Yuefeng Chen, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain. CoRR abs/2103.01856 (2021) - [i38]Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, Nenghai Yu:
Multi-attentional Deepfake Detection. CoRR abs/2103.02406 (2021) - [i37]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Deep Model Intellectual Property Protection via Deep Watermarking. CoRR abs/2103.04980 (2021) - [i36]Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu:
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. CoRR abs/2104.04268 (2021) - [i35]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Lu Yuan, Gang Hua, Nenghai Yu:
A Simple Baseline for StyleGAN Inversion. CoRR abs/2104.07661 (2021) - [i34]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. CoRR abs/2104.10203 (2021) - [i33]Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Weiming Zhang, Nenghai Yu, Lu Yuan, Dong Chen, Baining Guo:
CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows. CoRR abs/2107.00652 (2021) - [i32]Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Zehua Ma, Weiming Zhang, Gang Hua, Nenghai Yu:
Exploring Structure Consistency for Deep Model Watermarking. CoRR abs/2108.02360 (2021) - [i31]Jie Zhang, Dongdong Chen, Jing Liao, Qidong Huang, Gang Hua, Weiming Zhang, Nenghai Yu:
Poison Ink: Robust and Invisible Backdoor Attack. CoRR abs/2108.02488 (2021) - [i30]Zhaoyang Jia, Han Fang, Weiming Zhang:
MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression. CoRR abs/2108.08211 (2021) - [i29]Feng Wang, Hang Zhou, Han Fang, Xiaojuan Dong, Weiming Zhang, Xi Yang, Nenghai Yu:
Deep 3D Mesh Watermarking with Self-Adaptive Robustness. CoRR abs/2109.07202 (2021) - [i28]Kai Zeng, Kejiang Chen, Yaofei Wang, Weiming Zhang, Nenghai Yu:
Improving Dither Modulation based Robust Steganography by Overflow Suppression. CoRR abs/2110.08697 (2021) - [i27]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition. CoRR abs/2110.09814 (2021) - [i26]Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu:
PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers. CoRR abs/2111.12710 (2021) - [i25]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Zhentao Tan, Lu Yuan, Weiming Zhang, Nenghai Yu:
HairCLIP: Design Your Hair by Text and Reference Image. CoRR abs/2112.05142 (2021) - [i24]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. CoRR abs/2112.07873 (2021) - [i23]Qidong Huang, Jie Zhang, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Initiative Defense against Facial Manipulation. CoRR abs/2112.10098 (2021) - 2020
- [j83]Linfeng Geng, Weiming Zhang, Haozhe Chen, Han Fang, Nenghai Yu:
Real-time attacks on robust watermarking tools in the wild by CNN. J. Real Time Image Process. 17(3): 631-641 (2020) - [j82]Xinzhi Yu, Kejiang Chen, Yaofei Wang, Weixiang Li, Weiming Zhang, Nenghai Yu:
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process. 168 (2020) - [j81]Siyan Zhou, Weiming Zhang, Chaomin Shen:
Rate-distortion model for grayscale-invariance reversible data hiding. Signal Process. 172: 107562 (2020) - [j80]Yang Yang, Xingxing Xiao, Xue Cai, Weiming Zhang:
A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images. IEEE Signal Process. Lett. 27: 256-260 (2020) - [j79]Weixiang Li, Weiming Zhang, Li Li, Hang Zhou, Nenghai Yu:
Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes. IEEE Trans. Commun. 68(7): 3948-3962 (2020) - [j78]Weixiang Li, Wenbo Zhou, Weiming Zhang, Chuan Qin, Huanhuan Hu, Nenghai Yu:
Shortening the Cover for Fast JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(6): 1745-1757 (2020) - [j77]Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang, Nenghai Yu:
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2027-2032 (2020) - [j76]Weixiang Li, Kejiang Chen, Weiming Zhang, Hang Zhou, Yaofei Wang, Nenghai Yu:
JPEG Steganography With Estimated Side-Information. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2288-2294 (2020) - [j75]Han Fang, Weiming Zhang, Zehua Ma, Hang Zhou, Shan Sun, Hao Cui, Nenghai Yu:
A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4075-4089 (2020) - [j74]Yaofei Wang, Weiming Zhang, Weixiang Li, Xinzhi Yu, Nenghai Yu:
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences. IEEE Trans. Inf. Forensics Secur. 15: 2081-2095 (2020) - [j73]Li Li, Weiming Zhang, Kejiang Chen, Nenghai Yu:
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks. IEEE Trans. Multim. 22(10): 2526-2536 (2020) - [c50]Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, Nenghai Yu:
Model Watermarking for Image Processing Networks. AAAI 2020: 12805-12812 - [c49]Hang Zhou, Dongdong Chen, Jing Liao, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Weiming Zhang, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks. CVPR 2020: 10353-10362 - [c48]Xiaoyi Dong, Dongdong Chen, Hang Zhou, Gang Hua, Weiming Zhang, Nenghai Yu:
Self-Robust 3D Point Recognition via Gather-Vector Guidance. CVPR 2020: 11513-11521 - [c47]Xiaoyi Dong, Jiangfan Han, Dongdong Chen, Jiayang Liu, Huanyu Bian, Zehua Ma, Hongsheng Li, Xiaogang Wang, Weiming Zhang, Nenghai Yu:
Robust Superpixel-Guided Attentional Adversarial Attack. CVPR 2020: 12892-12901 - [c46]Kejiang Chen, Yuefeng Chen, Hang Zhou, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-Supervised Adversarial Training. ICASSP 2020: 2218-2222 - [c45]Shangyu Gu, Shaoyin Cheng, Weiming Zhang:
From Image to Code: Executable Adversarial Examples of Android Applications. ICCAI 2020: 261-268 - [c44]Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu:
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. ACM Multimedia 2020: 2273-2280 - [c43]Xiaoyi Dong, Dongdong Chen, Jianmin Bao, Chuan Qin, Lu Yuan, Weiming Zhang, Nenghai Yu, Dong Chen:
GreedyFool: Distortion-Aware Sparse Adversarial Attack. NeurIPS 2020 - [c42]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Gang Hua, Nenghai Yu:
Passport-aware Normalization for Deep Model Protection. NeurIPS 2020 - [i22]Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, Nenghai Yu:
Model Watermarking for Image Processing Networks. CoRR abs/2002.11088 (2020) - [i21]Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Kunlin Liu, Sugasa Marangonda, Chris Umé, Mr. Dpfks, Carl Shift Facenheim, Luis RP, Jian Jiang, Sheng Zhang, Pingyu Wu, Bo Zhou, Weiming Zhang:
DeepFaceLab: A simple, flexible and extensible face swapping framework. CoRR abs/2005.05535 (2020) - [i20]Zehua Ma, Weiming Zhang, Han Fang, Xiaoyi Dong, Linfeng Geng, Nenghai Yu:
Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry. CoRR abs/2007.10240 (2020) - [i19]Xiaoyi Dong, Dongdong Chen, Jianmin Bao, Chuan Qin, Lu Yuan, Weiming Zhang, Nenghai Yu, Dong Chen:
GreedyFool: Distortion-Aware Sparse Adversarial Attack. CoRR abs/2010.13773 (2020) - [i18]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Gang Hua, Nenghai Yu:
Passport-aware Normalization for Deep Model Protection. CoRR abs/2010.15824 (2020) - [i17]Hang Zhou, Dongdong Chen, Jing Liao, Weiming Zhang, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks. CoRR abs/2011.00566 (2020) - [i16]Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Weiming Zhang, Nenghai Yu, Dong Chen, Fang Wen, Baining Guo:
Identity-Driven DeepFake Detection. CoRR abs/2012.03930 (2020) - [i15]Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Improved Image Matting via Real-time User Clicks and Uncertainty Estimation. CoRR abs/2012.08323 (2020)
2010 – 2019
- 2019
- [j72]Hao Shen, Weiming Zhang, Han Fang, Zehua Ma, Nenghai Yu:
JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds. IEEE Access 7: 67483-67496 (2019) - [j71]Yang Yang, Xingxing Xiao, Xue Cai, Weiming Zhang:
A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption. IEEE Access 7: 96900-96911 (2019) - [j70]Zheng Zhou, Weiming Zhang, Shangbin Li, Nenghai Yu:
Potential risk of IoT device supporting IR remote control. Comput. Networks 148: 307-317 (2019) - [j69]Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Controversial 'pixel' prior rule for JPEG adaptive steganography. IET Image Process. 13(1): 24-33 (2019) - [j68]Mohsin Shah, Weiming Zhang, Honggang Hu, Xiaojuan Dong, Nenghai Yu:
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem. IET Image Process. 13(10): 1705-1713 (2019) - [j67]Zheng Zhou, Weiming Zhang, Zichong Yang, Nenghai Yu:
Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras. IEEE Internet Things J. 6(2): 1541-1550 (2019) - [j66]Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, Nenghai Yu:
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection. Multim. Tools Appl. 78(7): 8041-8055 (2019) - [j65]Han Fang, Hang Zhou, Zehua Ma, Weiming Zhang, Nenghai Yu:
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization. Multim. Tools Appl. 78(7): 8075-8089 (2019) - [j64]Yaojun Wu, Yonghe Zhu, Yang Yang, Weiming Zhang, Nenghai Yu:
A no-reference quality assessment for contrast-distorted image based on improved learning method. Multim. Tools Appl. 78(8): 10057-10076 (2019) - [j63]Jiaji Pan, Yi-Ning Liu, Weiming Zhang:
Detection of Dummy Trajectories Using Convolutional Neural Networks. Secur. Commun. Networks 2019: 8431074:1-8431074:12 (2019) - [j62]Yuanzhi Yao, Weiming Zhang, Hui Wang, Hang Zhou, Nenghai Yu:
Content-adaptive reversible visible watermarking in encrypted images. Signal Process. 164: 386-401 (2019) - [j61]Hongru Cao, Sian-Jheng Lin, Weiming Zhang, Yunghsiang S. Han:
On the Security of Secret Sharing Over a Ring and the Fast Implementation. IEEE Signal Process. Lett. 26(5): 705-709 (2019) - [j60]Dongdong Hou, Weiming Zhang, Kejiang Chen, Sian-Jheng Lin, Nenghai Yu:
Reversible Data Hiding in Color Image With Grayscale Invariance. IEEE Trans. Circuits Syst. Video Technol. 29(2): 363-374 (2019) - [j59]Bo Ou, Xiaolong Li, Weiming Zhang, Yao Zhao:
Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection. IEEE Trans. Circuits Syst. Video Technol. 29(7): 2176-2190 (2019) - [j58]Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. IEEE Trans. Inf. Forensics Secur. 14(4): 1052-1066 (2019) - [j57]Han Fang, Weiming Zhang, Hang Zhou, Hao Cui, Nenghai Yu:
Screen-Shooting Resilient Watermarking. IEEE Trans. Inf. Forensics Secur. 14(6): 1403-1418 (2019) - [j56]Hang Zhou, Kejiang Chen, Weiming Zhang, Yuanzhi Yao, Nenghai Yu:
Distortion Design for Secure Adaptive 3-D Mesh Steganography. IEEE Trans. Multim. 21(6): 1384-1398 (2019) - [j55]Mohsin Shah, Weiming Zhang, Honggang Hu, Nenghai Yu:
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations. ACM Trans. Multim. Comput. Commun. Appl. 15(3): 76:1-76:21 (2019) - [c41]Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu:
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View. CVPR 2019: 4825-4834 - [c40]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense. ICCV 2019: 1961-1970 - [c39]Jiangfan Han, Xiaoyi Dong, Ruimao Zhang, Dongdong Chen, Weiming Zhang, Nenghai Yu, Ping Luo, Xiaogang Wang:
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once. ICCV 2019: 5157-5166 - [c38]Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, Nenghai Yu:
Emerging applications of reversible data hiding. ICIGP 2019: 105-109 - [c37]Hongyue Zha, Weiming Zhang, Chuan Qin, Nenghai Yu:
Direct Adversarial Attack on Stego Sandwiched Between Black Boxes. ICIP 2019: 2284-2288 - [c36]Yujia Liu, Weiming Zhang, Nenghai Yu:
Query-Free Embedding Attack Against Deep Learning. ICME 2019: 380-386 - [c35]Hao Cui, Huanyu Bian, Weiming Zhang, Nenghai Yu:
Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo). INFOCOM Workshops 2019: 963-964 - [c34]Hao Cui, Huanyu Bian, Weiming Zhang, Nenghai Yu:
UnseenCode: Invisible On-screen Barcode with Image-based Extraction. INFOCOM 2019: 1315-1323 - [i14]Zheng Zhou, Weiming Zhang, Nenghai Yu:
Data Exfiltration via Multipurpose RFID Cards and Countermeasures. CoRR abs/1902.00676 (2019) - [i13]Jiangfan Han, Xiaoyi Dong, Ruimao Zhang, Dongdong Chen, Weiming Zhang, Nenghai Yu, Ping Luo, Xiaogang Wang:
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once. CoRR abs/1908.05185 (2019) - [i12]Kejiang Chen, Hang Zhou, Yuefeng Chen, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-supervised Adversarial Training. CoRR abs/1911.06470 (2019) - [i11]Xiaojuan Dong, Weiming Zhang, Mohsin Shah, Bei Wang, Nenghai Yu:
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret. CoRR abs/1912.09034 (2019) - 2018
- [j54]Dongdong Hou, Chuan Qin, Nenghai Yu, Weiming Zhang:
Reversible visual transformation via exploring the correlations within color images. J. Vis. Commun. Image Represent. 53: 134-145 (2018) - [j53]Hang Zhou, Kejiang Chen, Weiming Zhang, Zhenxing Qian, Nenghai Yu:
Targeted attack and security enhancement on texture synthesis based steganography. J. Vis. Commun. Image Represent. 54: 100-107 (2018) - [j52]Ruiqi Jiang, Weiming Zhang, Dongdong Hou, Hui Wang, Nenghai Yu:
Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification. Multim. Tools Appl. 77(5): 5263-5280 (2018) - [j51]Chuan Qin, Weiming Zhang, Xinpeng Zhang:
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing. Multim. Tools Appl. 77(14): 17853-17859 (2018) - [j50]Yao Wei, Weiming Zhang, Weihai Li, Nenghai Yu, Xi Sun:
Which gray level should be given the smallest cost for adaptive steganography? Multim. Tools Appl. 77(14): 17861-17874 (2018) - [j49]Yang Yang, Weiming Zhang, Dong Liang, Nenghai Yu:
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multim. Tools Appl. 77(14): 18043-18065 (2018) - [j48]Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, Xiangyang Luo:
On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146: 99-111 (2018) - [j47]Dongdong Hou, Haoqian Wang, Weiming Zhang, Nenghai Yu:
Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148: 41-47 (2018) - [j46]Zhenxing Qian, Hang Zhou, Xinpeng Zhang, Weiming Zhang:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Dependable Secur. Comput. 15(6): 1055-1067 (2018) - [j45]Dongdong Hou, Weiming Zhang, Yang Yang, Nenghai Yu:
Reversible Data Hiding Under Inconsistent Distortion Metrics. IEEE Trans. Image Process. 27(10): 5087-5099 (2018) - [j44]Ruiqi Jiang, Hang Zhou, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models. IEEE Trans. Multim. 20(1): 55-67 (2018) - [c33]Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu:
Robust Audio Watermarking Algorithm Based on Air Channel Characteristics. DSC 2018: 288-293 - [c32]Chuan Qin, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Ensemble Steganography. DSC 2018: 582-587 - [c31]Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:
Covert Communication by Exploring Statistical and Linguistical Distortion in Text. ICCCS (4) 2018: 288-301 - [c30]Xin Zuo, Huanhuan Hu, Weiming Zhang, Nenghai Yu:
Text Semantic Steganalysis Based on Word Embedding. ICCCS (4) 2018: 485-495 - [c29]Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. IH&MMSec 2018: 5-16 - [c28]Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu:
Adversarial Examples Against Deep Neural Network based Steganalysis. IH&MMSec 2018: 67-72 - [c27]Kuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. IWDW 2018: 55-68 - [c26]Xinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. IWDW 2018: 248-260 - [i10]Zheng Zhou, Weiming Zhang, Nenghai Yu:
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals. CoRR abs/1801.03218 (2018) - [i9]Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Nenghai Yu:
Detecting Adversarial Examples Based on Steganalysis. CoRR abs/1806.09186 (2018) - [i8]Jiayang Liu, Dongdong Hou, Weiming Zhang, Nenghai Yu:
Reversible Adversarial Examples. CoRR abs/1811.00189 (2018) - [i7]Xiaoyi Dong, Weiming Zhang, Nenghai Yu:
CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network. CoRR abs/1811.01225 (2018) - [i6]Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, Nenghai Yu:
Emerging Applications of Reversible Data Hiding. CoRR abs/1811.02928 (2018) - [i5]Jiayang Liu, Weiming Zhang, Nenghai Yu:
CAAD 2018: Iterative Ensemble Adversarial Attack. CoRR abs/1811.03456 (2018) - [i4]Kejiang Chen, Hang Zhou, Dongdong Hou, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Provably Secure Steganography on Generative Media. CoRR abs/1811.03732 (2018) - [i3]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. CoRR abs/1812.11017 (2018) - 2017
- [j43]Ce Yang, Weiming Zhang, Nenghai Yu:
Semi-order preserving encryption. Inf. Sci. 387: 266-279 (2017) - [j42]Jiajia Xu, Weiming Zhang, Ruiqi Jiang, Nenghai Yu:
Unified entropy-based sorting for reversible data hiding. Multim. Tools Appl. 76(3): 3829-3850 (2017) - [j41]Zhenkun Bao, Xiangyang Luo, Weiming Zhang, Chunfang Yang, Fenlin Liu:
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method. Multim. Tools Appl. 76(12): 14345-14374 (2017) - [j40]Jiajia Xu, Weiming Zhang, Ruiqi Jiang, Xiaocheng Hu, Nenghai Yu:
Optimal structural similarity constraint for reversible data hiding. Multim. Tools Appl. 76(14): 15491-15511 (2017) - [j39]Yujia Liu, Weiming Zhang, Nenghai Yu:
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. Secur. Commun. Networks 2017: 1897438:1-1897438:15 (2017) - [j38]Keyang Liu, Weiming Zhang, Xiaojuan Dong:
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. Secur. Commun. Networks 2017: 4376282:1-4376282:14 (2017) - [j37]Weiming Zhang, Zhuo Zhang, Lili Zhang, Hanyi Li, Nenghai Yu:
Decomposing Joint Distortion for Adaptive Steganography. IEEE Trans. Circuits Syst. Video Technol. 27(10): 2274-2280 (2017) - [j36]Wenbo Zhou, Weiming Zhang, Nenghai Yu:
A New Rule for Cost Reassignment in Adaptive Steganography. IEEE Trans. Inf. Forensics Secur. 12(11): 2654-2667 (2017) - [j35]Hang Zhou, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Comments on "Steganography Using Reversible Texture Synthesis". IEEE Trans. Image Process. 26(4): 1623-1625 (2017) - [c25]Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:
Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion. DSC 2017: 145-150 - [c24]Ce Yang, Weiming Zhang, Nenghai Yu:
Range Queries on Two Column Data. DSC 2017: 578-584 - [c23]Ce Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu:
Probability-p Order-Preserving Encryption. ICCCS (2) 2017: 16-28 - [c22]Xianjun Hu, Weiming Zhang, Honggang Hu, Nenghai Yu:
Secure Image Denoising over Two Clouds. ICIG (3) 2017: 471-482 - [i2]Zheng Zhou, Weiming Zhang, Zichong Yang, Nenghai Yu:
Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators. CoRR abs/1711.03235 (2017) - [i1]Yujia Liu, Weiming Zhang, Shaohua Li, Nenghai Yu:
Enhanced Attacks on Defensively Distilled Deep Neural Networks. CoRR abs/1711.05934 (2017) - 2016
- [j34]Yang Yang, Weiming Zhang, Dong Liang, Nenghai Yu:
Reversible data hiding in medical images with enhanced contrast in texture area. Digit. Signal Process. 52: 13-24 (2016) - [j33]Dongdong Hou, Weiming Zhang, Nenghai Yu:
Image camouflage by reversible image transformation. J. Vis. Commun. Image Represent. 40: 225-236 (2016) - [j32]Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu:
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multim. Tools Appl. 75(21): 13557-13583 (2016) - [j31]Yang Yang, Weiming Zhang, Xiaocheng Hu, Nenghai Yu:
Improving visual quality of reversible data hiding by twice sorting. Multim. Tools Appl. 75(21): 13663-13678 (2016) - [j30]Hui Wang, Weiming Zhang, Nenghai Yu:
Protecting patient confidential information based on ECG reversible data hiding. Multim. Tools Appl. 75(21): 13733-13747 (2016) - [j29]Yuanzhi Yao, Weiming Zhang, Nenghai Yu:
Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process. 128: 531-545 (2016) - [j28]Weiming Zhang, Hui Wang, Dongdong Hou, Nenghai Yu:
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation. IEEE Trans. Multim. 18(8): 1469-1479 (2016) - [j27]Xianjun Hu, Weiming Zhang, Ke Li, Honggang Hu, Nenghai Yu:
Secure Nonlocal Denoising in Outsourced Images. ACM Trans. Multim. Comput. Commun. Appl. 12(3): 40:1-40:23 (2016) - [c21]Zhenxing Qian, Xinpeng Zhang, Weiming Zhang, Yimin Wang:
Reversible Contrast Enhancement. ICCCS (1) 2016: 18-27 - [c20]Dongdong Hou, Weiming Zhang, Zihao Zhan, Ruiqi Jiang, Yang Yang, Nenghai Yu:
Reversible image processing via reversible data hiding. DSP 2016: 427-431 - [c19]Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Evolving distortion function by exploiting the differences among comparable adaptive steganography. ICNC-FSKD 2016: 2262-2271 - [c18]Jiajia Xu, Hang Zhou, Weiming Zhang, Ruiqi Jiang, Guoli Ma, Nenghai Yu:
Second Order Perdicting-Error Sorting for Reversible Data Hiding. IWDW 2016: 407-420 - [c17]Yuanzhi Yao, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability. IWDW 2016: 421-435 - [c16]Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. WIFS 2016: 1-6 - 2015
- [j26]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
A further study of large payloads matrix embedding. Inf. Sci. 324: 257-269 (2015) - [j25]Yuanzhi Yao, Weiming Zhang, Nenghai Yu, Xianfeng Zhao:
Defining embedding distortion for motion vector-based video steganography. Multim. Tools Appl. 74(24): 11163-11186 (2015) - [j24]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
Matrix embedding in finite abelian group. Signal Process. 113: 250-258 (2015) - [j23]Feng Zhu, Weiming Zhang, Nenghai Yu, Xianfeng Zhao:
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission. Telecommun. Syst. 59(3): 357-363 (2015) - [j22]Xiaocheng Hu, Weiming Zhang, Xiaolong Li, Nenghai Yu:
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 10(3): 653-664 (2015) - [j21]Ke Li, Weiming Zhang, Ce Yang, Nenghai Yu:
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1918-1926 (2015) - [j20]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans. Inf. Forensics Secur. 10(9): 2016-2027 (2015) - [j19]Weiming Zhang, Xiaocheng Hu, Xiaolong Li, Nenghai Yu:
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications. IEEE Trans. Image Process. 24(1): 294-304 (2015) - [c15]Bo Ou, Xiaolong Li, Weiming Zhang:
PVO-based reversible data hiding for encrypted images. ChinaSIP 2015: 831-835 - [c14]Yang Yang, Weiming Zhang, Nenghai Yu:
Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement. IIH-MSP 2015: 81-84 - 2014
- [j18]Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-Fei Zhu:
Adaptive ±1 Steganography in Extended Noisy Region. Comput. J. 57(4): 557-566 (2014) - [j17]Hao Zhang, Nenghai Yu, Yonggang Wen, Weiming Zhang:
Towards optimal noise distribution for privacy preserving in data aggregation. Comput. Secur. 45: 210-230 (2014) - [j16]Xiaocheng Hu, Weiming Zhang, Nenghai Yu:
Optimizing Non-Local Pixel Predictors for Reversible Data Hiding. Int. J. Digit. Crime Forensics 6(3): 1-15 (2014) - [j15]Qi Tang, Guoli Ma, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding for DNA Sequences and Its Applications. Int. J. Digit. Crime Forensics 6(4): 1-13 (2014) - [j14]Biao Chen, Weiming Zhang, Kede Ma, Nenghai Yu:
Recursive code construction for reversible data hiding in DCT domain. Multim. Tools Appl. 72(2): 1985-2009 (2014) - [j13]Weiming Zhang, Kede Ma, Nenghai Yu:
Reversibility improved data hiding in encrypted images. Signal Process. 94: 118-127 (2014) - [c13]Juntao Fu, Weiming Zhang, Nenghai Yu, Guoli Ma, Qi Tang:
Fast tamper location of batch DNA sequences based on reversible data hiding. BMEI 2014: 868-872 - [c12]Xiaolong Li, Weiming Zhang, Bo Ou, Bin Yang:
A brief review on reversible data hiding: Current techniques and future prospects. ChinaSIP 2014: 426-430 - [c11]Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu:
Video steganography with perturbed macroblock partition. IH&MMSec 2014: 115-122 - [c10]Xiaocheng Hu, Weiming Zhang, Nenghai Yu:
Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding. IIH-MSP 2014: 481-484 - [c9]Xianjun Hu, Weiming Zhang, Honggang Hu, Nenghai Yu:
Non-local Denoising in Encrypted Images. IOV 2014: 386-395 - 2013
- [j12]Jiayong Chen, Jiufen Liu, Weiming Zhang, Huisheng Liu, Xianfeng Zhao:
Cryptographic Secrecy Analysis of Matrix Embedding. Int. J. Comput. Intell. Syst. 6(4): 639-647 (2013) - [j11]Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li:
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Trans. Inf. Forensics Secur. 8(3): 553-562 (2013) - [j10]Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 8(5): 779-788 (2013) - [j9]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 8(7): 1091-1100 (2013) - [j8]Weiming Zhang, Xiaocheng Hu, Xiaolong Li, Nenghai Yu:
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression. IEEE Trans. Image Process. 22(7): 2775-2785 (2013) - [c8]Guoli Ma, Qi Tang, Weiming Zhang, Nenghai Yu:
Tamper restoration on DNA sequences based on reversible data hiding. BMEI 2013: 484-489 - 2012
- [j7]Chao Wang, Weiming Zhang, Jiufen Liu, Nenghai Yu:
Fast Matrix Embedding by Matrix Extending. IEEE Trans. Inf. Forensics Secur. 7(1): 346-350 (2012) - [j6]Weiming Zhang, Biao Chen, Nenghai Yu:
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers. IEEE Trans. Image Process. 21(6): 2991-3003 (2012) - [c7]Ce Yang, Weiming Zhang, Jun Xu, Jiajia Xu, Nenghai Yu:
A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data. CDC 2012: 104-110 - [c6]Jun Xu, Weiming Zhang, Ce Yang, Jiajia Xu, Nenghai Yu:
Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data. CDC 2012: 124-130 - 2011
- [c5]Jiajia Xu, Weiming Zhang, Nenghai Yu, Feng Zhu, Biao Chen:
Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice. ICIG 2011: 223-227 - [c4]Wei Zhou, Yu Liu, Weiming Zhang, Liansheng Zhuang, Nenghai Yu:
Dynamic Background Subtraction Using Spatial-Color Binary Patterns. ICIG 2011: 314-319 - [c3]Weiming Zhang, Biao Chen, Nenghai Yu:
Capacity-Approaching Codes for Reversible Data Hiding. Information Hiding 2011: 255-269 - 2010
- [j5]Weiming Zhang, Jiufen Liu, Xin Wang, Nenghai Yu:
Generalization and Analysis of the Paper Folding Method for Steganography. IEEE Trans. Inf. Forensics Secur. 5(4): 694-704 (2010) - [j4]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Near-optimal codes for information embedding in gray-scale signals. IEEE Trans. Inf. Theory 56(3): 1262-1270 (2010)
2000 – 2009
- 2009
- [j3]Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:
Steganography Combining Data Decomposition Mechanism and Stego-coding Method. Informatica (Slovenia) 33(1): 41-48 (2009) - 2008
- [c2]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. Information Hiding 2008: 60-71 - [c1]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. IIH-MSP 2008: 1301-1304 - 2007
- [j2]Weiming Zhang, Shuozhong Wang, Xinpeng Zhang:
Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE Commun. Lett. 11(8): 680-682 (2007) - [j1]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
A Double Layered "Plus-Minus One" Data Embedding Scheme. IEEE Signal Process. Lett. 14(11): 848-851 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint