PUBLICATIONS

These documents are included only to ensure timely dissemination of the authors' research. All rights are retained by the author or other copyright holder, even though the works are offered for download here. By downloading one of these documents, you agree to adhere to the terms of the copyright holder, without whose explicit consent they may not be reposted.

2022

Index Information Link
1 Du, Zhenyu, et al. "A motional but temporally consistent physical video examples." Journal of Information Security and Applications 69 (2022): 103278. Abstract pdf
2 Dong, Xiaoyi, et al. "MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining." arXiv preprint arXiv:2208.12262 (2022). Abstract pdf
3 Wei, Tianyi, et al. "E2Style: Improve the efficiency and effectiveness of StyleGAN inversion." IEEE Transactions on Image Processing 31 (2022): 3267-3280. Abstract pdf
4 Qin, Chuan, et al. "Robustness enhancement against adversarial steganography via steganalyzer outputs." Journal of Information Security and Applications 68 (2022): 103252. Abstract pdf
5 Dong, Xiaoyi, et al. "Bootstrapped Masked Autoencoders for Vision BERT Pretraining." arXiv preprint arXiv:2207.07116 (2022). Abstract pdf
6 Qin, Chuan, et al. "Feature Fusion Based Adversarial Example Detection against Second-Round Adversarial Attacks." IEEE Transactions on Artificial Intelligence (2022). Abstract pdf
7 Zhang, Kui, et al. "Certified defense against patch attacks via mask-guided randomized smoothing." Science China Information Sciences 65.7 (2022): 1-12. Abstract pdf
8 Yang, Xi, et al. "Tracing Text Provenance via Context-Aware Lexical Substitution." Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 36. No. 10. 2022. Abstract pdf
9 Fang, Han, et al. "De-END: Decoder-driven Watermarking Network." arXiv preprint arXiv:2206.13032 (2022). Abstract pdf
10 张卫明, et al. "多媒体隐写研究进展." 中国图象图形学报 24.6 (2022): 1918-1943. Abstract pdf
11 Zeng, Kai, et al. "Improving robust adaptive steganography via minimizing channel errors." Signal Processing 195 (2022): 108498. Abstract pdf
12 Qin, Chuan, et al. "Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography." ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. Abstract pdf
13 Feng, Jinliu, et al. "An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression." ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. Abstract pdf
14 Wang, Ping, et al. "ADT: Anti-Deepfake Transformer." ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. Abstract pdf
15 Chen, Haozhe, et al. "Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition." ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022. Abstract pdf
16 Jia, Zhaoyang, et al. "Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images." arXiv preprint arXiv:2204.11513 (2022). Abstract pdf
17 Yang, Yang, et al. "Invertible Mask Network for Face Privacy-Preserving." arXiv preprint arXiv:2204.08895 (2022). Abstract pdf
18 Zhao, Hanqing, et al. "Self-supervised Transformer for Deepfake Detection." arXiv preprint arXiv:2203.01265 (2022). Abstract pdf
19 Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes Abstract pdf
20 Guan, Qingxiao, et al. "Detecting Steganography in JPEG Images Recompressed with The Same Quantization Matrix." IEEE Transactions on Circuits and Systems for Video Technology (2022). Abstract pdf
21 赖剑煌, et al. "数字图像/视频内容安全专刊简介." 中国图象图形学报 27.1 (2022): 1-2. Abstract pdf
22 孙杉, et al. "中文水印字库的自动生成方法." 中国图象图形学报 27.1 (2022): 262-276. Abstract pdf
23 赵鑫, et al. "引入超分辨率下采样误差的图像边信息估计隐写." 中国图象图形学报 27.1 (2022): 226-237. Abstract pdf
24 周航, et al. "3D 网格隐写与隐写分析回顾与展望." 中国图象图形学报 27.1 (2022): 150-162. Abstract pdf
25 Wang, Feng, et al. "Noise Simulation-Based Deep Optical Watermarking." International Conference on Artificial Intelligence and Security. Springer, Cham, 2022. Abstract pdf
26 Wu, Wenxuan, et al. "Capturing the Lighting Inconsistency for Deepfake Detection." International Conference on Artificial Intelligence and Security. Springer, Cham, 2022. Abstract pdf
27 Dong, Xiaoyi, et al. "Protecting Celebrities from DeepFake with Identity Consistency Transformer." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022. Abstract pdf
28 尹奕, et al. "基于参数特征偏移的神经网络隐写检测方法 (英文)." 中国科学技术大学学报 (2022). Abstract pdf
29 Huang, Qidong, et al. "Shape-invariant 3D Adversarial Point Clouds." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022. Abstract pdf
30 Wei, Tianyi, et al. "Hairclip: Design your hair by text and reference image." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022. Abstract pdf
31 Dong, Xiaoyi, et al. "Cswin transformer: A general vision transformer backbone with cross-shaped windows." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022. Abstract pdf
32 Zhang, Jie, et al. "Poison ink: Robust and invisible backdoor attack." IEEE Transactions on Image Processing 31 (2022): 5691-5705. Abstract pdf

2021

Index Information Link
1 Chen, Yanmei, et al. "3D Print-Scan resilient localized mesh watermarking." 2021 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2021. Abstract pdf
2 周文柏, et al. "人脸视频深度伪造与防御技术综述." Journal of Signal Processing 37.12 (2021). Abstract pdf
3 Dong, Xiaoyi, et al. "Peco: Perceptual codebook for bert pre-training of vision transformers." arXiv preprint arXiv:2111.12710 (2021). Abstract pdf
4 丁盈秋, et al. "基于彩色三要素的无参考对比度失真图像质量评价方法." 北京航空航天大学学报 48.8 (2021): 1418-1427. Abstract pdf
5 Liu, Kunlin, et al. "Face Swapping Consistency Transfer with Neural Identity Carrier." Future Internet 13.11 (2021): 298. Abstract pdf
6 Guan, Qingxiao, et al. "Improving UNIWARD distortion function via isotropic construction and hierarchical merging." Journal of Visual Communication and Image Representation 81 (2021): 103333. Abstract pdf
7 Zeng, Kai, et al. "Improving dither modulation based robust steganography by overflow suppression." arXiv preprint arXiv:2110.08697 (2021). Abstract pdf
8 Jia, Zhaoyang, Han Fang, and Weiming Zhang. "Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression." Proceedings of the 29th ACM International Conference on Multimedia. 2021. Abstract pdf
9 Zhang, Jiansong, et al. "Distribution-preserving-based automatic data augmentation for deep image steganalysis." IEEE Transactions on Multimedia (2021). Abstract pdf
10 Qin, Chuan, et al. "Adversarial steganography based on sparse cover enhancement." Journal of Visual Communication and Image Representation 80 (2021): 103325. Abstract pdf
11 Wang, Feng, et al. "Deep 3D Mesh Watermarking with Self-Adaptive Robustness." arXiv preprint arXiv:2109.07202 (2021). Abstract pdf
12 Bian, Huanyu, et al. "Adversarial defense via self-orthogonal randomization super-network." Neurocomputing 452 (2021): 147-158. Abstract pdf
13 Zhang, Jiabin, et al. "Towards More Powerful Multi-column Convolutional Network for Crowd Counting." International Conference on Image and Graphics. Springer, Cham, 2021. Abstract pdf
14 Zhang, Jie, et al. "Exploring Structure Consistency for Deep Model Watermarking." arXiv preprint arXiv:2108.02360 (2021). Abstract pdf
15 Zhang, Jie, et al. "Poison ink: Robust and invisible backdoor attack." arXiv preprint arXiv:2108.02488 (2021). Abstract pdf
16 Bian, Huanyu, et al. "CDAE: Color decomposition-based adversarial examples for screen devices." Information Sciences 569 (2021): 287-301. Abstract pdf
17 Gao, Han, et al. "A lightweight framework for function name reassignment based on large-scale stripped binaries." Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. 2021. Abstract pdf
18 Chen, Kejiang, et al. "Distribution-Preserving Steganography Based on Text-to-Speech Generative Models." IEEE Transactions on Dependable and Secure Computing (2021). Abstract pdf
19 Gao, Han, Shaoyin Cheng, and Weiming Zhang. "GDroid: Android malware detection and classification with graph convolutional network." Computers & Security 106 (2021): 102264. Abstract pdf
20 李晓龙, et al. "数字媒体取证技术综述." (2021). Abstract pdf
21 Liu, Kunlin, et al. "Jpeg robust invertible grayscale." IEEE Transactions on Visualization and Computer Graphics (2021). Abstract pdf
22 Chen, Kejiang, et al. "Adversarial examples detection beyond image space." ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2021. Abstract pdf
23 Yang, Yang, et al. "A high visual quality color image reversible data hiding scheme based on BRG embedding principle and CIEDE2000 assessment metric." IEEE Transactions on Circuits and Systems for Video Technology 32.4 (2021): 1860-1874. Abstract pdf
24 Huang, Qidong, et al. "Initiative Defense against Facial Manipulation." Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 35. No. 2. 2021. Abstract pdf
25 Zhou, Hang, et al. "Three-dimensional mesh steganography and steganalysis: A review." IEEE Transactions on Visualization and Computer Graphics (2021). Abstract pdf
26 Li, Li, et al. "Adversarial batch image steganography against CNN-based pooled steganalysis." Signal Processing 181 (2021): 107920. Abstract pdf
27 Zhang, Jie, et al. "Deep model intellectual property protection via deep watermarking." IEEE Transactions on Pattern Analysis and Machine Intelligence (2021). Abstract pdf
28 Zhao, Hanqing, et al. "Multi-attentional deepfake detection." Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2021. Abstract pdf
29 Liu, Honggu, et al. "Spatial-phase shallow learning: rethinking face forgery detection in frequency domain." Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2021. Abstract pdf
30 Zhang, Chaoning, et al. "A brief survey on deep learning based data hiding, steganography and watermarking." arXiv preprint arXiv:2103.01607 (2021). Abstract pdf
31 Wei, Tianyi, et al. "Improved image matting via real-time user clicks and uncertainty estimation." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2021. Abstract pdf
32 Fang, Han, et al. "TERA: Screen-to-Camera Image Code with Transparency, Efficiency, Robustness and Adaptability." IEEE Transactions on Multimedia 24 (2021): 955-967. Abstract pdf
33 陈君夫, et al. "基于深度学习的图像隐写分析综述." 软件学报 32.2 (2021): 551-578. Abstract pdf
34 Yang, Yang, et al. "A novel reversible data hiding based on adaptive block‐partition and payload‐allocation method." IET Image Processing 15.2 (2021): 571-585. Abstract pdf
35 Ma, Zehua, et al. "Local geometric distortions resilient watermarking scheme based on symmetry." IEEE Transactions on Circuits and Systems for Video Technology 31.12 (2021): 4826-4839. Abstract pdf
36 王垚飞, et al. "图像非加性隐写综述." 网络与信息安全学报 7.6 (2021): 1-10. Abstract pdf
37 程宇翔, et al. "基于分层嵌入的二值图像隐写方法." 网络与信息安全学报 7.5 (2021): 49-56. Abstract pdf
38 Lin, Jiaying, et al. "Lip Forgery Video Detection via Multi-phoneme Selection." (2021). Abstract pdf

2020

Index Information Link
1 Hang Zhou, Dongdong Chen, Jing Liao, Kejiang Chen, Xiaoyi Dong, Kunlin, Liu, Weiming Zhang and Nenghai Yu, "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020. Abstract pdf
2 Xiaoyi Dong, Dongdong Chen, Hang Zhou, Gang Hua, Weiming Zhang and Nenghai Yu, "Self-Robust 3D Point Recognition via Gather-Vector Guidance." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020. Abstract pdf
3 Xiaoyi Dong Jiangfan Han, Dongdong Chen, Jiayang Liu, Huanyu Bian, Zehua Ma, Hongsheng Li, Xiaogang Wang, Weiming Zhang and Nenghai Yu, "Robust Superpixel-Guided Attentional Adversarial Attack." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020. Abstract pdf
4 Yang Yang, Xingxing Xiao, Xue Cai and Weiming Zhang, "A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images," in IEEE Signal Processing Letters, vol. 27, pp. 256-260, 2020, doi: 10.1109/LSP.2020.2965826. Abstract pdf
5 Linfeng Geng, Weiming Zhang, Haozhe Chen, Han Fang and Nenghai Yu, "Real-time attacks on robust watermarking tools in the wild by CNN." J Real-Time Image Proc 17, 631–641 (2020). https://doi.org/10.1007/s11554-020-00941-8 Abstract
6 Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui and Nenghai Yu, "Model Watermarking for Image Processing Networks." AAAI. 2020. Abstract pdf
7 Xinzhi Yu, Kejiang Chen, Yaofei Wang, Weixiang Li, Weiming Zhang and Nenghai Yu, "Robust adaptive steganography based on generalized dither modulation and expanded embedding domain." Signal Processing 168 (2020): 107343. Abstract pdf
8 Siyan Zhou, Weiming Zhang and Chaomin Shen. "Rate-distortion model for grayscale-invariance reversible data hiding." Signal Processing (2020): 107562. Abstract pdf
9 Weixiang Li, Weiming Zhang, Li Li, Hang Zhou and Nenghai Yu, "Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes," in IEEE Transactions on Communications, vol. 68, no. 7, pp. 3948-3962, July 2020, doi: 10.1109/TCOMM.2020.2982624. Abstract pdf
10 Kejiang Chen, Yuefeng Chen, Hang Zhou, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang and Nenghai Yu, "Self-Supervised Adversarial Training," ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 2020, pp. 2218-2222, doi: 10.1109/ICASSP40776.2020.9054475. Abstract pdf
11 Xiaojuan Dong, Weiming Zhang, Mohsin Shah, Bei Wang and Nenghai Yu, "Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud," in IEEE Transactions on Services Computing, doi: 10.1109/TSC.2020.3008957. Abstract pdf

2019

Index Information Link
1 Yuanxin Wu, Wen Diao, Dongdong Hou and Weiming Zhang. "Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation". International Journal of Digital Crime and Forensics (IJDCF), 2019. Abstract pdf
2 Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming Zhang, and Nenghai Yu. "Defining Cost Functions for Adaptive JPEG Steganography at the Microscale". IEEE Transactions on Information Forensics and Security, 2019. Abstract pdf
3 Yue Guo, Weiming Zhang, Dongdong Hou, Yuanzhi Yao and Shuangkui Ge. "A fast coding method for distortion-free data hiding in high dynamic range image". Journal of Real-Time Image Processing, 2019. Abstract pdf
4 Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha and Nenghai Yu. "Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View". Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2019. Abstract pdf
5 Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, and Nenghai Yu. "Emerging Applications of Reversible Data Hiding". Proceedings of the 2nd International Conference on Image and Graphics Processing. ACM, 2019. Abstract pdf
6 Weixiang Li, Wenbo Zhou, Weiming Zhang, Chuan Qin, Huanhuan Hu, and Nenghai Yu. "Shortening the Cover for Fast JPEG Steganography". IEEE Transactions on Circuits and Systems for Video Technology, 2019. Abstract pdf
7 Hao Cui, Huanyu Bian, Weiming Zhang, and Nenghai Yu. "UnseenCode: Invisible On-screen Barcode with Image-based Extraction". IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019. Abstract pdf
8 Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang, and Nenghai Yu. "Derivative-based Steganographic Distortion and Its Non-additive Extensions for Audio". IEEE Transactions on Circuits and Systems for Video Technology, 2019. Abstract pdf
9 Yuanzhi Yao, Weiming Zhang, Hui Wang, Hang Zhou, and Nenghai Yu. "Content-adaptive reversible visible watermarking in encrypted images". Signal Processing, 2019. Abstract pdf
10 Weixiang Li, Kejiang Chen, Weiming Zhang, Hang Zhou, Yaofei Wang, and Nenghai Yu. "JPEG Steganography with Estimated Side-information". IEEE Transactions on Circuits and Systems for Video Technology, 2019. Abstract pdf
11 Jiaji Pan, Yining Liu, and Weiming Zhang. "Detection of dummy trajectories using convolutional neural networks." Security and Communication Networks 2019 (2019). Abstract pdf
12 Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, and Nenghai Yu. "DUP-Net: Denoiser and upsampler network for 3D adversarial point clouds defense." Proceedings of the IEEE International Conference on Computer Vision. 2019. Abstract pdf
13 Jiangfan Han, Xiaoyi Dong, Ruimao Zhang, Dongdong Chen, Weiming Zhang, Nenghai Yu, Ping Luo, and Xiaogang Wang. "Once a man: Towards multi-target attack via learning multi-target adversarial network once." Proceedings of the IEEE International Conference on Computer Vision. 2019. Abstract pdf
14 Pei Zhang, Weiming Zhang and Nenghai Yu, "Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features," 2019 7th International Conference on Information, Communication and Networks (ICICN), Macao, Macao, 2019, pp. 150-157, doi: 10.1109/ICICN.2019.8834939. Abstract pdf
15 吴曦, 俞能海, and 张卫明. "一种基于 BloomFilter 的改进型加密文本模糊搜索机制研究." 控制与决策 34.1 (2019): 97-104. Abstract pdf
16 Hongru Cao, Sian-Jheng Lin, Weiming Zhang and Yunghsiang S. Han, "On the Security of Secret Sharing Over a Ring and the Fast Implementation," in IEEE Signal Processing Letters, vol. 26, no. 5, pp. 705-709, May 2019, doi: 10.1109/LSP.2019.2907010. Abstract pdf
17 Hao Cui, Huanyu Bian, Weiming Zhang and Nenghai Yu, "Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo)," IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 2019, pp. 963-964, doi: 10.1109/INFCOMW.2019.8845179. Abstract pdf
18 Hao Shen, Weiming Zhang, Han Fang, Zehua Ma and Nenghai Yu, "JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds," in IEEE Access, vol. 7, pp. 67483-67496, 2019, doi: 10.1109/ACCESS.2019.2918261. Abstract pdf
19 Mohsin Shah, Weiming Zhang, Honggang Hu Xiaojuan Dong and Nenghai Yu, "Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem." IET Image Processing 13.10 (2019): 1705-1713. Abstract
20 Yujia Liu, Weiming Zhang and Nenghai Yu, "Query-Free Embedding Attack Against Deep Learning," 2019 IEEE International Conference on Multimedia and Expo (ICME), Shanghai, China, 2019, pp. 380-386, doi: 10.1109/ICME.2019.00073. Abstract pdf
21 Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin and Nenghai Yu, "Feature-Preserving Tensor Voting Model for Mesh Steganalysis," in IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2019.2929041. Abstract pdf
22 Yang Yang, Xingxing Xiao, Xue Cai and Weiming Zhang, "A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption," in IEEE Access, vol. 7, pp. 96900-96911, 2019, doi: 10.1109/ACCESS.2019.2929298. Abstract pdf
23 Mohsin Shah, Weiming Zhang, Honggang Hu, and Nenghai Yu. 2019. Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations. ACM Trans. Multimedia Comput. Commun. Appl. 15, 3, Article 76 (September 2019), 21 pages. DOI:https://doi.org/10.1145/3325194. Abstract pdf
24 Hongyue Zha, Weiming Zhang, Chuan Qin and Nenghai Yu, "Direct Adversarial Attack on Stego Sandwiched Between Black Boxes," 2019 IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 2019, pp. 2284-2288, doi: 10.1109/ICIP.2019.8804415. Abstract pdf
25 Han Fang, Weiming Zhang, Zehua Ma, Hang Zhou, Shan Sun, Hao Cui and Nenghai Yu, "A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents," in IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2019.2953720. Abstract pdf
26 Yaofei Wang, Weiming Zhang, Weixiang Li, Xinzhi Yu and Nenghai Yu, "Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2081-2095, 2020, doi: 10.1109/TIFS.2019.2956590. Abstract pdf
27 丁佳晨, 俞能海, 林宪正 张卫明. "基于比特币的私有信息检索支付协议." (2019): 1-9. Abstract pdf

2018

Index Information Link
1 Dongdong Hou, Weiming Zhang, Kejiang Chen, Sian-Jheng Lin, Nenghai Yu. “Reversible Data Hiding in Color Image with Grayscale Invariance”. IEEE Transactions on Circuits and Systems for Video Technology, 2018. Abstract pdf
2 Dongdong Hou, Haoqian Wang, Weiming Zhang, Nenghai Yu. “Reversible data hiding in JPEG image based on DCT frequency and block selection”. Signal Processing, 148: 41-47, 2018. Abstract pdf
3 Ruiqi Jiang, Weiming Zhang, Dongdong Hou, Hui Wang, Nenghai Yu. “Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification”. Multimedia Tools and Applications, 2018, 77(5): 5263-5280. Abstract pdf
4 Zheng Zhou, Weiming Zhang, Nenghai Yu. “IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals”. arXiv preprint arXiv:1801.03218, 2018. Abstract pdf
5 Dongdong Hou, Chuan Qin, Nenghai Yu, Weiming Zhang. “Reversible Visual Transformation via Exploring the Correlations within Color Images”. Journal of Visual Communication & Image Representation, 2018. Abstract pdf
6 Ruiqi Jiang, Hang Zhou, Weiming Zhang, Nenghai Yu. “Reversible Data Hiding in Encrypted 3D Mesh Models,” IEEE Transactions on Multimedia, 20(1): 55-67, 2018. Abstract pdf
7 Hang Zhou, Kejiang Chen, Weiming Zhang, Zhenxing Qian, Nenghai Yu. Targeted Attack and Security Enhancement on Texture Synthesis Based Steganography[J]. Journal of Visual Communication and Image Representation, 2018. Abstract pdf
8  Dongdong Hou, Weiming Zhang, Yang Yang and Nenghai Yu. "Reversible Data Hiding under Inconsistent Distortion Metrics". IEEE Transactions on Image Processing, 2018 Abstract pdf
9 张逸为, 张卫明, 俞能海. "针对特定测试样本的隐写分析方法". 软件学报, 29(4), 2018. Abstract pdf
10 Zheng Zhou, Weiming Zhang, Zichong Yang and Nenghai Yu. "Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras". IEEE Internet of Things Journal, PP(99):1-1, 2018. Abstract pdf
11 Bo Ou, Xiaolong Li, Weiming Zhang and Yao Zhao. "Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection". IEEE Transactions on Circuits and Systems for Video Technology, 2018. Abstract pdf
12 Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou and Nenghai Yu. "Defining Joint Distortion for JPEG Steganography". Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, ACM, 2018. Abstract pdf
13 Mohsin Shah, Weiming Zhang, Honggang Hu, Hang Zhou and Toqeer Mahmood. "Homomorphic Encryption-Based Reversible Data Hiding for 3D Mesh Models". Arabian Journal for Science and Engineering, 2018. Abstract pdf
14 Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu and Nenghai Yu. "Adversarial Examples Against Deep Neural Network based Steganalysis". ACM Workshop on Information Hiding and Multimedia Security. ACM, 2018. Abstract pdf
15 Chuan Qin, Wenbo Zhou, Weiming Zhang and Nenghai Yu. "Ensemble Steganography". 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. Abstract pdf
16 Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu and Nenghai Yu. "Robust Audio Watermarking Algorithm Based on Air Channel Characteristics". 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. Abstract pdf
17 Xiaojuan Dong, Weiming Zhang, Xianjun Hu and Keyang Liu. "A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images". International Journal of Digital Crime and Forensics (IJDCF), 2018. Abstract pdf
18 Hang Zhou, Kejiang Chen, Weiming Zhang, Yuanzhi Yao and Nenghai Yu. "Distortion Design for Secure Adaptive 3D Mesh Steganograph". IEEE Transactions on Multimedia., 2018. Abstract pdf
19 Han Fang, Weiming Zhang, Hang Zhou, Hao Cui and Nenghai Yu. "Screen-Shooting Resilient Watermarking". IEEE Transactions on Information Forensics and Security., 2018. Abstract pdf
20 Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu. "Controversial ‘pixel’ prior rule for JPEG adaptive steganograph". IET Image Processing, 2018. Abstract pdf
21 Xin Zuo, Huanhuan Hu, Weiming Zhang, and Nenghai Yu. "Text Semantic Steganalysis Based on Word Embedding". International Conference on Cloud Computing and Security, 2018. Abstract pdf
22 Huanhuan Hu, Xin Zuo, Weiming Zhang, and Nenghai Yu. "Covert Communication by Exploring Statistical and Linguistical Distortion in Text". International Conference on Cloud Computing and Security, 2018. Abstract pdf
23 XU Jiajia, ZHANG Weiming, JIANG Ruiqi, YU Nenghai and HU Xiaocheng. "Minimum Structural Similarity Distortion for Reversible Data Hiding". Chinese Journal of Electronics, 2018. Abstract pdf
24 Yaojun Wu, Yonghe Zhu, Yang Yang, Weiming Zhang, Nenghai Yu. "A no-reference quality assessment for contrast-distorted image based on improved learning method". Multimedia Tools and Applications, 2018. Abstract pdf
25 Han Fang, Hang Zhou, Zehua Ma, Weiming Zhang, Nenghai Yu. "A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization". Multimedia Tools and Applications, 2018. Abstract pdf
26 Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, Nenghai Yu. "Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection". Multimedia Tools and Applications, 2018. Abstract pdf
27 Zheng Zhou, Weiming Zhang, Shangbin Li and Nenghai Yu. "Potential risk of IoT device supporting IR remote control". Computer Networks, 2018. Abstract pdf
28 Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, Xiangyang Luo. "On the fault-tolerant performance for a class of robust image steganography". Signal Processing, 2018. Abstract pdf

2017

Index Information Link
1 Hang Zhou, Kejiang Chen, Weiming Zhang, Nenghai Yu, “ Comments on `Steganography Using Reversible Texture Synthesis',” IEEE Transactions on Image Processing, DOI: 10.1109/TIP.2017.2657886, 2017. Abstract pdf
2 Zhenxing Qian, Hang Zhou, Weiming Zhang, Xinpeng Zhang, “ Robust Steganography Using Texture Synthesis,” Advances in Intelligent Information Hiding and Multimedia Signal Processing, 25-33, 2017. Abstract pdf
3 Ce Yang, Weiming Zhang, Nenghai Yu, “Semi-Order Preserving Encryption,” Information Sciences, Vol.387, May 2017, Pages 266–279. Abstract pdf
4 Yao Wei, Weiming Zhang, Weihai Li1, Nenghai Yu, Xi Sun, “Which gray level should be given the smallest cost for adaptive steganography?” Multimedia Tools and Applications, 1-14. Abstract pdf
5 Ruiqi Jiang, Weiming Zhang, Dongdong Hou, Hui Wang, Nenghai Yu. Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification[J]. Multimedia Tools and Applications, 2017: 1-18. Abstract pdf
6 Yang Yang, Weiming Zhang, Dong Liang, Nenghai Yu. A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images[J]. Multimedia Tools and Applications, 2017: 1-23. Abstract pdf
7 Wenbo Zhou, Weiming Zhang, and Nenghai Yu. A New Rule for Cost Reassignment in Adaptive Steganography. IEEE Transactions on Information Forensics and Security, DOI:10.1109/TIFS.2017.2718480, 2017. Abstract pdf
8 Ruiqi Jiang, Weiming Zhang, Hui Wang, Nenghai Yu. A High-Capacity Reversible Data Hiding Method in Encrypted Images Based on Block Shifting[C]//Multimedia and Image Processing (ICMIP), 2017 2nd International Conference on. IEEE, 2017: 181-186. Abstract pdf
9 Yujia Liu, Weiming Zhang and Nenghai Yu,“Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth”, Security and Communication Networks,Volume 2017, Article ID 1897438, 15 pages. Abstract pdf
10 严文博,姚远志,张卫明,俞能海. "基于二维码和信息隐藏的物流系统隐私保护方案",网络与信息安全学报 10.11959/j.issn.2096-109x.2017.00210. Abstract pdf
11 孙曦,张卫明,俞能海,魏尧. "基于空域图像变换参数扰动的隐写术",通信学报 10.11959/j.issn.1000-436x.2017155. Abstract pdf
12 Ce Yang, Weiming Zhang and Nenghai Yu, Range Queries on Two Column Data[C]// IEEE Second International Conference on Data Science in Cyberspace. IEEE, 2017:578-584. Abstract pdf
13 Keyang Liu, Weiming Zhang, Xiaojuan Dong. A Cloud-User Protocol Based on Ciphertext Watermarking Technology[J]. Security and Communication Networks, 2017. Abstract pdf
14 Xianjun Hu, Weiming Zhang, Honggang Hu, and Nenghai Yu. Secure Image Denoising over Two Clouds”//International Conference on Image and Graphics. Springer, Cham, 2017: 471-482. Abstract pdf
15 Ce Yang, Weiming Zhang, Jiachen Ding and Nenghai Yu. Probability-p Order-Preserving Encryption[C]//International Conference on Cloud Computing and Security. Springer, Cham, 2017: 16-28. Abstract pdf

2016

Index Information Link
1 Jiajia Xu, Hang Zhou, Weiming Zhang, Ruiqi Jiang, Guoli Ma, Nenghai Yu, “Second Order Predicting-Error Sorting for Reversible Data Hiding,” International Workshop on Digital Watermarking, 407-420, 2016. Abstract pdf
2 Dongdong Hou, Weiming Zhang, Zihao Zhan, Ruiqi Jiang, Yang Yang, Nenghai Yu, “Reversible image processing via reversible data hiding,” Digital Signal Processing, 16-18, 2016. Abstract pdf
3 Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng, “Defining cost functions for adaptive steganography at the microscale,” IEEE International Workshop on Information Forensics and Security, DOI:10.1109/WIFS.2016.7823900. Abstract pdf
4 Jiajia Xu, Weiming Zhang, Ruiqi Jiang, Xiaocheng Hu, Nenghai Yu, “Optimal structural similarity constraint for reversible data hiding,” Multimedia Tools and Applications, 1-21, 2016. Abstract pdf
5 Jiajia Xu, Weiming Zhang, Ruiqi Jiang, Nenghai Yu, “Unified entropy-based sorting for reversible data hiding,” Multimedia Tools and Applications, 1-22, 2016. Abstract pdf
6 Zhenkun Bao, Xiangyang Luo, Weiming Zhang, Chunfang Yang, Fenlin Liu, “Improving side-informed JPEG steganography using two-dimensional decomposition embedding method,” Multimedia Tools and Applications, 1-30, 2016. Abstract pdf
7 Wenbo Zhou, Weiming Zhang, Nenghai Yu, “Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography,” IEEE International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, 2262-2271, 2016. Abstract pdf
8 Zhenxing Qian, Hang Zhou, Xinpeng Zhang, Weiming Zhang, “Separable Reversible Data Hiding in Encrypted JPEG Bitstreams,” IEEE Transactions on Dependable and Secure Computing, 2016, DOI: 10.1109/TDSC.2016.2634161 Abstract pdf
9 Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu, Xiaocheng Hu, “Reversible Image Data Hiding with Local Adaptive Contrast Enhancement,” Advanced Multimedia and Ubiquitous Engineering, 445-452, 2016. Abstract pdf
10 Hui Wang, Weiming Zhang, and Nenghai Yu, “Protecting Patient Confidential Information based on ECG Reversible data hiding,” Multimedia Tools and Applications,75(21):13733-13747, 2016. Abstract pdf
11 Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu, “Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes,” Multimedia Tools and Applications,75(21):13557-13583, 2016.Abstract pdf
12 Xianjun Hu, Weiming Zhang, Ke Li, Honggang Hu, Nenghai Yu, “Secure Nonlocal Denoising in Outsourced Images,” ACM Transactions on Multimedia Computing, Communications, and Applications(TOMM),12(3):40, 2016. Abstract pdf
13 Weiming Zhang, Zhuo Zhang, Lili Zhang, Hanyi Li, Nenghai Yu, "Decomposing Joint Distortion for Adaptive Steganography," IEEE Transactions on Circuits and Systems for Video Technology(TCSVT), 2016, DOI: 10.1109/TCSVT.2016.2587388. Abstract pdf
14 Dongdong Hou, Weiming Zhang, Nenghai Yu, “Image camouflage by reversible image transformation,” Journal of Visual Communication and Image Representation, 40:225-236, 2016. Abstract pdf
15 Weiming Zhang, Hui Wang, Dongdong Hou, Nenghai Yu, “Reversible Data Hiding in Encrypted Images by Reversible Image Transformation,” IEEE Transactions on Multimedia, 18(8):1469-1479, 2016. Abstract pdf
16 Yang Yang, Weiming Zhang, Dong Liang, Nenghai Yu, “Reversible data hiding in medical images with enhanced contrast in texture area,” Digital Signal Processing, 52:13-24, 2016. Abstract pdf
17 Yuanzhi Yao, Weiming Zhang, Nenghai Yu, “Inter-frame distortion drift analysis for reversible data hiding in encrypted H. 264/AVC video bitstreams,” Signal Processing, 128:531-545, 2016. Abstract pdf
18 Yang Yang, Weiming Zhang, Xiaocheng Hu, Nenghai Yu, “Improving visual quality of reversible data hiding by twice sorting,” Multimedia Tools and Applications,75(21):13663-13678, 2016. Abstract pdf
19 Zhenxing Qian, Xinpeng Zhang, Weiming Zhang, Yimin Wang, “Reversible Contrast Enhancement,” International Conference on Cloud Computing and Security, 18-27, 2016. Abstract pdf
20 杨杨, 张卫明, 侯冬冬, 王辉, 俞能海, “具有对比度增强效果的可逆信息隐藏研究进展与展望,” 网络与信息安全学报, 2(4):12-20, 2016. Abstract pdf
21 徐甲甲, 张卫明, 蒋瑞祺, 俞能海, 胡校成, “最优结构相似约束下的可逆信息隐藏算法研究,” 网络与信息安全学报, 2(2):55-61, 2016. Abstract pdf
22 许涛, 武传坤, 张卫明, “基于白盒密码的 DCAS 终端安全芯片方案,” 计算机研究与发展, 53(11):2465-2474, 2016. Abstract pdf
23 Yuanzhi Yao, Weiming Zhang, and Nenghai Yu. Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability[C]//International Workshop on Digital Watermarking. Springer, Cham, 2016: 421-435. Abstract pdf
24 杨培韬, 张卫明, 俞能海. 基于图像来源分类的最小化虚警隐写分析模型[J]. 通信学报, 2016, 37(12): 165-170. Abstract pdf

2015

Index Information Link
1 Ke Li, Weiming Zhang, Ce Yang, Nenghai Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” IEEE Trans. on Information Forensics and Security, 10(9):1918-1926, 2015. Abstract pdf
2 Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang, “A further study of large payloads matrix embedding,” Information Sciences, 324: 257-269, 2015. Abstract pdf
3 Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang, “Efficient Reversible Data Hiding Based on Multiple Histogram Modification,” IEEE Trans. on Information Forensics and Security, 10(9):2016-2027, 2015. Abstract pdf
4 Xinpeng Zhang, Weiming Zhang: Semantic image compression based on data hiding. IET Image Processing 9(1): 54-61, 2015. Abstract pdf
5 Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang,"Matrix embedding in finite abelian group," Signal Processing 113: 250-258, 2015. Abstract pdf
6 Feng Zhu, Weiming Zhang, Nenghai Yu, Xianfeng Zhao: Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.Telecommunication Systems 59(3): 357-363, 2015. Abstract pdf
7 Xiaocheng Hu, Weiming Zhang, Xiaolong Li, Nenghai Yu," Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding,"IEEE Transactions on Information Forensics and Security 10(3): 653-664, 2015. Abstract pdf
8 Weiming Zhang, Xiaocheng Hu, Xiaolong Li, Nenghai Yu, " Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications,"IEEE Transactions on Image Processing 24(1): 294-304, 2015 Abstract pdf
code
9 Zhuo Zhang, Weiming Zhang, "Reversible Steganography: Data Hiding for Covert Storage",Asia-Pacific Signal and Information Processing Association Annual Summit and Conference,Hong Kong, December 16-19,2015. Abstract pdf
10 Yang Yang, Weiming Zhang, Nenghai Yu . Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement//Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2015 International Conference on. IEEE, 2015: 81-84. Abstract pdf
11 Wenchao Wu, Bin Liu, Weiming Zhang, Changwen Chen. Reversible data hiding in ECG signals based on histogram shifting and thresholding[C]//Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium on. IEEE, 2015: 1-5. Abstract pdf

2014

Index Information Link
1 Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-Fei Zhu: Adaptive ±1 Steganography in Extended Noisy Region. Comput. J. 57(4): 557-566 (2014). Abstract pdf
2 Hao Zhang, Nenghai Yu, Yonggang Wen, Weiming Zhang: Towards optimal noise distribution for privacy preserving in data aggregation.Computers & Security 45: 210-230 (2014) Abstract pdf
3 Xiaocheng Hu, Weiming Zhang, Nenghai Yu: Optimizing Non-Local Pixel Predictors for Reversible Data Hiding. IJDCF 6(3): 1-15 (2014). Abstract pdf
4 Qi Tang, Guoli Ma, Weiming Zhang, Nenghai Yu: Reversible Data Hiding for DNA Sequences and Its Applications. IJDCF 6(4): 1-13 (2014). Abstract pdf
5 Biao Chen, Weiming Zhang, Kede Ma, Nenghai Yu: Recursive code construction for reversible data hiding in DCT domain. Multimedia Tools Appl. 72(2): 1985-2009 (2014). Abstract pdf
6 Weiming Zhang, Kede Ma, Nenghai Yu: Reversibility improved data hiding in encrypted images. Signal Processing 94: 118-127 (2014). Abstract pdf
7 Juntao Fu, Weiming Zhang, Nenghai Yu, Guoli Ma, Qi Tang: Fast tamper location of batch DNA sequences based on reversible data hiding. BMEI 2014: 868-872 (2014). Abstract pdf
8 Hong Zhang, Yun Cao, Xianfeng Zhao, Weiming Zhang, Nenghai Yu: Video steganography with perturbed macroblock partition. IH&MMSec 2014: 115-122 (2014). Abstract pdf
9 Xianjun Hu, Weiming Zhang, Honggang Hu, Nenghai Yu: Non-local Denoising in Encrypted Images. IOV 2014: 386-395(2014). Abstract pdf
10 Yuanzhi Yao, Weiming Zhang, Nenghai Yu, and Xianfeng Zhao, “Defining Embedding Distortion for Motion Vector-based Video Steganography,” Multimedia Tools and Applications, DOI: 10.1007/s11042-014-2223-8, 2014. Abstract pdf
11 Xiaolong Li, Weiming Zhang, Bu Ou, Bin Yang. “A brief review on reversible data hiding: current techniques and future prospects,”[C]//Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on. IEEE: 426-430, 2014. Abstract pdf
12 Biao Chen, Weiming Zhang, Kede Ma, Nenghai Yu. “Recursive code construction for reversible data hiding in DCT domain,”[J]. Multimedia tools and applications, 72(2): 1985-2009, 2014. Abstract pdf
13 Xiaocheng Hu, Weiming Zhang, Nenghai Yu. “Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding,”[C]//Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on. IEEE: 481-484, 2014. Abstract pdf
14 包震坤, 张卫明, 程森, 赵险峰. “基于像素链动态失真和校验格码的±1 隐写编码,”. 计算机研究与发展, 51(8): 1739-1747, 2014. Abstract pdf
1 2