Author of the publication

Reversible adversarial steganography for security enhancement.

, , , , , and . J. Vis. Commun. Image Represent., (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identify influential nodes in social networks with graph multi-head attention regression model., , , , and . Neurocomputing, (April 2023)Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning., , , , , , , and . ICME, page 49-54. IEEE, (2023)A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense., , , , and . Inf. Sci., (2021)A novel feature integration and entity boundary detection for named entity recognition in cybersecurity., and . Knowl. Based Syst., (2023)DiffuCom: A novel diffusion model for comment generation., , , and . Knowl. Based Syst., (December 2023)SecACS: Enabling lightweight secure auditable cloud storage with data dynamics., and . J. Inf. Secur. Appl., (2020)Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach., , and . KSEM (4), volume 14120 of Lecture Notes in Computer Science, page 175-188. Springer, (2023)Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity., , and . Comput. Secur., (2024)SRFA-GRL: Predicting group influence in social networks with graph representation learning., , , , and . Inf. Sci., (August 2023)Fraud detection on multi-relation graphs via imbalanced and interactive learning., , , and . Inf. Sci., (2023)