Author of the publication

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI., , and . VTC Fall, IEEE, (2009)Medical JPEG image steganography based on preserving inter-block dependencies., , , , and . Comput. Electr. Eng., (2018)Scalable Computing Infrastructure for Online and Blended Learning Environments.. Scalable Comput. Pract. Exp., 24 (3): 597-607 (September 2023)Amount-Based Covert Communication Over Blockchain., , , , and . IEEE Trans. Netw. Serv. Manag., 21 (3): 3095-3111 (June 2024)Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images., and . ACM Multimedia, page 7373-7382. ACM, (2023)Generative Steganography via Live Comments on Streaming Video Frames., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (3): 4412-4425 (June 2024)An Adaptive Latent Factorization of Tensors Model for Embedding Dynamic Communication Network., , and . CoRR, (2024)Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images., , , and . ICME, page 1-6. IEEE, (2024)Research on collaborative design platform of Launch Vehicle based on desktop grid., , , , and . CSCWD, page 356-360. IEEE, (2010)GIFMarking: The robust watermarking for animated GIF based deep learning., , and . J. Vis. Commun. Image Represent., (2021)