Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network., , , and . IEEE Signal Process. Lett., 24 (10): 1547-1551 (2017)Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 261-274. Springer, (2018)CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography., , , , and . CoRR, (2018)Learning-based Point Cloud Registration: A Short Review and Evaluation., , and . AIEE, page 27-34. ACM, (2021)HVS Revisited: A Comprehensive Video Quality Assessment Framework., , , , and . CoRR, (2022)Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network., , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 759-771. Springer, (2021)CNN-Based Adversarial Embedding for Image Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 4081-4095 (2022)S-MFRL: Spiking Mean Field Reinforcement Learning for Dynamic Resource Allocation of D2D Networks., , and . IEEE Trans. Veh. Technol., 72 (1): 1032-1047 (2023)Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)