Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple reconstruction compression framework based on PNG image., , and . CoRR, (2019)Universal adversarial perturbation for remote sensing images., , , and . MMSP, page 1-6. IEEE, (2022)Pixel Complexity Sorting Embedding for Reversible Data Hiding Based on Elastic net Predictor., , and . CPSS@AsiaCCS, page 36-42. ACM, (2024)Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB Prediction for Encrypted 3D Mesh Models., , , , and . PRCV (2), volume 13020 of Lecture Notes in Computer Science, page 336-348. Springer, (2021)Fragile Neural Network Watermarking with Trigger Image Set., , , , , and . KSEM, volume 12815 of Lecture Notes in Computer Science, page 280-293. Springer, (2021)Protecting Copyright of Medical Pre-trained Language Models: Training-Free Backdoor Watermarking., , , , and . CoRR, (2024)Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices., , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 84-93. (2016)War: Detecting adversarial examples by pre-processing input data., , and . CoRR, (2019)Neural Network Fragile watermarking With No Model Performance Degradation., , and . ICIP, page 3958-3962. IEEE, (2022)Local Texture Complexity Guided Adversarial Attack., , , and . ICIP, page 2065-2069. IEEE, (2023)