Weiming Zhang
#161,312
Most Influential Person Now
Researcher
Weiming Zhang's AcademicInfluence.com Rankings
Weiming Zhangcomputer-science Degrees
Computer Science
#9299
World Rank
#9768
Historical Rank
Machine Learning
#4036
World Rank
#4085
Historical Rank
Artificial Intelligence
#4374
World Rank
#4435
Historical Rank
Database
#6272
World Rank
#6502
Historical Rank

Download Badge
Computer Science
Weiming Zhang's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Weiming Zhang Influential?
(Suggest an Edit or Addition)Weiming Zhang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption (2013) (686)
- Reversibility improved data hiding in encrypted images (2014) (361)
- CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows (2021) (305)
- A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification (2013) (300)
- Efficient Reversible Data Hiding Based on Multiple Histograms Modification (2015) (278)
- Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression (2013) (218)
- Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers (2012) (172)
- On the fault-tolerant performance for a class of robust image steganography (2018) (170)
- Multi-attentional Deepfake Detection (2021) (147)
- Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain (2021) (118)
- PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers (2021) (115)
- Reversible Data Hiding in Encrypted Images by Reversible Image Transformation (2016) (107)
- A Double Layered “Plus-Minus One” Data Embedding Scheme (2007) (107)
- Improving Embedding Efficiency of Covering Codes for Applications in Steganography (2007) (100)
- Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding (2015) (92)
- DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense (2018) (90)
- Capacity-Approaching Codes for Reversible Data Hiding (2011) (87)
- Separable Reversible Data Hiding in Encrypted JPEG Bitstreams (2018) (83)
- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes (2008) (77)
- Reversible data hiding in JPEG image based on DCT frequency and block selection (2018) (76)
- Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View (2018) (67)
- Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes (2016) (66)
- Adversarial Examples Against Deep Neural Network based Steganalysis (2018) (65)
- Decomposing Joint Distortion for Adaptive Steganography (2017) (65)
- Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search (2015) (64)
- Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications (2015) (64)
- Model Watermarking for Image Processing Networks (2020) (60)
- Efficient double-layered steganographic embedding (2007) (60)
- Screen-Shooting Resilient Watermarking (2019) (59)
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models (2018) (58)
- Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection (2019) (58)
- Defining embedding distortion for motion vector-based video steganography (2015) (57)
- LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks (2020) (56)
- Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams (2016) (55)
- A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data (2012) (53)
- Reversible Data Hiding in Color Image With Grayscale Invariance (2019) (46)
- A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images (2018) (44)
- A New Rule for Cost Reassignment in Adaptive Steganography (2017) (44)
- Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding (2013) (42)
- GDroid: Android malware detection and classification with graph convolutional network (2021) (42)
- Deep Model Intellectual Property Protection via Deep Watermarking (2021) (40)
- A coding problem in steganography (2008) (39)
- Self-Robust 3D Point Recognition via Gather-Vector Guidance (2020) (36)
- Robust Steganography Using Texture Synthesis (2017) (35)
- Defining Cost Functions for Adaptive JPEG Steganography at the Microscale (2019) (35)
- Reversible data hiding in medical images with enhanced contrast in texture area (2016) (34)
- Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth (2017) (34)
- Protecting patient confidential information based on ECG reversible data hiding (2016) (34)
- HairCLIP: Design Your Hair by Text and Reference Image (2021) (33)
- Robust Superpixel-Guided Attentional Adversarial Attack (2020) (33)
- Passport-aware Normalization for Deep Model Protection (2020) (32)
- Image camouflage by reversible image transformation (2016) (31)
- Fast Matrix Embedding by Matrix Extending (2012) (31)
- Robust adaptive steganography based on generalized dither modulation and expanded embedding domain (2020) (31)
- Generalization of the ZZW Embedding Construction for Steganography (2009) (30)
- Near-Optimal Codes for Information Embedding in Gray-Scale Signals (2010) (29)
- A Simple Baseline for StyleGAN Inversion (2021) (29)
- GreedyFool: Distortion-Aware Sparse Adversarial Attack (2020) (28)
- Defining Joint Distortion for JPEG Steganography (2018) (28)
- MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression (2021) (27)
- Video steganography with perturbed macroblock partition (2014) (26)
- Comments on “Steganography Using Reversible Texture Synthesis” (2017) (25)
- Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding (2021) (23)
- Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models (2018) (23)
- Distortion Design for Secure Adaptive 3-D Mesh Steganography (2019) (22)
- Bootstrapped Masked Autoencoders for Vision BERT Pretraining (2022) (22)
- Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes (2020) (22)
- MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining (2022) (21)
- Deep Template-Based Watermarking (2021) (21)
- Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding (2009) (21)
- Content-adaptive reversible visible watermarking in encrypted images (2019) (21)
- Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data (2012) (21)
- Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication (2020) (20)
- Reversible Data Hiding Under Inconsistent Distortion Metrics (2018) (20)
- Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion (2017) (19)
- Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences (2020) (19)
- A brief review on reversible data hiding: Current techniques and future prospects (2014) (19)
- A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking (2021) (18)
- Recent Advances in Image-Based Steganalysis Research: Recent Advances in Image-Based Steganalysis Research (2009) (18)
- Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once (2019) (17)
- A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images (2020) (17)
- Secure Nonlocal Denoising in Outsourced Images (2016) (17)
- Poison Ink: Robust and Invisible Backdoor Attack (2021) (16)
- Dynamic Background Subtraction Using Spatial-Color Binary Patterns (2011) (16)
- Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification (2018) (16)
- A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents (2020) (15)
- Semantic image compression based on data hiding (2015) (15)
- A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption (2019) (15)
- Potential risk of IoT device supporting IR remote control (2019) (15)
- Protecting Celebrities from DeepFake with Identity Consistency Transformer (2022) (14)
- A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization (2018) (14)
- E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion (2021) (14)
- Self-Supervised Adversarial Training (2019) (14)
- Initiative Defense against Facial Manipulation (2021) (13)
- Generalization and Analysis of the Paper Folding Method for Steganography (2010) (13)
- Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators (2017) (13)
- Reversible visual transformation via exploring the correlations within color images (2018) (13)
- Adversarial batch image steganography against CNN-based pooled steganalysis (2021) (12)
- Shape-invariant 3D Adversarial Point Clouds (2022) (12)
- Identity-Driven DeepFake Detection (2020) (11)
- Blind JPEG Steganalysis Based on Correlations of DCT Cofficients in Multi-directions and Calibrations (2009) (11)
- TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability (2021) (11)
- Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance (2021) (11)
- PVO-based reversible data hiding for encrypted images (2015) (11)
- Semi-order preserving encryption (2017) (11)
- Efficient Matrix Embedding Based on Random Linear Codes (2010) (11)
- Improved Image Matting via Real-time User Clicks and Uncertainty Estimation (2020) (11)
- Non-local Denoising in Encrypted Images (2014) (10)
- Real-time attacks on robust watermarking tools in the wild by CNN (2020) (10)
- Recursive code construction for reversible data hiding in DCT domain (2014) (10)
- Adaptive Video Error Concealment Using Reversible Data Hiding (2012) (10)
- Security Measurements of Steganographic Systems (2004) (10)
- Reliable JPEG steganalysis based on multi-directional correlations (2010) (10)
- Emerging applications of reversible data hiding (2018) (10)
- Defining cost functions for adaptive steganography at the microscale (2016) (9)
- Rate-distortion model for grayscale-invariance reversible data hiding (2020) (9)
- IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals (2018) (9)
- JPEG Steganography With Estimated Side-Information (2020) (9)
- Reversible Adversarial Examples (2018) (9)
- A High Visual Quality Color Image Reversible Data Hiding Scheme Based on B-R-G Embedding Principle and CIEDE2000 Assessment Metric (2022) (9)
- Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry (2020) (9)
- JPEG Robust Invertible Grayscale (2021) (9)
- Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio (2020) (9)
- Worst-Case-Aware Curriculum Learning for Zero and Few Shot Transfer (2020) (8)
- Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud (2022) (8)
- A Cloud-User Protocol Based on Ciphertext Watermarking Technology (2017) (8)
- Provably Secure Generative Steganography Based on Autoregressive Model (2018) (8)
- A further study of large payloads matrix embedding (2015) (8)
- UnseenCode: Invisible On-screen Barcode with Image-based Extraction (2019) (8)
- Reversible Data Hiding for DNA Sequences and Its Applications (2014) (8)
- Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks (2020) (8)
- BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography (2021) (8)
- Reversible image processing via reversible data hiding (2016) (7)
- A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images (2018) (7)
- Semiparametric variable selection for partially varying coefficient models with endogenous variables (2016) (7)
- Feature-Preserving Tensor Voting Model for Mesh Steganalysis (2021) (7)
- Improving visual quality of reversible data hiding by twice sorting (2016) (7)
- Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras (2019) (6)
- Detection of Dummy Trajectories Using Convolutional Neural Networks (2019) (6)
- Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection (2018) (6)
- Reversible watermarking in JPEG images based on modified RZL codes and histogram shift (2013) (6)
- Cryptographic Secrecy Analysis of Matrix Embedding (2010) (6)
- Integrated encoding with high efficiency for digital steganography (2007) (6)
- Controversial 'pixel' prior rule for JPEG adaptive steganography (2019) (6)
- Steganographic Codes -- a New Problem of Coding Theory (2005) (6)
- Adaptive ±1 Steganography in Extended Noisy Region (2014) (6)
- Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography (2020) (6)
- Shortening the Cover for Fast JPEG Steganography (2020) (6)
- From Image to Code: Executable Adversarial Examples of Android Applications (2020) (6)
- Reversible steganography: Data hiding for covert storage (2015) (6)
- Improving robust adaptive steganography via minimizing channel errors (2022) (5)
- Towards optimal noise distribution for privacy preserving in data aggregation (2014) (5)
- Enhanced Attacks on Defensively Distilled Deep Neural Networks (2017) (5)
- Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric (2020) (5)
- Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal (2018) (5)
- JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds (2019) (5)
- Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding (2014) (5)
- Text Semantic Steganalysis Based on Word Embedding (2018) (5)
- Tamper restoration on DNA sequences based on reversible data hiding (2013) (5)
- Three-Dimensional Mesh Steganography and Steganalysis: A Review (2021) (5)
- An Efficient Multi-keyword Ranked Retrieval Scheme with Johnson-Lindenstrauss Transform over Encrypted Cloud Data (2013) (4)
- Adversarial steganography based on sparse cover enhancement (2021) (4)
- Evolving distortion function by exploiting the differences among comparable adaptive steganography (2016) (4)
- Direct Adversarial Attack on Stego Sandwiched Between Black Boxes (2019) (4)
- Fast tamper location of batch DNA sequences based on reversible data hiding (2014) (4)
- Reversible Adversarial Attack based on Reversible Image Transformation (2019) (4)
- CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet (2022) (4)
- Adaptive Error Resilient Coding Based on FMO in Wireless Video Transmission (2011) (4)
- Distribution-Preserving Steganography Based on Text-to-Speech Generative Models (2022) (4)
- When Provably Secure Steganography Meets Generative Models (2018) (4)
- Detecting Adversarial Examples Based on Steganalysis (2018) (4)
- Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem (2019) (4)
- Targeted attack and security enhancement on texture synthesis based steganography (2018) (4)
- Adversarial Examples Detection Beyond Image Space (2021) (4)
- Deep Learning for Event-based Vision: A Comprehensive Survey and Benchmarks (2023) (3)
- Tracing Text Provenance via Context-Aware Lexical Substitution (2021) (3)
- Steganography Combining Data Decomposition Mechanism and Stego-coding Method (2009) (3)
- Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations (2019) (3)
- Exploring Structure Consistency for Deep Model Watermarking (2021) (3)
- Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement (2015) (3)
- Query-Free Embedding Attack Against Deep Learning (2019) (3)
- A no-reference quality assessment for contrast-distorted image based on improved learning method (2018) (3)
- Adversarial defense via self-orthogonal randomization super-network (2021) (3)
- Which gray level should be given the smallest cost for adaptive steganography? (2018) (3)
- A Steganographic Algorithm Based on Hamming Code and Wet Paper Code: A Steganographic Algorithm Based on Hamming Code and Wet Paper Code (2010) (3)
- Twice Gric Colorings in Steganography (2008) (3)
- A lightweight framework for function name reassignment based on large-scale stripped binaries (2021) (3)
- Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice (2011) (3)
- A High-Capacity Reversible Data Hiding Method in Encrypted Images Based on Block Shifting (2017) (3)
- CAAD 2018: Iterative Ensemble Adversarial Attack (2018) (3)
- Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis (2021) (2)
- Optimizing Non-Local Pixel Predictors for Reversible Data Hiding (2014) (2)
- Matrix embedding in finite abelian group (2015) (2)
- Second Order Perdicting-Error Sorting for Reversible Data Hiding (2016) (2)
- Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix (2022) (2)
- Optimal structural similarity constraint for reversible data hiding (2017) (2)
- A novel fuzzy keyword retrieval scheme over encrypted cloud data (2013) (2)
- Efficient steganography based on a data decomposition mechanism (2008) (2)
- Steganography with Histogram-Preserving and Distortion-Constraining Properties (2009) (2)
- ADT: Anti-Deepfake Transformer (2022) (2)
- Robust Audio Watermarking Algorithm Based on Air Channel Characteristics (2018) (2)
- A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret (2019) (2)
- Data Exfiltration via Multipurpose RFID Cards and Countermeasures (2019) (2)
- Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing (2018) (2)
- Minimum Structural Similarity Distortion for Reversible Data Hiding (2018) (2)
- Improving the Embedding Strategy for Batch Adaptive Steganography (2018) (2)
- PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network (2022) (2)
- Invertible Mask Network for Face Privacy-Preserving (2022) (1)
- Reversible Data Hiding in Encrypted 3 D Mesh Models (2017) (1)
- Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission (2015) (1)
- Ensemble Steganography (2018) (1)
- Face Swapping Consistency Transfer with Neural Identity Carrier (2021) (1)
- Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes (2022) (1)
- Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation (2019) (1)
- Unauthorized AI cannot recognize me: Reversible adversarial example (2018) (1)
- Covert Communication by Exploring Statistical and Linguistical Distortion in Text (2018) (1)
- A Secure Image Steganographic Method in Encrypted Domain: A Secure Image Steganographic Method in Encrypted Domain (2013) (1)
- Provably Secure Steganography on Generative Media (2018) (1)
- Unified entropy-based sorting for reversible data hiding (2017) (1)
- Reversible Image Data Hiding with Local Adaptive Contrast Enhancement (2016) (1)
- CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network (2018) (1)
- Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion (2020) (1)
- Protecting Celebrities with Identity Consistency Transformer (2022) (1)
- VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum (2023) (1)
- Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography (2023) (1)
- Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition (2021) (1)
- X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion (2022) (1)
- Lip Forgery Video Detection via Multi-phoneme Selection (2021) (1)
- On the Unicity Distance of Stego Key (2005) (1)
- Self-supervised Transformer for Deepfake Detection (2022) (1)
- Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features (2019) (1)
- Item Cold-Start Recommendation with Personalized Feature Selection (2020) (1)
- Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code (2022) (1)
- Range Queries on Two Column Data (2017) (0)
- Reversible Contrast Enhancement (2016) (0)
- CDAE: Color decomposition-based adversarial examples for screen devices (2021) (0)
- Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission (2015) (0)
- Noise Simulation-Based Deep Optical Watermarking (2022) (0)
- Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo) (2019) (0)
- 3D Print-Scan Resilient Localized Mesh Watermarking (2021) (0)
- GreedyFool: Distortion-Aware Sparse Adversarial Attack supplementary material (2020) (0)
- A no-reference quality assessment for contrast-distorted image based on improved learning method (2018) (0)
- PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition (2022) (0)
- Secure Image Denoising over Two Clouds (2017) (0)
- DeAR: A Deep-learning-based Audio Re-recording Resilient Watermarking (2022) (0)
- Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion (2022) (0)
- Unified entropy-based sorting for reversible data hiding (2016) (0)
- A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images (2017) (0)
- Improving side-informed JPEG steganography using two-dimensional decomposition embedding method (2017) (0)
- Diversity-Aware Meta Visual Prompting (2023) (0)
- Certified defense against patch attacks via mask-guided randomized smoothing (2022) (0)
- Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography (2022) (0)
- Cover Reproducible Steganography via Deep Generative Models (2022) (0)
- Improving visual quality of reversible data hiding by twice sorting (2015) (0)
- Item Cold-Start Recommendation with Personalized Feature Selection (2020) (0)
- Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information. (2022) (0)
- Triangle Mesh Watermarking and Steganography (2023) (0)
- Feature Fusion Based Adversarial Example Detection against Second-Round Adversarial Attacks (2022) (0)
- Defining embedding distortion for motion vector-based video steganography (2014) (0)
- Font Watermarking Network for Text Images (2022) (0)
- Steganalysis of neural networks based on parameter statistical bias (2022) (0)
- Which gray level should be given the smallest cost for adaptive steganography? (2017) (0)
- DP$^{2}$: Dataset Protection by Data Poisoning (2022) (0)
- No-reference quality assessment for contrast-distorted images based on gray and color-gray-difference space (2022) (0)
- An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression (2022) (0)
- A novel reversible data hiding based on adaptive block-partition and payload-allocation method (2020) (0)
- Coherent adversarial deepfake video generation (2022) (0)
- Towards More Powerful Multi-column Convolutional Network for Crowd Counting (2021) (0)
- A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization (2018) (0)
- Real-time attacks on robust watermarking tools in the wild by CNN (2020) (0)
- Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks (2023) (0)
- Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile (2022) (0)
- Optimal structural similarity constraint for reversible data hiding (2016) (0)
- Ts-Gad: Two Stage Graph Anomaly Detection Approach Based on Graph Auto-Encoder (2022) (0)
- Semantic Steganalysis Based on Word Embedding (2018) (0)
- Recursive code construction for reversible data hiding in DCT domain (2013) (0)
- Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection (2018) (0)
- AUDIO DATA HIDING BY CODEWORD SUBSTITUTION TECHNIQUE IN ENCRYPTED H . 264 / AVC VIDEO (2016) (0)
- On the Security of Secret Sharing Over a Ring and the Fast Implementation (2019) (0)
- Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes (2015) (0)
- Language universal font watermarking with multiple cross-media robustness (2022) (0)
- Probability-p Order-Preserving Encryption (2017) (0)
- A Histogram-preserving Steganography Based on Wet Paper Coding and Graphic Matching Theory: A Histogram-preserving Steganography Based on Wet Paper Coding and Graphic Matching Theory (2011) (0)
- An efficient adaptive image steganographic method for ±k embedding (2013) (0)
- Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images (2022) (0)
- Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing (2018) (0)
- De-END: Decoder-driven Watermarking Network (2022) (0)
- Robustness enhancement against adversarial steganography via steganalyzer outputs (2022) (0)
- Protecting patient confidential information based on ECG reversible data hiding (2015) (0)
- Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network (2023) (0)
- Certified defense against patch attacks via mask-guided randomized smoothing (2022) (0)
- Image camouflage by reversible image transformation q , qq (2016) (0)
- Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification (2017) (0)
- 云与用户之间交互式抗屏摄密文水印协议 (2021) (0)
- Semiparametric variable selection for partially varying coefficient models with endogenous variables (2015) (0)
- Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection (2022) (0)
- OAcode: Overall Aesthetic 2D Barcode on Screen (2023) (0)
- 2 Probability-p Order-Preserving Encryption (2018) (0)
- Improving side-informed JPEG steganography using two-dimensional decomposition embedding method (2016) (0)
- A. Details on Pretrained Tokenizers (2022) (0)
- ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography (2023) (0)
- Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data (2017) (0)
- Blind image steganalysis based on multi-directional correlation of DCT coefficient: Blind image steganalysis based on multi-directional correlation of DCT coefficient (2009) (0)
- Robust Steganography for High Quality Images (2023) (0)
- A fast coding method for distortion-free data hiding in high dynamic range image (2019) (0)
- Improving UNIWARD distortion function via isotropic construction and hierarchical merging (2021) (0)
- Shape-invariant 3D Adversarial Point Clouds Supplementary Materials (2022) (0)
- Deep 3D mesh watermarking with self-adaptive robustness (2021) (0)
- Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability (2016) (0)
- Comments and Corrections Comments on “ Steganography Using Reversible Texture Synthesis ” (2017) (0)
- Fast Matrix Embedding Based on Bit-control: Fast Matrix Embedding Based on Bit-control (2011) (0)
- A fast coding method for distortion-free data hiding in high dynamic range image (2019) (0)
- Improving Dither Modulation based Robust Steganography by Overflow Suppression (2021) (0)
- A New Coding Scheme for Matrix-Vector Multiplication via Universal Decodable Matrices (2022) (0)
- Improving the Perturbed Quantization steganography by Modified Matrix Encoding (2010) (0)
- Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models (2018) (0)
- Capturing the Lighting Inconsistency for Deepfake Detection (2022) (0)
- AnisoTag: 3D Printed Tag on 2D Surface via Reflection Anisotropy (2023) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Weiming Zhang?
Weiming Zhang is affiliated with the following schools: