


default search action
Xinpeng Zhang 0001
Person information
- affiliation: Shanghai University, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China
- affiliation (former): Fudan University, School of Computer Science, Shanghai, China
Other persons with the same name
- Xinpeng Zhang — disambiguation page
- Xinpeng Zhang 0002
— Kyoto University, Department of Social Informatics, Graduate School of Informatics, Japan - Xinpeng Zhang 0003
— Guangdong University of Technology, GDUT, School of Computer Science and Technology, Guangzhou, China - Xinpeng Zhang 0004 — Fudan University, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2026
[j353]Weijie Shi, Zichi Wang, Xinpeng Zhang, Guorui Feng:
StarINN: An efficient invertible neural network for image steganography. Displays 91: 103175 (2026)
[j352]Shuyi Li, Li Li, Yanli Ren, Xinpeng Zhang, Guorui Feng:
Lightweight AI-Generated image detection based on enhanced common artifact features. Expert Syst. Appl. 301: 130500 (2026)
[j351]Shichuang Xie, Tong Qiao, Sheng Li, Xinpeng Zhang, Jiantao Zhou, Guorui Feng:
DeepFake detection in the AIGC era: A survey, benchmarks, and future perspectives. Inf. Fusion 127: 103740 (2026)
[j350]Qingchao Jiang
, Shihao Fan, Zhiying Zhu
, Zhenxuan Hou, Weimin Zhong, Lei Tan, Zhenxing Qian, Xinpeng Zhang:
Adversarial attacks on industrial soft sensors: Multi-target attacks based on diffusion models. Inf. Sci. 725: 122732 (2026)
[j349]Qingchao Jiang
, Yu Zu, Zhiying Zhu
, Weimin Zhong, Yiran Xu
, Zhenxing Qian, Xinpeng Zhang:
Dynamic stealthy backdoor attack against anomaly detectors in industrial control systems. Inf. Sci. 735: 123066 (2026)
[j348]Jingqi Hu, Li Li
, Hanzhou Wu, Huixin Luo, Xinpeng Zhang:
Dormant key: Unlocking universal adversarial control in text-to-image models. Neural Networks 193: 108065 (2026)
[j347]Jingyuan Jiang
, Zichi Wang
, Xinpeng Zhang:
Image-to-Image Steganography based on multimodal generative model. Signal Process. 238: 110106 (2026)
[j346]Guanghui He, Yanli Ren
, Gang He, Guorui Feng, Xinpeng Zhang:
Privacy-preserving federated graph neural network against poisoning attack. Signal Process. 239: 110214 (2026)
[j345]Ruijie Du, Na Wang
, Cheng Xiong, Chuan Qin
, Xinpeng Zhang
:
High-Capacity Image Steganography via Latent Diffusion Models. IEEE Signal Process. Lett. 33: 401-405 (2026)- 2025
[j344]Miaomiao Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions. Comput. Sci. Rev. 58: 100785 (2025)
[j343]Haiteng Cao, Zichi Wang
, Xinpeng Zhang:
On improving steganalysis against cover selection steganography. Cybersecur. 8(1): 115 (2025)
[j342]Lin Huang
, Fengyong Li, Heng Yao
, Chuan Qin
, Xinpeng Zhang:
Soft integrity authentication for neural network models. Expert Syst. Appl. 267: 126172 (2025)
[j341]Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu
:
Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain. Int. J. Netw. Manag. 35(1) (2025)
[j340]Yunlong Hao
, Zichi Wang
, Jiaming Cao
, Xinpeng Zhang
:
General Steganography for Neural Network Models Based on Graph Convolutional Network. IEEE Internet Things J. 12(9): 12512-12526 (2025)
[j339]Li Li
, Xinpeng Zhang
, Hanzhou Wu
, Guorui Feng
, Weiming Zhang
:
FareMark: Model-Watermark-Driven Free-Rider Detection in Federated Learning Model. IEEE Internet Things J. 12(18): 38965-38977 (2025)
[j338]Li Li, Xinpeng Zhang, Guorui Feng, Zichi Wang, Deyang Wu, Hanzhou Wu:
Robust watermarking for diffusion models based on STDM and latent space fine-tuning. J. Inf. Secur. Appl. 93: 104167 (2025)
[j337]Zhilong Tu, Zichi Wang, Xinpeng Zhang:
Feature augmentation-based few-shot image steganalysis. J. Electronic Imaging 34(3) (2025)
[j336]Yalan Qin, Xinpeng Zhang, Shui Yu
, Guorui Feng:
A survey on representation learning for multi-view data. Neural Networks 181: 106842 (2025)
[j335]Guanghui He
, Yanli Ren
, Gaojian Li
, Guorui Feng, Xinpeng Zhang:
Private image synthesis of latent diffusion model with the ciphertext of prompt. Neural Networks 190: 107678 (2025)
[j334]Yating Zeng
, Xinpeng Zhang, Guorui Feng
:
Secure reversible privacy protection for face multiple attribute editing. Pattern Recognit. 166: 111662 (2025)
[j333]Zihan Yuan
, Li Li
, Zichi Wang
, Xinpeng Zhang:
Protecting copyright of stable diffusion models from ambiguity attacks. Signal Process. 227: 109722 (2025)
[j332]Fengyong Li
, Qiankuan Wang, Xinpeng Zhang, Chuan Qin
:
Adaptive three-dimensional histogram modification for JPEG reversible data hiding. Signal Process. 229: 109786 (2025)
[j331]Shuyi Li, Xuanbo Zhang
, Xinpeng Zhang
, Guorui Feng
:
Blind Embedding Rate Steganalysis Using Refocusing Learning. IEEE Signal Process. Lett. 32: 666-670 (2025)
[j330]Zichi Wang
, Xinpeng Zhang
, Xinran Li
:
Untraceable Steganography: Towards the Anonymity of Steganographer. IEEE Signal Process. Lett. 32: 956-960 (2025)
[j329]Jingyuan Jiang
, Zichi Wang
, Guanghui He
, Xinpeng Zhang
:
A Burn After Reading Data Hiding Framework. IEEE Signal Process. Lett. 32: 1131-1135 (2025)
[j328]Zihan Yuan
, Li Li
, Zichi Wang
, Jingyuan Jiang
, Xinpeng Zhang
:
Watermark Removal Attack Against Text-to-Image Generative Model Watermarking. IEEE Signal Process. Lett. 32: 1470-1474 (2025)
[j327]Haoxian Song
, Zichi Wang
, Xinpeng Zhang
:
Defending Against Adversarial Attack Through Generative Adversarial Networks. IEEE Signal Process. Lett. 32: 1730-1734 (2025)
[j326]Huixin Luo
, Li Li
, Xinpeng Zhang
:
A Watermark Forgery Attack Against Stable Diffusion Model Watermarking. IEEE Signal Process. Lett. 32: 3580-3584 (2025)
[j325]Zihe Huang, Luyang Ying
, Chuan Qin
, Heng Yao
, Xinpeng Zhang
:
Inversion Attack Framework for Deep Face Hashing. IEEE Signal Process. Lett. 32: 3899-3903 (2025)
[j324]Ruoyu Zhao
, Yushu Zhang
, Wenying Wen
, Xinpeng Zhang
, Xiaochun Cao
, Yong Xiang
:
PR3: Reversible and Usability-Enhanced Visual Privacy Protection via Thumbnail Preservation and Data Hiding. IEEE Trans. Big Data 11(1): 59-73 (2025)
[j323]Xiaotong Situ, Tong Liu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
Document-Image Perceptual Hashing for Content Authentication. IEEE Trans. Big Data 11(6): 3474-3487 (2025)
[j322]Yun Chen
, Hang Cheng
, Haichou Wang
, Ximeng Liu
, Fei Chen
, Fengyong Li
, Xinpeng Zhang
, Meiqing Wang
:
EAN: Edge-Aware Network for Image Manipulation Localization. IEEE Trans. Circuits Syst. Video Technol. 35(2): 1591-1601 (2025)
[j321]Yanhao Huo
, Shijun Xiang
, Xiangyang Luo
, Xinpeng Zhang
:
Image Semantic Steganography: A Way to Hide Information in Semantic Communication. IEEE Trans. Circuits Syst. Video Technol. 35(2): 1951-1960 (2025)
[j320]Guanghui He
, Yanli Ren
, Xiaoqiu Cai
, Guorui Feng
, Xinpeng Zhang
:
Private Sampling of Latent Diffusion Models for Encrypted Prompt. IEEE Trans. Circuits Syst. Video Technol. 35(6): 5833-5843 (2025)
[j319]Yifei Wang
, Gaozhi Liu, Zhiying Zhu
, Xinpeng Zhang
, Zhenxing Qian
:
VivID: A Visually Improved GIF Encoding Network Design. IEEE Trans. Circuits Syst. Video Technol. 35(6): 6101-6113 (2025)
[j318]Qing Zhou
, Ping Wei, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
:
Improved Generative Steganography Based on Diffusion Model. IEEE Trans. Circuits Syst. Video Technol. 35(7): 6494-6507 (2025)
[j317]Xiwen Fu
, Guopu Zhu
, Hongli Zhang
, Xinpeng Zhang
, Anthony T. S. Ho, Sam Kwong
:
Multi-Level Feature Fusion Network for Shadow Removal Detection. IEEE Trans. Circuits Syst. Video Technol. 35(7): 6508-6521 (2025)
[j316]Jingyuan Jiang
, Zichi Wang
, Zihan Yuan
, Xinpeng Zhang
:
Generative Image Steganography Based on Text-to-Image Multimodal Generative Model. IEEE Trans. Circuits Syst. Video Technol. 35(9): 8907-8916 (2025)
[j315]Chenyi Xu
, Lin Huang
, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Steganography With Constructing Neural Networks. IEEE Trans. Circuits Syst. Video Technol. 35(10): 9909-9921 (2025)
[j314]Lin Huang
, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Neural Network Watermarking With Hierarchical Recoverability. IEEE Trans. Dependable Secur. Comput. 22(5): 5077-5089 (2025)
[j313]Hui Tian
, Yiqin Qiu
, Haizhou Li
, Xinpeng Zhang
, Athanasios V. Vasilakos
:
Universal Low Bit-Rate Speech Steganalysis Integrating Domain-Specific and Domain-Shared Knowledge. IEEE Trans. Dependable Secur. Comput. 22(5): 5382-5396 (2025)
[j312]Qing Zhou
, Ping Wei
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
, Chuan Qin
:
Conditional Flow-Based Generative Steganography. IEEE Trans. Dependable Secur. Comput. 22(5): 5632-5647 (2025)
[j311]Chunqiang Yu
, Xianquan Zhang
, Guoxiang Li, Peng Liu
, Xinpeng Zhang
, Zhenjun Tang
:
Reversible Data Hiding in Encrypted Images With Secret Sharing and Multivariate Linear Equation. IEEE Trans. Dependable Secur. Comput. 22(6): 6767-6780 (2025)
[j310]Yanli Ren
, Zhe Yang, Guorui Feng
, Xinpeng Zhang
:
PurifyFL: Non-Interactive Privacy-Preserving Federated Learning Against Poisoning Attacks Based on Single Server. IEEE Trans. Emerg. Top. Comput. Intell. 9(3): 2232-2243 (2025)
[j309]Guanghui He
, Yanli Ren
, Jingyuan Jiang, Guorui Feng
, Xinpeng Zhang
:
Privacy-Enhanced Federated GNN Inference Against Adversarial Example Attack. IEEE Trans. Emerg. Top. Comput. Intell. 9(4): 2818-2829 (2025)
[j308]Mingyun Bian
, Yanli Ren
, Guanghui He
, Guorui Feng
, Xinpeng Zhang
:
VFFG: Verifiable Privacy-Enhanced Federated Fine-Tuning for GPT Service. IEEE Trans. Emerg. Top. Comput. Intell. 9(5): 3271-3285 (2025)
[j307]Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Xinpeng Zhang
, Ching-Nung Yang
:
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps. IEEE Trans. Inf. Forensics Secur. 20: 665-676 (2025)
[j306]Luyang Ying
, Cheng Xiong, Chuan Qin
, Xiangyang Luo
, Zhenxing Qian
, Xinpeng Zhang
:
Generative Collision Attack on Deep Image Hashing. IEEE Trans. Inf. Forensics Secur. 20: 2748-2762 (2025)
[j305]Yongliang Xu
, Hang Cheng
, Jiguo Li
, Ximeng Liu
, Xinpeng Zhang
, Meiqing Wang
:
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 20: 3234-3246 (2025)
[j304]Yongliang Xu
, Hang Cheng
, Ximeng Liu
, Changsong Jiang
, Xinpeng Zhang
, Meiqing Wang
:
PCSE: Privacy-Preserving Collaborative Searchable Encryption for Group Data Sharing in Cloud Computing. IEEE Trans. Mob. Comput. 24(5): 4558-4572 (2025)
[j303]Ping Kong
, An Li, Daidou Guo
, Liang Zhou
, Chuan Qin
, Xinpeng Zhang
:
Privacy-Preserving Image Inpainting Using Markov Random Field Modeling. IEEE Trans. Multim. 27: 3688-3701 (2025)
[j302]Fengyong Li
, Qiankuan Wang
, Hang Cheng
, Xinpeng Zhang
, Chuan Qin
:
JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification. IEEE Trans. Multim. 27: 3729-3743 (2025)
[j301]Huixin Luo
, Li Li
, Xinpeng Zhang
:
Secure Neural Network Watermarking Protocol Against Evidence Exposure Attack. IEEE Trans. Multim. 27: 5563-5574 (2025)
[j300]Gaozhi Liu
, Xiujian Liang, Xiaoxiao Hu
, Yichao Si, Xinpeng Zhang
, Zhenxing Qian
:
ScreenGuard: A Screen-targeted Watermarking Scheme Against Arbitrary Screenshot. IEEE Trans. Multim. 27: 8381-8392 (2025)
[j299]Daidou Guo
, Chuan Qin
, Fengyong Li
, Heng Yao
, Xinpeng Zhang
:
Improving Robustness of Screen-Camera Resilient Watermarking: A Large-Scale Dataset and a Noise Simulation Network. IEEE Trans. Multim. 27: 8723-8736 (2025)
[j298]Fengyong Li
, Hao Liu
, Xinpeng Zhang
, Chuan Qin
:
StegFlow: Flow-Based High-Frequency Distribution Mapping Network for Multi-Image Steganography. IEEE Trans. Multim. 27: 9555-9569 (2025)
[j297]Gang He
, Yanli Ren
, Jun Zhao
, Guorui Feng
, Xinpeng Zhang
:
EPCNN: Efficient and Practical Privacy-Preserving Convolutional Neural Network Inference. IEEE Trans. Netw. Sci. Eng. 12(3): 1567-1580 (2025)
[j296]Lin Huang
, Chuan Qin
, Guorui Feng
, Xiangyang Luo
, Xinpeng Zhang
:
New Framework of Robust Image Encryption. ACM Trans. Multim. Comput. Commun. Appl. 21(3): 91:1-91:22 (2025)
[j295]Cheng Xiong
, Chuan Qin
, Zhenxing Qian
, Xiaolong Li
, Xinpeng Zhang
:
Robust and Secure Hashing Towards Pirated Neural Network Model Detection. ACM Trans. Multim. Comput. Commun. Appl. 21(8): 232:1-232:20 (2025)
[j294]Zihan Yuan
, Li Li
, Zichi Wang
, Xinpeng Zhang
:
Integrity Protection of Generative Adversarial Networks Using Fragile Watermarking. ACM Trans. Multim. Comput. Commun. Appl. 21(12): 342:1-342:21 (2025)
[j293]Yanli Ren
, Yerong Li
, Guorui Feng
, Xinpeng Zhang
:
VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server. IEEE Trans. Serv. Comput. 18(2): 1124-1136 (2025)
[c150]Yuliang Xue, Lei Tan, Guobiao Li, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Physical Marker: Revealing Invisible Hyperlinks Hidden in Printed Trademarks. AAAI 2025: 9068-9075
[c149]Yalan Qin, Guorui Feng, Xinpeng Zhang:
Scalable One-Pass Incomplete Multi-View Clustering by Aligning Anchors. AAAI 2025: 20042-20050
[c148]Gaozhi Liu, Silu Cao, Zhenxing Qian, Xinpeng Zhang, Sheng Li, Wanli Peng:
Watermarking One for All: A Robust Watermarking Scheme Against Partial Image Theft. CVPR 2025: 8225-8234
[c147]Nan Zhong, Haoyu Chen, Yiran Xu
, Zhenxing Qian, Xinpeng Zhang:
Beyond Generation: A Diffusion-based Low-level Feature Extractor for Detecting AI-generated Images. CVPR 2025: 8258-8268
[c146]Yajie Wang, Meiling Li
, Gaozhi Liu
, Xinpeng Zhang
, Sun Yunlong
, Zhenxing Qian
:
MSAQE: A Large-Scale Dataset for Multi-view Scenic Areas Quality Evaluation. DASFAA (2) 2025: 19-34
[c145]Zhaojun Guo, Guobiao Li, Junqiang Huang, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Filtering Resistant Large Language Model Watermarking via Style Injection. ICASSP 2025: 1-5
[c144]Wenqi Li, Yingli Chen, Keyang Zhou, Xiaoxiao Hu, Zilu Zheng, Yue Yan, Xinpeng Zhang, Wei Tang, Zhenxing Qian:
An Exceptional Dataset For Rare Pancreatic Tumor Segmentation. ICASSP 2025: 1-5
[c143]Lei Tan, Yuliang Xue, Guobiao Li, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Texture-Aware Neural Radiance Fields Watermarking for Resisting Feature-Modulation Surrogate Model Attacks. ICME 2025: 1-6
[c142]Yalan Qin, Guorui Feng, Xinpeng Zhang:
Fast Incomplete Multi-view Clustering by Flexible Anchor Learning. ICML 2025
[c141]Yiran Xu
, Nan Zhong, Guobiao Li, Anda Cheng, Yinggui Wang, Zhenxing Qian, Xinpeng Zhang:
Fine-grained Prompt Screening: Defending Against Backdoor Attack on Text-to-Image Diffusion Models. IJCAI 2025: 601-609
[c140]Changyu Rao
, Gaozhi Liu
, Sheng Li
, Xinpeng Zhang
, Zhenxing Qian
:
DynMark: A Robust Watermarking Solution for Dynamic Screen Content with Small-size Screenshot Support. ACM Multimedia 2025: 7463-7471
[c139]Yiang Zhu
, Haoyue Wang
, Zhenxing Qian
, Sheng Li
, Xinpeng Zhang
, Jian Liu
:
Towards Generalized Physical Occlusion Detection On Documents. ACM Multimedia 2025: 7596-7605
[c138]Chenda Wei
, Haoyue Wang
, Zhenxing Qian
, Sheng Li
, Xinpeng Zhang
, Jian Liu
:
Learning Discrepant Transformations for Face Privacy Protection. ACM Multimedia 2025: 7672-7680
[c137]Shengjiu Dai
, Xiujian Liang
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Safe-BVAR: Text-to-Image Generative Watermarking for Bitwise Visual AutoRegressive Model. ACM Multimedia 2025: 11385-11393
[i83]Wenqi Li, Yingli Chen, Keyang Zhou, Xiaoxiao Hu, Zilu Zheng, Yue Yan, Xinpeng Zhang, Wei Tang, Zhenxing Qian
:
An Exceptional Dataset For Rare Pancreatic Tumor Segmentation. CoRR abs/2501.17555 (2025)
[i82]Gejian Zhao, Hanzhou Wu, Xinpeng Zhang, Athanasios V. Vasilakos:
ShadowCoT: Cognitive Hijacking for Stealthy Reasoning Backdoors in LLMs. CoRR abs/2504.05605 (2025)
[i81]Guobiao Li, Lei Tan, Yuliang Xue, Gaozhi Liu, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Adversarial Shallow Watermarking. CoRR abs/2504.19529 (2025)
[i80]Yu Cheng, Jiuan Zhou, Jiawei Chen, Zhaoxia Yin, Xinpeng Zhang:
RFNNS: Robust Fixed Neural Network Steganography with Popular Deep Generative Models. CoRR abs/2505.04116 (2025)
[i79]Zhenzhen Ren
, Guobiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models. CoRR abs/2505.16785 (2025)
[i78]Jialin Yan, Yu Cheng, Zhaoxia Yin, Xinpeng Zhang, Shilin Wang, Tanfeng Sun, Xinghao Jiang:
FGS-Audio: Fixed-Decoder Framework for Audio Steganography with Adversarial Perturbation Generation. CoRR abs/2505.22266 (2025)
[i77]Yuzhou Yang, Yangming Zhou, Zhiying Zhu, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
RoE-FND: A Case-Based Reasoning Approach with Dual Verification for Fake News Detection via LLMs. CoRR abs/2506.11078 (2025)
[i76]Jiaxin Liu, Qichao Ying, Zhenxing Qian, Sheng Li, Runqi Zhang, Jian Liu, Xinpeng Zhang:
MoFRR: Mixture of Diffusion Models for Face Retouching Restoration. CoRR abs/2507.19770 (2025)
[i75]Zhenliang Gan, Xiaoxiao Hu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
SyncGuard: Robust Audio Watermarking Capable of Countering Desynchronization Attacks. CoRR abs/2508.17121 (2025)
[i74]Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang:
Yet Another Watermark for Large Language Models. CoRR abs/2509.12574 (2025)
[i73]Gejian Zhao, Hanzhou Wu, Xinpeng Zhang:
Trigger Where It Hurts: Unveiling Hidden Backdoors through Sensitivity with Sensitron. CoRR abs/2509.19101 (2025)
[i72]Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang:
Large Language Models Are Effective Code Watermarkers. CoRR abs/2510.11251 (2025)
[i71]Yichao Tang, Mingyang Li, Di Miao, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
SimuFreeMark: A Noise-Simulation-Free Robust Watermarking Against Image Editing. CoRR abs/2511.11295 (2025)
[i70]Fangming Shi, Li Li, Kejiang Chen, Guorui Feng, Xinpeng Zhang:
AuthenLoRA: Entangling Stylization with Imperceptible Watermarks for Copyright-Secure LoRA Adapters. CoRR abs/2511.21216 (2025)
[i69]Zhenzhen Ren
, Xinpeng Zhang, Zhenxing Qian, Yan Gao, Yu Shi, Shuxin Zheng, Jiyan He:
GTM: Simulating the World of Tools for AI Agents. CoRR abs/2512.04535 (2025)
[i68]Nan Zhong, Mian Zou, Yiran Xu, Zhenxing Qian, Xinpeng Zhang, Baoyuan Wu, Kede Ma:
Self-Supervised AI-Generated Image Detection: A Camera Metadata Perspective. CoRR abs/2512.05651 (2025)- 2024
[j292]Yuliang Xue
, Yuhao Zhu, Zhiying Zhu
, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. Comput. J. 67(2): 498-507 (2024)
[j291]Nan Zhong
, Zhenxing Qian
, Xinpeng Zhang:
Sparse Backdoor Attack Against Neural Networks. Comput. J. 67(5): 1783-1793 (2024)
[j290]Le Feng, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. Comput. J. 67(5): 1879-1891 (2024)
[j289]Zihan Yuan
, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Syst. Appl. 236: 121315 (2024)
[j288]Mouke Mo
, Chuntao Wang
, Qingwen Guo, Shan Bian, Qiong Huang, Xinpeng Zhang:
A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Syst. Appl. 252: 124201 (2024)
[j287]Yi Luo, Sheng Li, Xinpeng Zhang, Guorui Feng:
Controlling the performance of deep neural networks using a single parameter. Evol. Intell. 17(5): 4303-4313 (2024)
[j286]Mengzhu Yu
, Zhenjun Tang
, Xiaoping Liang
, Xianquan Zhang
, Xinpeng Zhang
:
Perceptual Hashing With Deep and Texture Features. IEEE Multim. 31(1): 65-75 (2024)
[j285]Mingyun Bian
, Guanghui He, Guorui Feng
, Xinpeng Zhang
, Yanli Ren
:
Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM. IEEE Internet Things J. 11(1): 1719-1731 (2024)
[j284]Yanli Ren
, Cien Chen
, Mingqi Hu, Guorui Feng
, Xinpeng Zhang
:
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks. IEEE Internet Things J. 11(2): 3510-3523 (2024)
[j283]Xiangyu Zhao
, Hanzhou Wu
, Xinpeng Zhang
:
Effective Backdoor Attack on Graph Neural Networks in Spectral Domain. IEEE Internet Things J. 11(7): 12102-12114 (2024)
[j282]Yong Liu
, Li Zhang
, Hanzhou Wu
, Zichi Wang
, Xinpeng Zhang
:
Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform. IEEE Internet Things J. 11(10): 18503-18515 (2024)
[j281]Zihan Yuan
, Li Li
, Zichi Wang
, Xinpeng Zhang
:
Watermarking for Stable Diffusion Models. IEEE Internet Things J. 11(21): 35238-35249 (2024)
[j280]Nan Zhong
, Zhenxing Qian
, Xinpeng Zhang:
Backdoor attack detection via prediction trustworthiness assessment. Inf. Sci. 662: 120283 (2024)
[j279]Yanli Ren
, Mingqi Hu
, Zhe Yang, Guorui Feng
, Xinpeng Zhang:
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Inf. Sci. 665: 120377 (2024)
[j278]Mingyun Bian
, Yanli Ren
, Gang He
, Guorui Feng
, Xinpeng Zhang:
VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Inf. Sci. 669: 120547 (2024)
[j277]Yong Liu
, Chen Li
, Zichi Wang
, Hanzhou Wu
, Xinpeng Zhang:
Transferable adversarial attack based on sensitive perturbation analysis in frequency domain. Inf. Sci. 678: 120971 (2024)
[j276]Zhiguang Yang, Yazhou Zhang, Xinpeng Zhang, Hanzhou Wu
:
Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing. J. Electronic Imaging 33(2) (2024)
[j275]Haoxian Song
, Zichi Wang, Xinpeng Zhang:
Identification of the Original Images. J. Vis. Commun. Image Represent. 98: 104017 (2024)
[j274]Zhicheng Ye, Xinpeng Zhang, Guorui Feng:
Deep neural networks watermark via universal deep hiding and metric learning. Neural Comput. Appl. 36(13): 7421-7438 (2024)
[j273]Yue Wang, Minjie Liu, Yanli Ren
, Xinpeng Zhang, Guorui Feng
:
Traffic sign attack via pinpoint region probability estimation network. Pattern Recognit. 146: 110035 (2024)
[j272]Zihan Yuan
, Li Li, Zichi Wang, Xinpeng Zhang:
Ambiguity attack against text-to-image diffusion model watermarking. Signal Process. 221: 109509 (2024)
[j271]Lin Huang
, Yitong Tao, Chuan Qin
, Xinpeng Zhang
:
Robust Hashing for Neural Network Models via Heterogeneous Graph Representation. IEEE Signal Process. Lett. 31: 2640-2644 (2024)
[j270]Shiyu Wei
, Zichi Wang
, Xinpeng Zhang:
Universal Image Vaccine Against Steganography. Symmetry 17(1): 66 (2024)
[j269]Ruolan Shi
, Zichi Wang
, Yunlong Hao
, Xinpeng Zhang
:
Steganography in Style Transfer. IEEE Trans. Artif. Intell. 5(12): 6054-6065 (2024)
[j268]Hang Cheng
, Xibin Li
, Huaxiong Wang
, Xinpeng Zhang
, Ximeng Liu
, Meiqing Wang
, Fengyong Li
:
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models. IEEE Trans. Circuits Syst. Video Technol. 34(1): 97-109 (2024)
[j267]Fengyong Li
, Zhen Qi, Xinpeng Zhang
, Chuan Qin
:
Progressive Histogram Modification for JPEG Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 34(2): 1241-1254 (2024)
[j266]Weixiang Li
, Shihang Wu
, Bin Li
, Weixuan Tang
, Xinpeng Zhang
:
Payload-Independent Direct Cost Learning for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1970-1975 (2024)
[j265]Xin Li
, Guopu Zhu
, Shen Wang
, Yicong Zhou
, Xinpeng Zhang
:
Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model. IEEE Trans. Circuits Syst. Video Technol. 34(7): 6391-6402 (2024)
[j264]Jiang Yu
, Fengyong Li
, Zichi Wang
, Wen Si
, Xinpeng Zhang
:
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7785-7800 (2024)
[j263]Deyang Wu
, Xinpeng Zhang
, Jiayan Wang
, Li Li
, Guorui Feng
:
Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping. IEEE Trans. Circuits Syst. Video Technol. 34(10): 10281-10298 (2024)
[j262]Haodong Wang, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
When Robust Reversible Watermarking Meets Cropping Attacks. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13282-13296 (2024)
[j261]Lina Lin
, Deyang Wu
, Jiayan Wang
, Yanli Chen
, Xinpeng Zhang
, Hanzhou Wu
:
Automatic, Robust, and Blind Video Watermarking Resisting Camera Recording. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13413-13426 (2024)
[j260]Jiang Yu
, Jing Zhang, Zichi Wang
, Fengyong Li
, Xinpeng Zhang
:
Cover Selection in Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13626-13641 (2024)
[j259]Tianyu Yang
, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. IEEE Trans. Dependable Secur. Comput. 21(1): 139-152 (2024)
[j258]Sheng Li
, Zichi Wang
, Xiudong Zhang, Xinpeng Zhang
:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024)
[j257]Fengyong Li
, Zongliang Yu
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. IEEE Trans. Dependable Secur. Comput. 21(4): 1557-1571 (2024)
[j256]Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Mengzhu Yu
, Xinpeng Zhang
:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. IEEE Trans. Dependable Secur. Comput. 21(4): 2448-2460 (2024)
[j255]Yong Liu
, Hanzhou Wu
, Xinpeng Zhang
:
Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering. IEEE Trans. Dependable Secur. Comput. 21(6): 5766-5780 (2024)
[j254]Zihan Yuan
, Xinpeng Zhang
, Zichi Wang
, Zhaoxia Yin
:
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2775-2790 (2024)
[j253]Xiaoxiao Hu
, Sheng Li
, Qichao Ying
, Wanli Peng
, Xinpeng Zhang
, Zhenxing Qian
:
Establishing Robust Generative Image Steganography via Popular Stable Diffusion. IEEE Trans. Inf. Forensics Secur. 19: 8094-8108 (2024)
[j252]Fengyong Li
, Yang Sheng
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. IEEE Trans. Inf. Forensics Secur. 19: 8817-8831 (2024)
[j251]Fengyong Li
, Huajun Zhai
, Xinpeng Zhang
, Chuan Qin
:
Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement. IEEE Trans. Instrum. Meas. 73: 1-14 (2024)
[j250]Yalan Qin
, Chuan Qin
, Xinpeng Zhang
, Guorui Feng
:
Dual Consensus Anchor Learning for Fast Multi-View Clustering. IEEE Trans. Image Process. 33: 5298-5311 (2024)
[j249]Quan Wang, Sheng Li
, Zichi Wang
, Xinpeng Zhang
, Guorui Feng
:
Multi-Source Style Transfer via Style Disentanglement Network. IEEE Trans. Multim. 26: 1373-1383 (2024)
[j248]Chuan Qin
, Xiaomeng Li, Zhenyi Zhang, Fengyong Li
, Xinpeng Zhang
, Guorui Feng
:
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Trans. Multim. 26: 2164-2177 (2024)
[j247]Fengyong Li
, Yang Sheng
, Xinpeng Zhang
, Chuan Qin
:
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography. IEEE Trans. Multim. 26: 3137-3152 (2024)
[j246]Lizhi Xiong
, Jianhua Xu
, Ching-Nung Yang
, Xinpeng Zhang
:
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection. IEEE Trans. Multim. 26: 6090-6101 (2024)
[j245]Quan Wang, Zichi Wang
, Xinpeng Zhang
, Guorui Feng
:
Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network. IEEE Trans. Multim. 26: 8026-8037 (2024)
[j244]Xinran Li
, Zichi Wang
, Guorui Feng
, Xinpeng Zhang
, Chuan Qin
:
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments. IEEE Trans. Multim. 26: 10041-10054 (2024)
[j243]Xianquan Zhang
, Feiyi He
, Chunqiang Yu
, Xinpeng Zhang
, Ching-Nung Yang
, Zhenjun Tang
:
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression. IEEE Trans. Multim. 26: 10174-10188 (2024)
[j242]Zhiying Zhu
, Hang Zhou
, Haoqi Hu, Qingchao Jiang
, Zhenxing Qian
, Xinpeng Zhang
:
Hide and Recognize Your Privacy Image. IEEE Trans. Netw. Sci. Eng. 11(6): 6130-6142 (2024)
[j241]Fengyong Li
, Huajun Zhai
, Teng Liu
, Xinpeng Zhang
, Chuan Qin
:
Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network. ACM Trans. Multim. Comput. Commun. Appl. 20(10): 315:1-315:23 (2024)
[j240]Chunqiang Yu
, Shichao Cheng
, Xianquan Zhang
, Xinpeng Zhang
, Zhenjun Tang
:
Reversible Data Hiding in Shared JPEG Images. ACM Trans. Multim. Comput. Commun. Appl. 20(12): 372:1-372:24 (2024)
[j239]Mengzhu Yu
, Zhenjun Tang
, Xiaoping Liang
, Xianquan Zhang
, Zhixin Li
, Xinpeng Zhang
:
Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection. ACM Trans. Multim. Comput. Commun. Appl. 20(12): 384:1-384:23 (2024)
[j238]Guanghui He
, Yanli Ren
, Gang He
, Guorui Feng
, Xinpeng Zhang
:
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack. IEEE Trans. Serv. Comput. 17(6): 4083-4096 (2024)
[j237]Yushu Zhang
, Jiahao Zhu
, Mingfu Xue
, Xinpeng Zhang
, Xiaochun Cao
:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Trans. Vis. Comput. Graph. 30(8): 5299-5312 (2024)
[c136]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian
, Xinpeng Zhang:
Purified and Unified Steganographic Network. CVPR 2024: 27559-27568
[c135]Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang:
Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences. ECAI 2024: 1463-1470
[c134]Yiran Xu
, Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Revocable Backdoor for Deep Model Trading. ECAI 2024: 1471-1478
[c133]Cong Kong, Jiawei Chen, Shunquan Tan, Zhaoxia Yin, Xinpeng Zhang:
Copyright Protection for Large Language Model EaaS via Unforgeable Backdoor Watermarking. ICPR (20) 2024: 1-15
[c132]Chenghua He
, Deyang Wu
, Xinpeng Zhang
, Hanzhou Wu
:
Watermarking Text Documents With Watermarked Fonts. IH&MMSec 2024: 187-197
[c131]Li Zhang
, Yong Liu
, Xinpeng Zhang
, Hanzhou Wu
:
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing. IH&MMSec 2024: 223-234
[c130]Xueying Mao
, Xiaoxiao Hu
, Wanli Peng
, Zhenliang Gan
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
:
From Covert Hiding To Visual Editing: Robust Generative Video Steganography. ACM Multimedia 2024: 2757-2765
[c129]Ge Luo
, Yuchen Ma
, Manman Zhang
, Junqiang Huang
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Engaging Live Video Comments Generation. ACM Multimedia 2024: 8034-8042
[c128]Xuntao Liu
, Yuzhou Yang
, Haoyue Wang
, Qichao Ying
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
:
Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization. ACM Multimedia 2024: 9999-10007
[c127]Guobiao Li
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Cover-separable Fixed Neural Network Steganography via Deep Generative Models. ACM Multimedia 2024: 10238-10247
[c126]Jialiang Li
, Haoyue Wang
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
, Athanasios V. Vasilakos
:
Are handcrafted filters helpful for attributing AI-generated images? ACM Multimedia 2024: 10698-10706
[c125]Zhaojun Guo
, Junqiang Huang
, Guobiao Li
, Wanli Peng
, Xinpeng Zhang
, Zhenxing Qian
, Sheng Li
:
Emotion-Aware and Efficient Meme Sticker Dialogue Generation. MMAsia 2024: 81:1
[c124]Junqiang Huang, Zhaojun Guo, Ge Luo, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Disentangled Style Domain for Implicit z-Watermark Towards Copyright Protection. NeurIPS 2024
[c123]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings. WIFS 2024: 1-6
[i67]Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
From Covert Hiding to Visual Editing: Robust Generative Video Steganography. CoRR abs/2401.00652 (2024)
[i66]Xuntao Liu, Yuzhou Yang, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning. CoRR abs/2401.00653 (2024)
[i65]Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian
, Sheng Li:
Object-oriented backdoor attack against image captioning. CoRR abs/2401.02600 (2024)
[i64]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian
, Xinpeng Zhang:
Purified and Unified Steganographic Network. CoRR abs/2402.17210 (2024)
[i63]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings. CoRR abs/2406.13177 (2024)
[i62]Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang:
Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences. CoRR abs/2407.07931 (2024)
[i61]Guobiao Li, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Cover-separable Fixed Neural Network Steganography via Deep Generative Models. CoRR abs/2407.11405 (2024)
[i60]Jialiang Li, Haoyue Wang, Sheng Li, Zhenxing Qian
, Xinpeng Zhang, Athanasios V. Vasilakos:
Are handcrafted filters helpful for attributing AI-generated images? CoRR abs/2407.14570 (2024)
[i59]Yiran Xu, Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Revocable Backdoor for Deep Model Trading. CoRR abs/2408.00255 (2024)
[i58]Xiujian Liang, Gaozhi Liu, Yichao Si, Xiaoxiao Hu, Zhenxing Qian
, Xinpeng Zhang:
ScreenMark: Watermarking Arbitrary Visual Content on Screen. CoRR abs/2409.03487 (2024)
[i57]Haoyue Wang, Sheng Li, Ji He, Zhenxing Qian
, Xinpeng Zhang, Shaolin Fan:
Exploring Depth Information for Detecting Manipulated Face Videos. CoRR abs/2411.18572 (2024)- 2023
[j236]Xiaolong Duan
, Bin Li
, Zhaoxia Yin
, Xinpeng Zhang
, Bin Luo
:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. Expert Syst. Appl. 229(Part A): 120416 (2023)
[j235]Chuan Qin
, Shengyan Gao
, Xinpeng Zhang
, Guorui Feng
:
CADW: CGAN-Based Attack on Deep Robust Image Watermarking. IEEE Multim. 30(1): 28-35 (2023)
[j234]Zichi Wang, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Data hiding during image processing using capsule networks. Neurocomputing 537: 49-60 (2023)
[j233]Mingjie Li, Hanzhou Wu
, Xinpeng Zhang:
A novel watermarking framework for intellectual property protection of NLG APIs. Neurocomputing 558: 126700 (2023)
[j232]Gang He
, Yanli Ren
, Mingyun Bian, Guorui Feng
, Xinpeng Zhang:
Privacy-enhanced and non-interactive linear regression with dropout-resilience. Inf. Sci. 632: 69-86 (2023)
[j231]Ziyun Yang, Zichi Wang
, Xinpeng Zhang:
A general steganographic framework for neural network models. Inf. Sci. 643: 119250 (2023)
[j230]Le Feng, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning. Inf. Sci. 647: 119453 (2023)
[j229]Mingjie Li, Hanzhou Wu
, Zichi Wang, Xinpeng Zhang:
Generating watermarked adversarial texts. J. Electronic Imaging 32(2) (2023)
[j228]Ke Wu, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Defending against adversarial examples using perceptual image hashing. J. Electronic Imaging 32(2) (2023)
[j227]Yalan Qin
, Xinpeng Zhang
, Liquan Shen
, Guorui Feng
:
Maximum Block Energy Guided Robust Subspace Clustering. IEEE Trans. Pattern Anal. Mach. Intell. 45(2): 2652-2659 (2023)
[j226]Qichao Ying
, Hang Zhou
, Zhenxing Qian
, Sheng Li
, Xinpeng Zhang
:
Learning to Immunize Images for Tamper Localization and Self-Recovery. IEEE Trans. Pattern Anal. Mach. Intell. 45(11): 13814-13830 (2023)
[j225]Hanzhou Wu
, Chen Li, Gen Liu, Xinpeng Zhang:
Hiding data hiding. Pattern Recognit. Lett. 165: 122-127 (2023)
[j224]Wanli Peng
, Tao Wang, Zhenxing Qian
, Sheng Li
, Xinpeng Zhang
:
Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack. IEEE Signal Process. Lett. 30: 299-303 (2023)
[j223]Xuanbo Zhang
, Xinpeng Zhang
, Guorui Feng
:
Image Steganalysis Network Based on Dual-Attention Mechanism. IEEE Signal Process. Lett. 30: 1287-1291 (2023)
[j222]Jiang Yu, Xiaoyi Zhou, Wen Si, Fengyong Li
, Cong Liu, Xinpeng Zhang:
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2. Symmetry 15(5): 979 (2023)
[j221]Xiong Tang, Zichi Wang
, Xinpeng Zhang:
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution. Symmetry 15(5): 1079 (2023)
[j220]Mingjie Li
, Zichi Wang
, Xinpeng Zhang:
An Effective Framework for Intellectual Property Protection of NLG Models. Symmetry 15(6): 1287 (2023)
[j219]Wanli Peng
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism. IEEE ACM Trans. Audio Speech Lang. Process. 31: 3513-3526 (2023)
[j218]Lizhi Xiong
, Xiao Han
, Ching-Nung Yang
, Xinpeng Zhang
:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. IEEE Trans. Cloud Comput. 11(3): 3085-3098 (2023)
[j217]Mingji Yu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
Reversible Data Hiding in Palette Images. IEEE Trans. Circuits Syst. Video Technol. 33(2): 648-660 (2023)
[j216]Gongyang Li
, Yike Wang, Zhi Liu
, Xinpeng Zhang
, Dan Zeng
:
RGB-T Semantic Segmentation With Location, Activation, and Sharpening. IEEE Trans. Circuits Syst. Video Technol. 33(3): 1223-1235 (2023)
[j215]Zhiying Zhu
, Ping Wei
, Zhenxing Qian
, Sheng Li
, Xinpeng Zhang
:
Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding. IEEE Trans. Circuits Syst. Video Technol. 33(6): 3017-3029 (2023)
[j214]Chuntao Wang
, Juan Hu
, Shan Bian
, Jiangqun Ni
, Xinpeng Zhang
:
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4322-4336 (2023)
[j213]Shiyi Chen, Asad Malik, Xinpeng Zhang
, Guorui Feng
, Hanzhou Wu
:
A Fast Method for Robust Video Watermarking Based on Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7342-7353 (2023)
[j212]Yalan Qin
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Consistency-Induced Multiview Subspace Clustering. IEEE Trans. Cybern. 53(2): 832-844 (2023)
[j211]Zichi Wang
, Guorui Feng
, Zhenxing Qian
, Xinpeng Zhang
:
JPEG Steganography With Content Similarity Evaluation. IEEE Trans. Cybern. 53(8): 5082-5093 (2023)
[j210]Ziqing Huang, Zhenjun Tang
, Xianquan Zhang
, Linlin Ruan, Xinpeng Zhang
:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. IEEE Trans. Dependable Secur. Comput. 20(1): 463-477 (2023)
[j209]Zichi Wang
, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Cover Selection for Steganography Using Image Similarity. IEEE Trans. Dependable Secur. Comput. 20(3): 2328-2340 (2023)
[j208]Zhongyun Hua
, Yanxiang Wang, Shuang Yi
, Yifeng Zheng
, Xingyu Liu
, Yongyong Chen
, Xinpeng Zhang
:
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. IEEE Trans. Dependable Secur. Comput. 20(5): 3669-3686 (2023)
[j207]Zichi Wang
, Sheng Li
, Xinpeng Zhang
, Guorui Feng
:
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 250-260 (2023)
[j206]Gongyang Li
, Zhi Liu
, Xinpeng Zhang
, Weisi Lin
:
Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023)
[j205]Shen Wang
, Zhaoyang Zhang, Guopu Zhu
, Xinpeng Zhang
, Yicong Zhou
, Jiwu Huang
:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 351-364 (2023)
[j204]Qingxiao Guan
, Peng Liu
, Weiming Zhang
, Wei Lu
, Xinpeng Zhang
:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. IEEE Trans. Inf. Forensics Secur. 18: 501-516 (2023)
[j203]Di Chen
, Fengbin Zhang, Xinpeng Zhang
:
Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning. IEEE Trans. Ind. Informatics 19(8): 9183-9193 (2023)
[j202]Mingyun Bian
, Joseph K. Liu
, Shifeng Sun, Xinpeng Zhang
, Yanli Ren
:
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing. IEEE Trans. Ind. Informatics 19(12): 11518-11530 (2023)
[j201]Yalan Qin
, Chuan Qin
, Xinpeng Zhang
, Donglian Qi
, Guorui Feng
:
NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks. IEEE Trans. Image Process. 32: 175-189 (2023)
[j200]Gongyang Li
, Zhen Bai
, Zhi Liu
, Xinpeng Zhang
, Haibin Ling
:
Salient Object Detection in Optical Remote Sensing Images Driven by Transformer. IEEE Trans. Image Process. 32: 5257-5269 (2023)
[j199]Yalan Qin
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization. IEEE Trans. Knowl. Data Eng. 35(3): 2313-2325 (2023)
[j198]Xiaoping Liang
, Zhenjun Tang
, Jingli Wu, Zhixin Li
, Xinpeng Zhang
:
Robust Image Hashing With Isomap and Saliency Map for Copy Detection. IEEE Trans. Multim. 25: 1085-1097 (2023)
[j197]Chuan Qin
, Jinchuan Hu
, Fengyong Li
, Zhenxing Qian
, Xinpeng Zhang
:
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation. IEEE Trans. Multim. 25: 2528-2542 (2023)
[j196]Chuntao Wang
, Tianjian Zhang, Hao Chen, Qiong Huang
, Jiangqun Ni
, Xinpeng Zhang
:
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network. IEEE Trans. Multim. 25: 4026-4040 (2023)
[j195]Yushu Zhang
, Wentao Zhou, Ruoyu Zhao
, Xinpeng Zhang
, Xiaochun Cao:
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Trans. Multim. 25: 5877-5891 (2023)
[j194]Fengyong Li
, Zhenjia Pei, Xinpeng Zhang
, Chuan Qin
:
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision. IEEE Trans. Multim. 25: 7851-7866 (2023)
[j193]Zhenjun Tang
, Zhiyuan Chen
, Zhixin Li
, Bineng Zhong, Xianquan Zhang
, Xinpeng Zhang:
Unifying Dual-Attention and Siamese Transformer Network for Full-Reference Image Quality Assessment. ACM Trans. Multim. Comput. Commun. Appl. 19(6): 1-24 (2023)
[c122]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian
:
Steganography of Steganographic Networks. AAAI 2023: 5178-5186
[c121]Manman Zhang, Yuchen Ma, Ge Luo, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Identifying the Style of Chatting. APSIPA ASC 2023: 1085-1092
[c120]Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian
, Hsunfang Cho, Xinpeng Zhang:
StyleStegan: Leak-free Style Transfer Based on Feature Steganography. APSIPA ASC 2023: 1443-1450
[c119]Yusheng Guo, Nan Zhong, Zhenxing Qian
, Xinpeng Zhang, Hsunfang Cho:
Preemptive Image Protection against Steganography. APSIPA ASC 2023: 1923-1930
[c118]Ge Luo
, Manman Zhang
, Yuchen Ma
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts. CIKM 2023: 1687-1696
[c117]Xiaoxiao Hu
, Qichao Ying, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. ICCV 2023: 22377-22387
[c116]Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Image Protection for Robust Cropping Localization and Recovery. ICME 2023: 1193-1198
[c115]Yuwei Zeng, Jingxuan Tan, Zhengxin You, Zhenxing Qian
, Xinpeng Zhang:
Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor. ICME 2023: 1211-1216
[c114]Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang:
Multimodal Fake News Detection via CLIP-Guided Learning. ICME 2023: 2825-2830
[c113]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18
[c112]Xiaoling He
, Yuanding Zhou
, Chuan Qin
, Zhenxing Qian
, Xinpeng Zhang
:
PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation. IWDW 2023: 79-94
[c111]Yangming Zhou
, Yuzhou Yang
, Qichao Ying
, Zhenxing Qian
, Xinpeng Zhang
:
Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion. ICMR 2023: 343-352
[c110]Qichao Ying
, Jiaxin Liu
, Sheng Li
, Haisheng Xu
, Zhenxing Qian
, Xinpeng Zhang
:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. ACM Multimedia 2023: 737-746
[c109]Haoyue Wang
, Sheng Li
, Silu Cao
, Rui Yang
, Jishen Zeng
, Zhenxing Qian
, Xinpeng Zhang
:
On Physically Occluded Fake Identity Document Detection. ACM Multimedia 2023: 1556-1564
[c108]Jingxuan Tan
, Nan Zhong
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
:
Deep Neural Network Watermarking against Model Extraction Attack. ACM Multimedia 2023: 1588-1597
[c107]Cheng Xiong
, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Flexible and Secure Watermarking for Latent Diffusion Model. ACM Multimedia 2023: 1668-1676
[c106]Manman Zhang
, Ge Luo
, Yuchen Ma
, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts. ACM Multimedia 2023: 4688-4696
[c105]Quan Wang
, Yanli Ren
, Xinpeng Zhang
, Guorui Feng
:
Interactive Image Style Transfer Guided by Graffiti. ACM Multimedia 2023: 6685-6694
[c104]Quan Wang
, Sheng Li
, Xinpeng Zhang
, Guorui Feng
:
Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images. ACM Multimedia 2023: 6928-6937
[c103]Gaozhi Liu
, Yichao Si
, Zhenxing Qian
, Xinpeng Zhang
, Sheng Li
, Wanli Peng
:
WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs. ACM Multimedia 2023: 7274-7282
[c102]Yusheng Guo
, Nan Zhong
, Zhenxing Qian
, Xinpeng Zhang
:
Physical Invisible Backdoor Based on Camera Imaging. ACM Multimedia 2023: 7817-7825
[c101]Zicong Luo
, Sheng Li
, Guobiao Li
, Zhenxing Qian
, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. ACM Multimedia 2023: 7943-7951
[i56]Le Feng, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Trojaning semi-supervised learning model via poisoning wild images on the web. CoRR abs/2301.00435 (2023)
[i55]Gongyang Li, Zhi Liu, Xinpeng Zhang, Weisi Lin:
Lightweight Salient Object Detection in Optical Remote Sensing Images via Semantic Matching and Edge Alignment. CoRR abs/2301.02778 (2023)
[i54]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian
:
Steganography of Steganographic Networks. CoRR abs/2302.14521 (2023)
[i53]Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang:
Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion. CoRR abs/2304.00827 (2023)
[i52]Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. CoRR abs/2304.13297 (2023)
[i51]Ping Wei, Qing Zhou, Zichi Wang, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
Generative Steganography Diffusion. CoRR abs/2305.03472 (2023)
[i50]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Generative Steganographic Flow. CoRR abs/2305.05838 (2023)
[i49]Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao:
Decision-based iterative fragile watermarking for model integrity verification. CoRR abs/2305.09684 (2023)
[i48]Li Zhang, Yong Liu, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Suppressing High-Frequency Artifacts. CoRR abs/2305.12391 (2023)
[i47]Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
StyleStegan: Leak-free Style Transfer Based on Feature Steganography. CoRR abs/2307.00225 (2023)
[i46]Guobiao Li, Sheng Li, Meiling Li, Zhenxing Qian, Xinpeng Zhang:
Towards Deep Network Steganography: From Networks to Networks. CoRR abs/2307.03444 (2023)
[i45]Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. CoRR abs/2307.10642 (2023)
[i44]Xiaoxiao Hu, Qichao Ying, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. CoRR abs/2307.16418 (2023)
[i43]Yusheng Guo, Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Physical Invisible Backdoor Based on Camera Imaging. CoRR abs/2309.07428 (2023)
[i42]Gongyang Li, Zhen Bai, Zhi Liu, Xinpeng Zhang, Haibin Ling:
Salient Object Detection in Optical Remote Sensing Images Driven by Transformer. CoRR abs/2309.08206 (2023)
[i41]Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian
, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. CoRR abs/2309.09700 (2023)
[i40]Xingdong Ren, Tianxing Zhang, Hanzhou Wu, Xinpeng Zhang, Yinggui Wang, Guangling Sun:
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor. CoRR abs/2310.03380 (2023)
[i39]Nan Zhong, Yiran Xu, Zhenxing Qian
, Xinpeng Zhang:
Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection. CoRR abs/2311.12397 (2023)
[i38]Ge Luo, Junqiang Huang, Manman Zhang, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. CoRR abs/2311.13619 (2023)
[i37]Yusheng Guo, Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Model Copyright Protection in Buyer-seller Environment. CoRR abs/2312.05262 (2023)- 2022
[j192]Yanli Ren
, Yerong Li
, Guorui Feng
, Xinpeng Zhang
:
Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning. IEEE Internet Things J. 9(24): 24933-24948 (2022)
[j191]Le Feng, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Robust backdoor injection with the capability of resisting network transfer. Inf. Sci. 612: 594-611 (2022)
[j190]Mingjie Li, Hanzhou Wu
, Xinpeng Zhang:
Generating traceable adversarial text examples by watermarking in the semantic space. J. Electronic Imaging 31(6) (2022)
[j189]Guangling Sun, Haoqi Hu, Xinpeng Zhang, Xiaofeng Lu:
A fully supervised universal adversarial perturbations and the progressive optimization. J. Intell. Fuzzy Syst. 42(6): 4959-4968 (2022)
[j188]Biao Yi
, Hanzhou Wu
, Guorui Feng
, Xinpeng Zhang
:
ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling. IEEE Signal Process. Lett. 29: 687-691 (2022)
[j187]Fengyong Li
, Yishu Zeng
, Xinpeng Zhang
, Chuan Qin
:
Ensemble Stego Selection for Enhancing Image Steganography. IEEE Signal Process. Lett. 29: 702-706 (2022)
[j186]Ping Wei
, Zhiying Zhu
, Ge Luo, Zhenxing Qian
, Xinpeng Zhang
:
Breaking Robust Data Hiding in Online Social Networks. IEEE Signal Process. Lett. 29: 2682-2686 (2022)
[j185]Zhiying Zhu
, Hang Zhou, Siyuan Xing, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Perceptual Hash of Neural Networks. Symmetry 14(4): 810 (2022)
[j184]Zichi Wang
, Guorui Feng
, Xinpeng Zhang
:
Repeatable Data Hiding: Towards the Reusability of Digital Images. IEEE Trans. Circuits Syst. Video Technol. 32(1): 135-146 (2022)
[j183]Chunqiang Yu
, Xianquan Zhang
, Xinpeng Zhang
, Guoxiang Li, Zhenjun Tang
:
Reversible Data Hiding With Hierarchical Embedding for Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(2): 451-466 (2022)
[j182]Yushu Zhang
, Ruoyu Zhao, Xiangli Xiao
, Rushi Lan
, Zhe Liu
, Xinpeng Zhang
:
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3): 947-961 (2022)
[j181]Jianquan Yang
, Guopu Zhu
, Yao Luo, Sam Kwong
, Xinpeng Zhang
, Yicong Zhou
:
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1006-1019 (2022)
[j180]Wennan Huan, Sheng Li
, Zhenxing Qian
, Xinpeng Zhang
:
Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1955-1965 (2022)
[j179]Haorui Wu, Xiaolong Li
, Xiangyang Luo
, Xinpeng Zhang
, Yao Zhao
:
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5989-6001 (2022)
[j178]Mingji Yu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(10): 7241-7254 (2022)
[j177]Mengzhu Yu
, Zhenjun Tang
, Xianquan Zhang
, Bineng Zhong
, Xinpeng Zhang
:
Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7559-7574 (2022)
[j176]Fengyong Li
, Zhen Qi, Xinpeng Zhang
, Chuan Qin
:
JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8849-8863 (2022)
[j175]Yang Du
, Zhaoxia Yin
, Xinpeng Zhang
:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. IEEE Trans. Dependable Secur. Comput. 19(2): 1420-1433 (2022)
[j174]Xinran Li
, Chuan Qin
, Zichi Wang
, Zhenxing Qian
, Xinpeng Zhang
:
Unified Performance Evaluation Method for Perceptual Image Hashing. IEEE Trans. Inf. Forensics Secur. 17: 1404-1419 (2022)
[j173]Yalan Qin
, Hanzhou Wu
, Xinpeng Zhang
, Guorui Feng
:
Semi-Supervised Structured Subspace Learning for Multi-View Clustering. IEEE Trans. Image Process. 31: 1-14 (2022)
[j172]Heng Yao
, Mian Zou
, Chuan Qin
, Xinpeng Zhang
:
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints. IEEE Trans. Multim. 24: 640-654 (2022)
[j171]Feng Ding, Guopu Zhu
, Yingcan Li, Xinpeng Zhang
, Pradeep K. Atrey
, Siwei Lyu
:
Anti-Forensics for Face Swapping Videos via Adversarial Training. IEEE Trans. Multim. 24: 3429-3441 (2022)
[j170]Quan Wang
, Sheng Li, Xinpeng Zhang, Guorui Feng
:
Multi-granularity Brushstrokes Network for Universal Style Transfer. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 107:1-107:17 (2022)
[c100]Baogen Zhang, Sheng Li, Guorui Feng, Zhenxing Qian
, Xinpeng Zhang:
Patch Diffusion: A General Module for Face Manipulation Detection. AAAI 2022: 3243-3251
[c99]Meiling Li
, Nan Zhong, Xinpeng Zhang, Zhenxing Qian
, Sheng Li:
Object-Oriented Backdoor Attack Against Image Captioning. ICASSP 2022: 2864-2868
[c98]Le Feng, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Stealthy Backdoor Attack with Adversarial Training. ICASSP 2022: 2969-2973
[c97]Guobiao Li, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Encryption Resistant Deep Neural Network Watermarking. ICASSP 2022: 3064-3068
[c96]Biao Yi
, Hanzhou Wu
, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model For Efficient Linguistic Steganalysis. ICASSP 2022: 3074-3078
[c95]Ge Luo, Ping Wei, Shuwen Zhu, Xinpeng Zhang, Zhenxing Qian
, Sheng Li:
Image Steganalysis with Convolutional Vision Transformer. ICASSP 2022: 3089-3093
[c94]Qi Song, Sheng Li, Ping Wei, Ge Luo, Xinpeng Zhang, Zhenxing Qian
:
Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation. ICASSP 2022: 6587-6591
[c93]Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian
, Xinpeng Zhang:
Hiding Images Into Images with Real-World Robustness. ICIP 2022: 111-115
[c92]Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
RWN: Robust Watermarking Network for Image Cropping Localization. ICIP 2022: 301-305
[c91]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural Network Fragile watermarking With No Model Performance Degradation. ICIP 2022: 3958-3962
[c90]Kejiang Chen
, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Invertible Image Dataset Protection. ICME 2022: 1-6
[c89]Le Feng, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Unlabeled Backdoor Poisoning in Semi-Supervised Learning. ICME 2022: 1-6
[c88]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian
, Sheng Li:
Generative Steganographic Flow. ICME 2022: 1-6
[c87]Li Zhang
, Yong Liu, Shaoteng Liu
, Tianshu Yang, Yexin Wang, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Based on Human Visual System. IFTC 2022: 136-149
[c86]Wen Yin, Zhaoxia Yin
, Xinpeng Zhang, Bin Luo:
On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy". IFTC 2022: 512-524
[c85]Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Imperceptible Backdoor Attack: From Input Space to Feature Representation. IJCAI 2022: 1736-1742
[c84]Zhuowen Yuan
, Zhengxin You, Sheng Li, Zhenxing Qian
, Xinpeng Zhang, Alex C. Kot:
On Generating Identifiable Virtual Faces. ACM Multimedia 2022: 1465-1473
[c83]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian
, Qing Zhou:
Generative Steganography Network. ACM Multimedia 2022: 1621-1629
[c82]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. ACM Multimedia 2022: 2834-2842
[c81]Cheng Xiong
, Guorui Feng, Xinran Li, Xinpeng Zhang, Chuan Qin:
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. ACM Multimedia 2022: 2881-2889
[c80]Yusheng Guo, Zhenxing Qian
, Xinpeng Zhang:
Hiding Function with Neural Networks. MMSP 2022: 1-5
[c79]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Model Hashing: Towards Neural Network Model Authentication. MMSP 2022: 1-5
[c78]Gaozhi Liu, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
HF-Defend: Defending Against Adversarial Examples Based on Halftoning. MMSP 2022: 1-6
[c77]Ziyun Yang, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Multi-source Data Hiding in Neural Networks. MMSP 2022: 1-6
[c76]Yangming Zhou, Qichao Ying, Yifei Wang, Xiangyu Zhang, Zhenxing Qian
, Xinpeng Zhang:
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness. MMSP 2022: 1-6
[c75]Haoyu Chen, Linqi Song, Zhenxing Qian, Xinpeng Zhang, Kede Ma:
Hiding Images in Deep Probabilistic Models. NeurIPS 2022
[i36]Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. CoRR abs/2203.03795 (2022)
[i35]Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Imperceptible Backdoor Attack: From Input Space to Feature Representation. CoRR abs/2205.03190 (2022)
[i34]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng
:
Deniable Steganography. CoRR abs/2205.12587 (2022)
[i33]Yangming Zhou, Qichao Ying, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Multimodal Fake News Detection via CLIP-Guided Learning. CoRR abs/2205.14304 (2022)
[i32]Yifei Wang, Qichao Ying, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion. CoRR abs/2206.01094 (2022)
[i31]Yangming Zhou, Qichao Ying, Xiangyu Zhang, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness. CoRR abs/2207.03409 (2022)
[i30]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. CoRR abs/2207.10292 (2022)
[i29]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian
, Qing Zhou:
Generative Steganography Network. CoRR abs/2207.13867 (2022)
[i28]Yong Liu, Hanzhou Wu, Xinpeng Zhang:
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering. CoRR abs/2208.03944 (2022)
[i27]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural network fragile watermarking with no model performance degradation. CoRR abs/2208.07585 (2022)
[i26]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. CoRR abs/2209.08884 (2022)
[i25]Li Zhang, Yong Liu, Shaoteng Liu, Tianshu Yang, Yexin Wang, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Based on Human Visual System. CoRR abs/2209.15268 (2022)
[i24]Haoyu Chen, Linqi Song, Zhenxing Qian
, Xinpeng Zhang, Kede Ma:
Hiding Images in Deep Probabilistic Models. CoRR abs/2210.02257 (2022)
[i23]Gongyang Li, Yike Wang, Zhi Liu, Xinpeng Zhang, Dan Zeng:
RGB-T Semantic Segmentation with Location, Activation, and Sharpening. CoRR abs/2210.14530 (2022)
[i22]Qichao Ying, Hang Zhou, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Learning to Immunize Images for Tamper Localization and Self-Recovery. CoRR abs/2210.15902 (2022)
[i21]Haoyue Wang, Meiling Li, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Exploring Depth Information for Face Manipulation Detection. CoRR abs/2212.14230 (2022)- 2021
[j169]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021)
[j168]Zichi Wang, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]. IEEE Comput. Intell. Mag. 16(4): 70-84 (2021)
[j167]Yanli Ren
, Xiao Xu, Guorui Feng
, Xinpeng Zhang:
Non-Interactive and secure outsourcing of PCA-Based face recognition. Comput. Secur. 110: 102416 (2021)
[j166]Yanyang Guo, Hanzhou Wu
, Xinpeng Zhang:
Steganographic visual story with mutual-perceived joint attention. EURASIP J. Image Video Process. 2021(1): 5 (2021)
[j165]Zichi Wang
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021)
[j164]Zhiying Zhu
, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Destroying robust steganography in online social networks. Inf. Sci. 581: 605-619 (2021)
[j163]Yanli Ren
, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58: 102698 (2021)
[j162]Zhiying Zhu
, Qichao Ying, Zhenxing Qian
, Xinpeng Zhang:
Steganography in animated emoji using self-reference. Multim. Syst. 27(3): 331-340 (2021)
[j161]Zhaoguang Pan, Yanli Ren
, Xinpeng Zhang:
Low-complexity fake face detection based on forensic similarity. Multim. Syst. 27(3): 353-361 (2021)
[j160]Lingzan Yu
, Yanli Ren
, Guorui Feng
, Xinpeng Zhang
:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. Secur. Commun. Networks 2021: 6184920:1-6184920:14 (2021)
[j159]Hanzhou Wu
, Biao Yi
, Feng Ding
, Guorui Feng
, Xinpeng Zhang
:
Linguistic Steganalysis With Graph Neural Networks. IEEE Signal Process. Lett. 28: 558-562 (2021)
[j158]Qiangjie Li, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Embedding Probability Guided Network for Image Steganalysis. IEEE Signal Process. Lett. 28: 1095-1099 (2021)
[j157]Yi Luo, Guorui Feng
, Xinpeng Zhang
:
Hierarchical Authorization of Convolutional Neural Networks for Multi-User. IEEE Signal Process. Lett. 28: 1560-1564 (2021)
[j156]Jiahao Zhu, Yushu Zhang
, Xinpeng Zhang
, Xiaochun Cao:
Gaussian Model for 3D Mesh Steganography. IEEE Signal Process. Lett. 28: 1729-1733 (2021)
[j155]Chuan Qin
, Liang Wu, Xinpeng Zhang
, Guorui Feng
:
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval. IEEE Signal Process. Lett. 28: 1893-1897 (2021)
[j154]Haoqi Hu, Xiaofeng Lu, Xinpeng Zhang
, Tianxing Zhang, Guangling Sun
:
Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers. IEEE Signal Process. Lett. 28: 1923-1927 (2021)
[j153]Yanli Ren
, Min Dong, Zhenxing Qian
, Xinpeng Zhang
, Guorui Feng
:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 9(1): 145-154 (2021)
[j152]Nan Zhong
, Zhenxing Qian
, Zichi Wang
, Xinpeng Zhang
, Xiaolong Li
:
Batch Steganography via Generative Network. IEEE Trans. Circuits Syst. Video Technol. 31(1): 88-97 (2021)
[j151]Yingqiang Qiu
, Zhenxing Qian
, Han He, Hui Tian
, Xinpeng Zhang
:
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension. IEEE Trans. Circuits Syst. Video Technol. 31(4): 1380-1394 (2021)
[j150]Xun Zhu
, Sheng Li
, Xinpeng Zhang
, Haoliang Li
, Alex C. Kot
:
Detection of Spoofing Medium Contours for Face Anti-Spoofing. IEEE Trans. Circuits Syst. Video Technol. 31(5): 2039-2045 (2021)
[j149]Mengyao Xiao
, Xiaolong Li
, Bin Ma
, Xinpeng Zhang
, Yao Zhao
:
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2535-2546 (2021)
[j148]Hanzhou Wu
, Gen Liu, Yuwei Yao, Xinpeng Zhang
:
Watermarking Neural Networks With Watermarked Images. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2591-2601 (2021)
[j147]Xuehu Yan
, Yuliang Lu, Ching-Nung Yang
, Xinpeng Zhang
, Shudong Wang:
A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2896-2908 (2021)
[j146]Chuan Qin
, Enli Liu, Guorui Feng
, Xinpeng Zhang
:
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4523-4537 (2021)
[j145]Shaofeng Li
, Minhui Xue
, Benjamin Zi Hao Zhao, Haojin Zhu
, Xinpeng Zhang
:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. IEEE Trans. Dependable Secur. Comput. 18(5): 2088-2105 (2021)
[c74]Gen Liu, Hanzhou Wu, Xinpeng Zhang:
Covert Communication via Modulating Soft Label of Neural Network. ICAIS (2) 2021: 349-359
[c73]Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian
:
On Generating JPEG Adversarial Images. ICME 2021: 1-6
[c72]Zhengxin You, Sheng Li, Zhenxing Qian
, Xinpeng Zhang:
Reversible Privacy-Preserving Recognition. ICME 2021: 1-6
[c71]Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Undetectable Adversarial Examples Based on Microscopical Regularization. ICME 2021: 1-6
[c70]Xiangyu Zhao, Hanzhou Wu
, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. ISDFS 2021: 1-6
[c69]Renjie Zhu, Ping Wei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian
:
Fragile Neural Network Watermarking with Trigger Image Set. KSEM 2021: 280-293
[c68]Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, Zhenxing Qian
:
Diffusing the Liveness Cues for Face Anti-spoofing. ACM Multimedia 2021: 1636-1644
[c67]Nan Zhong, Zhenxing Qian
, Xinpeng Zhang:
Deep Neural Network Retrieval. ACM Multimedia 2021: 3455-3463
[c66]Qichao Ying, Zhenxing Qian
, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li:
From Image to Imuge: Immunized Image Generation. ACM Multimedia 2021: 3565-3573
[c65]Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu
, Xinpeng Zhang:
Structural Watermarking to Deep Neural Networks via Network Channel Pruning. WIFS 2021: 1-6
[i20]Yalan Qin, Guorui Feng, Hanzhou Wu, Yanli Ren, Xinpeng Zhang:
Orientation Convolutional Networks for Image Recognition. CoRR abs/2102.01523 (2021)
[i19]Hanzhou Wu, Gen Liu, Xinpeng Zhang:
Hiding Data Hiding. CoRR abs/2102.06826 (2021)
[i18]Yingqiang Qiu, Xin Chen, Qichao Ying, Huanqiang Zeng, Zhenxing Qian, Xinpeng Zhang:
High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding. CoRR abs/2102.12613 (2021)
[i17]Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang:
Structural Watermarking to Deep Neural Networks via Network Channel Pruning. CoRR abs/2107.08688 (2021)
[i16]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study. CoRR abs/2107.12168 (2021)
[i15]Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
Hiding Images into Images with Real-world Robustness. CoRR abs/2110.05689 (2021)
[i14]Zhuowen Yuan, Sheng Li, Xinpeng Zhang, Zhenxin Qian, Alex C. Kot:
On Generating Identifiable Virtual Faces. CoRR abs/2110.07986 (2021)
[i13]Mingjie Li, Hanzhou Wu, Xinpeng Zhang:
Generating Watermarked Adversarial Texts. CoRR abs/2110.12948 (2021)
[i12]Qichao Ying, Zhenxing Qian, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li:
From Image to Imuge: Immunized Image Generation. CoRR abs/2110.14196 (2021)
[i11]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. CoRR abs/2112.14420 (2021)- 2020
[j144]Xianji Cai, Yanli Ren
, Xinpeng Zhang
:
Privacy-Protected Deletable Blockchain. IEEE Access 8: 6060-6070 (2020)
[j143]Kangli Hao, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Iris Segmentation Using Feature Channel Optimization for Noisy Environments. Cogn. Comput. 12(6): 1205-1216 (2020)
[j142]Jiahuan He, Qichao Ying, Zhenxing Qian
, Guorui Feng, Xinpeng Zhang:
Semi-structured data protection scheme based on robust watermarking. EURASIP J. Image Video Process. 2020(1): 12 (2020)
[j141]Huaqi Wang, Zhenxing Qian
, Guorui Feng, Xinpeng Zhang:
Defeating data hiding in social networks using generative adversarial network. EURASIP J. Image Video Process. 2020(1): 30 (2020)
[j140]Mengtian Xu, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 7(9): 8547-8558 (2020)
[j139]Liyun Dou, Zhenxing Qian
, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Anti-forensics of diffusion-based image inpainting. J. Electronic Imaging 29(4): 043026 (2020)
[j138]Qingyang Liu, Hanzhou Wu
, Xinpeng Zhang:
Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding. Multim. Tools Appl. 79(43-44): 32935-32955 (2020)
[j137]Yingqiang Qiu
, Zhenxing Qian
, Huanqiang Zeng, Xiaodan Lin, Xinpeng Zhang:
Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process. 167 (2020)
[j136]Heng Yao
, Hongbin Wei, Chuan Qin
, Xinpeng Zhang:
An improved first quantization matrix estimation for nonaligned double compressed JPEG images. Signal Process. 170: 107430 (2020)
[j135]Zhiyang Jin
, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Feature extraction optimization of JPEG steganalysis based on residual images. Signal Process. 170: 107455 (2020)
[j134]Zichi Wang
, Xinpeng Zhang
, Zhenxing Qian
:
Practical Cover Selection for Steganography. IEEE Signal Process. Lett. 27: 71-75 (2020)
[j133]Lingchen Zhou
, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
On Security Enhancement of Steganography via Generative Adversarial Image. IEEE Signal Process. Lett. 27: 166-170 (2020)
[j132]Yanli Ren
, Xinpeng Zhang
, Guorui Feng
, Zhenxing Qian
, Fengyong Li
:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020)
[j131]Guorui Feng
, Xinpeng Zhang
, Yanli Ren
, Zhenxing Qian
, Sheng Li
:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020)
[j130]Sheng Li
, Xinpeng Zhang
, Zhenxing Qian
, Guorui Feng
, Yanli Ren
:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020)
[j129]Yushu Zhang
, Qi He, Guo Chen
, Xinpeng Zhang
, Yong Xiang
:
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. IEEE Trans. Ind. Informatics 16(12): 7566-7578 (2020)
[j128]Zhaoxia Yin
, Youzhi Xiang
, Xinpeng Zhang
:
Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans. Multim. 22(4): 874-884 (2020)
[j127]Jingzhi Lin
, Zhenxing Qian
, Zichi Wang, Xinpeng Zhang, Guorui Feng:
A New Steganography Method for Dynamic GIF Images Based on Palette Sort. Wirel. Commun. Mob. Comput. 2020: 8812087:1-8812087:13 (2020)
[c64]Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech
:
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. EUSIPCO 2020: 725-729
[c63]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. IWDW 2020: 31-40
[c62]Le Feng
, Xinpeng Zhang:
Watermarking Neural Network with Compensation Mechanism. KSEM (2) 2020: 363-375
[c61]Huixian Kang, Hanzhou Wu, Xinpeng Zhang:
Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords. Media Watermarking, Security, and Forensics 2020
[c60]Jiangfeng Wang, Hanzhou Wu, Xinpeng Zhang, Yuwei Yao:
Watermarking in Deep Neural Networks via Error Back-propagation. Media Watermarking, Security, and Forensics 2020
[c59]Hanzhou Wu, Xinpeng Zhang:
Reducing Invertible Embedding Distortion Using Graph Matching Model. Media Watermarking, Security, and Forensics 2020
[c58]Hanzhou Wu
, Yuwei Yao, Xinpeng Zhang, Jiangfeng Wang:
Towards Criminal Sketching with Generative Adversarial Network. MMSP 2020: 1-5
[c57]Zhenxing Qian
, Zichi Wang
, Xinpeng Zhang
:
Data Computing in Covert Domain. SPDE 2020: 535-545
[i10]Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Computing in Covert Domain Using Data Hiding. CoRR abs/2002.06794 (2020)
[i9]Xiangyu Zhao, Hanzhou Wu
, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. CoRR abs/2011.00512 (2020)
[i8]Xinran Li, Chuan Qin, Zhenxing Qian, Heng Yao, Xinpeng Zhang:
Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis. CoRR abs/2012.04312 (2020)
2010 – 2019
- 2019
[j126]Qichao Ying
, Zhenxing Qian
, Xinpeng Zhang, Dengpan Ye
:
Reversible Data Hiding With Image Enhancement Using Histogram Shifting. IEEE Access 7: 46506-46521 (2019)
[j125]Zichi Wang
, Xinpeng Zhang:
Secure Cover Selection for Steganography. IEEE Access 7: 57857-57867 (2019)
[j124]Zichi Wang
, Shujun Li
, Xinpeng Zhang:
Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access 7: 168914-168921 (2019)
[j123]Yimin Wang
, Lingsheng Kong
, Zhenxing Qian
, Guorui Feng
, Xinpeng Zhang
, Jianmin Zheng
:
Breaking Permutation-Based Mesh Steganography and Security Improvement. IEEE Access 7: 183300-183310 (2019)
[j122]Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. Int. J. Digit. Crime Forensics 11(1): 90-99 (2019)
[j121]Zhenxing Qian
, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. Int. J. Digit. Crime Forensics 11(1): 114-125 (2019)
[j120]Chuan Qin
, Xiaokang Qian, Wien Hong
, Xinpeng Zhang:
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487: 176-192 (2019)
[j119]Nan Zhong, Zhenxing Qian
, Zichi Wang, Xinpeng Zhang:
Steganography in stylized images. J. Electronic Imaging 28(3): 033005 (2019)
[j118]Chuan Qin
, Zhenxing Qian
, Guorui Feng, Xinpeng Zhang:
Special issue on real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(3): 559-563 (2019)
[j117]Chuan Qin
, Zhenxing Qian
, Guorui Feng, Xinpeng Zhang:
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(4): 811-812 (2019)
[j116]Binghua Mao, Zichi Wang, Xinpeng Zhang:
基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain). 计算机科学 46(1): 196-200 (2019)
[j115]Ling Du
, Wei Zhang, Huazhu Fu
, Wenqi Ren, Xinpeng Zhang:
An efficient privacy protection scheme for data security in video surveillance. J. Vis. Commun. Image Represent. 59: 347-362 (2019)
[j114]Haihua Liang, Xinpeng Zhang, Hang Cheng:
Huffman-code based retrieval for encrypted JPEG images. J. Vis. Commun. Image Represent. 61: 149-156 (2019)
[j113]Ximei Zeng, Guorui Feng, Xinpeng Zhang:
Detection of double JPEG compression using modified DenseNet model. Multim. Tools Appl. 78(7): 8183-8196 (2019)
[j112]Yujie Jia, Zhaoxia Yin
, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163: 238-246 (2019)
[j111]Danni Ni, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Selective Ensemble Classification of Image Steganalysis Via Deep Q Network. IEEE Signal Process. Lett. 26(7): 1065-1069 (2019)
[j110]Zhenxing Qian
, Haisheng Xu
, Xiangyang Luo
, Xinpeng Zhang:
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(2): 351-362 (2019)
[j109]Jinyuan Tao
, Sheng Li
, Xinpeng Zhang
, Zichi Wang
:
Towards Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2): 594-600 (2019)
[j108]Chuan Qin
, Qing Zhou
, Fang Cao
, Jing Dong, Xinpeng Zhang
:
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting. IEEE Trans. Circuits Syst. Video Technol. 29(11): 3341-3355 (2019)
[j107]Sheng Li
, Xinpeng Zhang
:
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images. IEEE Trans. Image Process. 28(3): 1482-1497 (2019)
[c56]Zichi Wang, Zhenxing Qian
, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. ICAIS (3) 2019: 115-127
[c55]Qiangjie Li, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Ensemble Steganalysis Based on Deep Residual Network. IWDW 2019: 84-95
[c54]Fang Cao, Tianwei Wu, Chuan Qin
, Zhenxing Qian
, Xinpeng Zhang:
New Paradigm for Self-embedding Image Watermarking with Poisson Equation. IWDW 2019: 184-191
[c53]Mengtian Xu, Hanzhou Wu
, Guorui Feng, Xinpeng Zhang, Feng Ding:
Broadcasting Steganography in the Blockchain. IWDW 2019: 256-267
[e1]Rémi Cogranne, Luisa Verdoliva, Siwei Lyu, Juan Ramón Troncoso-Pastoriza, Xinpeng Zhang:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2019, Paris, France, July 3-5, 2019. ACM 2019, ISBN 978-1-4503-6821-6 [contents]
[i7]Hanzhou Wu, Xinpeng Zhang:
Game-theoretic Analysis to Content-adaptive Reversible Watermarking. CoRR abs/1905.01674 (2019)
[i6]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. CoRR abs/1905.05365 (2019)
[i5]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution. CoRR abs/1905.05627 (2019)- 2018
[j106]Fengyong Li
, Kui Wu, Xinpeng Zhang, Jiang Yu, Jingsheng Lei, Mi Wen:
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. IEEE Access 6: 29912-29925 (2018)
[j105]Zichi Wang
, Zhenxing Qian
, Xinpeng Zhang, Min Yang, Dengpan Ye
:
On Improving Distortion Functions for JPEG Steganography. IEEE Access 6: 74917-74930 (2018)
[j104]Heng Yao, Chuan Qin
, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018)
[j103]Chuan Qin
, Xueqin Chen, Xiangyang Luo, Xinpeng Zhang, Xingming Sun:
Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423: 284-302 (2018)
[j102]Zhenxing Qian
, Lin Pan, Nannan Huang, Xinpeng Zhang:
Constructive Steganography by Tangles. KSII Trans. Internet Inf. Syst. 12(8): 3911-3925 (2018)
[j101]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018)
[j100]Yingqiang Qiu, Han He, Zhenxing Qian
, Sheng Li, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream using alternative embedding. J. Vis. Commun. Image Represent. 52: 86-91 (2018)
[j99]Chuan Qin
, Weiming Zhang, Xinpeng Zhang:
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing. Multim. Tools Appl. 77(14): 17853-17859 (2018)
[j98]Qingde Wei, Zhaoxia Yin, Zichi Wang, Xinpeng Zhang:
Distortion function based on residual blocks for JPEG steganography. Multim. Tools Appl. 77(14): 17875-17888 (2018)
[j97]Jinpeng Lv, Sheng Li, Xinpeng Zhang:
A novel auxiliary data construction scheme for reversible data hiding in JPEG images. Multim. Tools Appl. 77(14): 18029-18041 (2018)
[j96]Zhao-Xia Yin, Xuejing Niu, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible data hiding in encrypted AMBTC images. Multim. Tools Appl. 77(14): 18067-18083 (2018)
[j95]Zhenxing Qian
, Kim-Kwang Raymond Choo
, Rémi Cogranne
, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. Secur. Commun. Networks 2018: 6390945:1-6390945:2 (2018)
[j94]Haihua Liang
, Xinpeng Zhang, Hang Cheng, Qiuhan Wei:
Secure and Efficient Image Retrieval over Encrypted Cloud Data. Secur. Commun. Networks 2018: 7915393:1-7915393:14 (2018)
[j93]Chuan Qin
, Wei Zhang, Fang Cao, Xinpeng Zhang, Chin-Chen Chang
:
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153: 109-122 (2018)
[j92]Zichi Wang
, Xinpeng Zhang
, Zhaoxia Yin:
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization. IEEE Signal Process. Lett. 25(10): 1530-1534 (2018)
[j91]Fengyong Li
, Kui Wu, Xinpeng Zhang, Jingsheng Lei, Mi Wen:
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles. Symmetry 10(5): 128 (2018)
[j90]Zhenxing Qian
, Hang Zhou, Xinpeng Zhang
, Weiming Zhang
:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Dependable Secur. Comput. 15(6): 1055-1067 (2018)
[j89]Chuntao Wang
, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018)
[c52]Shujun Li
, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37
[c51]Yi Puyang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Embedding and Scrambling Method Based on JPEG Images. ICCCS (4) 2018: 372-381
[c50]Zhenxing Qian
, Lin Pan, Sheng Li, Xinpeng Zhang:
Steganography by Constructing Marbling Texture. ICCCS (4) 2018: 428-439
[c49]Yi Puyang, Zhenxing Qian
, Zhaoxia Yin, Xinpeng Zhang:
Style Transferring Based Data Hiding for Color Images. ICCCS (4) 2018: 440-449
[c48]Shaojun Yan, Haihua Liang, Xinpeng Zhang:
Location Privacy-Preserving Scheme Based on Multiple Virtual Maps. ICCCS (5) 2018: 440-452
[c47]Zichi Wang, Zhenxing Qian
, Xinpeng Zhang:
Single Actor Pooled Steganalysis. ICGEC 2018: 339-347
[c46]Zhenxing Qian
, Cheng Huang, Zichi Wang, Xinpeng Zhang:
Breaking CNN-Based Steganalysis. ICGEC 2018: 483-491
[c45]Lina Shi, Zichi Wang, Zhenxing Qian
, Xinpeng Zhang:
Distortion Function for Steganography in Texture Synthesized Images. IIH-MSP (1) 2018: 313-320
[c44]Zhaoxia Yin, Youzhi Xiang, Zhenxing Qian
, Xinpeng Zhang:
Unified Data Hiding and Scrambling Method for JPEG Images. PCM (3) 2018: 373-383
[c43]Yingqiang Qiu, Hangxing Wang, Zichi Wang, Zhenxing Qian
, Gui Feng, Xinpeng Zhang:
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images. WIFS 2018: 1-7
[i4]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018)
[i3]Youzhi Xiang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding. CoRR abs/1812.09499 (2018)- 2017
[j88]Beijing Chen
, Jianhao Yang, Byeungwoo Jeon
, Xinpeng Zhang:
Kernel quaternion principal component analysis and its application in RGB-D object recognition. Neurocomputing 266: 293-303 (2017)
[j87]Min Dong, Yanli Ren, Xinpeng Zhang:
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. KSII Trans. Internet Inf. Syst. 11(7): 3648-3663 (2017)
[j86]Zhao-Xia Yin, Andrew Abel, Jin Tang, Xinpeng Zhang, Bin Luo
:
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multim. Tools Appl. 76(3): 3899-3920 (2017)
[j85]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin
, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017)
[j84]Chuan Qin
, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang:
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138: 280-293 (2017)
[c42]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping. MSN 2017: 84-98
[i2]Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang:
Data hiding in Fingerprint Minutiae Template for Privacy Protection. CoRR abs/1710.00516 (2017)- 2016
[j83]Yun-Qing Shi, Xiaolong Li
, Xinpeng Zhang, Hao-Tian Wu, Bin Ma:
Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4: 3210-3237 (2016)
[j82]Ling Du, Xiaochun Cao, Wei Zhang, Xinpeng Zhang, Na Liu, Jianguo Wei
:
Semi-fragile watermarking for image authentication based on compressive sensing. Sci. China Inf. Sci. 59(5): 059104:1-059104:3 (2016)
[j81]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Identity-Based Encryption with Verifiable Outsourced Revocation. Comput. J. 59(11): 1659-1668 (2016)
[j80]Chuan Qin
, Xueqin Chen, Jing Dong, Xinpeng Zhang:
Perceptual image hashing with selective sampling for salient structure features. Displays 45: 26-37 (2016)
[j79]Hang Cheng
, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016: 1 (2016)
[j78]Chuan Qin
, Huili Wang, Xinpeng Zhang, Xingming Sun:
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373: 233-250 (2016)
[j77]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Hybrid distortion function for JPEG steganography. J. Electronic Imaging 25(5): 050501 (2016)
[j76]Anxin Wu, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent. 34: 103-107 (2016)
[j75]Hang Cheng, Xinpeng Zhang, Jiang Yu, Yuan Zhang:
Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40: 111-117 (2016)
[j74]Zhenxing Qian
, Shu Dai, Fei Jiang, Xinpeng Zhang:
Improved joint reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 40: 732-738 (2016)
[j73]Jiang Yu
, Xinpeng Zhang, Fengyong Li:
Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multim. Tools Appl. 75(21): 13613-13625 (2016)
[j72]Zhenxing Qian
, Xinpeng Zhang, Yanli Ren, Guorui Feng:
Block cipher based separable reversible data hiding in encrypted images. Multim. Tools Appl. 75(21): 13749-13763 (2016)
[j71]Hang Cheng
, Xinpeng Zhang, Jiang Yu:
AC-coefficient histogram-based retrieval for encrypted JPEG images. Multim. Tools Appl. 75(21): 13791-13803 (2016)
[j70]Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:
Digital image steganalysis based on local textural features and double dimensionality reduction. Secur. Commun. Networks 9(8): 729-736 (2016)
[j69]Jiang Yu
, Fengyong Li, Hang Cheng, Xinpeng Zhang:
Spatial Steganalysis Using Contrast of Residuals. IEEE Signal Process. Lett. 23(7): 989-992 (2016)
[j68]Zhenxing Qian
, Xinpeng Zhang, Guorui Feng:
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery. IEEE Signal Process. Lett. 23(11): 1672-1676 (2016)
[j67]Zhenxing Qian
, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4): 636-646 (2016)
[j66]Xinpeng Zhang, Jing Long, Zichi Wang, Hang Cheng:
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1622-1631 (2016)
[c41]Yong Yu
, Yannan Li
, Man Ho Au
, Willy Susilo
, Kim-Kwang Raymond Choo
, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405
[c40]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. AsiaCCS 2016: 293-303
[c39]Hao Zhang, Zhaoxia Yin, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, Bin Luo:
Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images. CloudComp 2016: 196-203
[c38]Zhao-Xia Yin, Andrew Abel, Xinpeng Zhang, Bin Luo
:
Reversible data hiding in encrypted image based on block histogram shifting. ICASSP 2016: 2129-2133
[c37]Zhenxing Qian
, Xinpeng Zhang, Weiming Zhang, Yimin Wang:
Reversible Contrast Enhancement. ICCCS (1) 2016: 18-27
[c36]Beijing Chen, Jianhao Yang, Mengru Ding, Tianliang Liu, Xinpeng Zhang:
Quaternion-type moments combining both color and depth information for RGB-D object recognition. ICPR 2016: 704-708
[c35]Xuejing Niu, Zhao-Xia Yin, Xinpeng Zhang, Jin Tang, Bin Luo
:
Reversible Data Hiding in Encrypted AMBTC Compressed Images. IWDW 2016: 436-445
[c34]Zichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang:
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change. IWDW 2016: 487-493- 2015
[j65]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015)
[j64]Zhenxing Qian
, Xinpeng Zhang, Yanli Ren:
JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26: 9-13 (2015)
[j63]Chuan Qin
, Xinpeng Zhang:
Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31: 154-164 (2015)
[j62]Liquan Shen
, Zhaoyang Zhang, Xinpeng Zhang, Ping An, Zhi Liu
:
Fast TU size decision algorithm for HEVC encoders using Bayesian theorem detection. Signal Process. Image Commun. 32: 121-128 (2015)
[j61]Guorui Feng, Yuan Lan, Xinpeng Zhang, Zhenxing Qian
:
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine. IEEE Trans. Cybern. 45(2): 279-288 (2015)
[c33]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov Process Based Retrieval for Encrypted JPEG Images. ARES 2015: 417-421
[c32]Roland Schmitz, Shujun Li
, Christos Grecos, Xinpeng Zhang:
Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. ACIVS 2015: 474-485
[c31]Xinpeng Zhang, Zichi Wang, Jiang Yu, Zhenxing Qian
:
Reversible visible watermark embedded in encrypted domain. ChinaSIP 2015: 826-830
[c30]Zhao-Xia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, Xinpeng Zhang:
Complete Separable Reversible Data Hiding in Encrypted Image. ICCCS 2015: 101-110
[c29]Yuan Zhang, Xinpeng Zhang, Chuan Qin
, Jiang Yu:
Multiple Description Coding for Encrypted Images. IIH-MSP 2015: 85-88- 2014
[j60]Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. Ann. des Télécommunications 69(7-8): 431-440 (2014)
[j59]Xinpeng Zhang, Chuan Qin
, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. Ann. des Télécommunications 69(7-8): 441-447 (2014)
[j58]Xiyu Han, Zhenxing Qian
, Guorui Feng, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Image Interpolation. Int. J. Digit. Crime Forensics 6(3): 16-29 (2014)
[j57]Roland Schmitz, Shujun Li
, Christos Grecos, Xinpeng Zhang:
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms. Int. J. Multim. Data Eng. Manag. 5(4): 36-52 (2014)
[j56]Yanli Ren, Zhihua Niu, Xinpeng Zhang:
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. Int. J. Netw. Secur. 16(4): 256-264 (2014)
[j55]Liquan Shen, Ping An, Xinpeng Zhang, Zhaoyang Zhang:
Adaptive transform size decision algorithm for high-efficiency video coding inter coding. J. Electronic Imaging 23(4): 043023 (2014)
[j54]Guorui Feng, Haiyan Zhang, Xinpeng Zhang:
Effective feature selection for image steganalysis using extreme learning machine. J. Electronic Imaging 23(6): 063020 (2014)
[j53]Zhenxing Qian
, Xinpeng Zhang:
Improved anti-forensics of JPEG compression. J. Syst. Softw. 91: 100-108 (2014)
[j52]Xinpeng Zhang, Zhenxing Qian
, Guorui Feng, Yanli Ren:
Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2): 322-328 (2014)
[j51]Xinpeng Zhang, Guangling Sun, Liquan Shen, Chuan Qin
:
Compression of encrypted images with multi-layer decomposition. Multim. Tools Appl. 72(1): 489-502 (2014)
[j50]Bin Chen, Guorui Feng, Xinpeng Zhang, Fengyong Li:
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier. Signal Image Video Process. 8(8): 1475-1482 (2014)
[j49]Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian
, Guorui Feng:
Compressing Encrypted Images With Auxiliary Information. IEEE Trans. Multim. 16(5): 1327-1336 (2014)
[j48]Zhenxing Qian
, Xinpeng Zhang, Shuozhong Wang:
Reversible Data Hiding in Encrypted JPEG Bitstream. IEEE Trans. Multim. 16(5): 1486-1491 (2014)
[c28]Xinpeng Zhang, Hang Cheng:
Histogram-based retrieval for encrypted JPEG images. ChinaSIP 2014: 446-449- 2013
[j47]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Practical parallel key-insulated encryption with multiple helper keys. Comput. Math. Appl. 65(9): 1403-1412 (2013)
[j46]Xinpeng Zhang:
Commutative reversible data hiding and encryption. Secur. Commun. Networks 6(11): 1396-1403 (2013)
[j45]Fengyong Li, Xinpeng Zhang, Bin Chen, Guorui Feng:
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Process. Lett. 20(3): 233-236 (2013)
[j44]Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. IEEE Trans. Inf. Forensics Secur. 8(1): 55-63 (2013)
[j43]Xinpeng Zhang:
Reversible Data Hiding With Optimal Value Transfer. IEEE Trans. Multim. 15(2): 316-325 (2013)
[j42]Liquan Shen, Zhi Liu
, Xinpeng Zhang, Wenqiang Zhao, Zhaoyang Zhang:
An Effective CU Size Decision Method for HEVC Encoders. IEEE Trans. Multim. 15(2): 465-470 (2013)
[c27]Roland Schmitz, Shujun Li
, Christos Grecos, Xinpeng Zhang:
Towards More Robust Commutative Watermarking-Encryption of Images. ISM 2013: 283-286- 2012
[j41]Zhenxing Qian
, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85(2): 309-313 (2012)
[j40]Chuan Qin
, Shuozhong Wang, Xinpeng Zhang:
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multim. Tools Appl. 56(3): 469-483 (2012)
[j39]Guorui Feng, Zhenxing Qian
, Xinpeng Zhang:
Evolutionary selection extreme learning machine optimization for regression. Soft Comput. 16(9): 1485-1491 (2012)
[j38]Heng Yao, Shuozhong Wang, Yan Zhao, Xinpeng Zhang:
Detecting Image Forgery Using Perspective Constraints. IEEE Signal Process. Lett. 19(3): 123-126 (2012)
[j37]Guorui Feng, Zhenxing Qian
, Xinpeng Zhang:
Spectrum-estimation based lossless information recovery for sparse array patterns. Telecommun. Syst. 49(2): 163-169 (2012)
[j36]Xinpeng Zhang, Shuozhong Wang:
Efficient data hiding with histogram-preserving property. Telecommun. Syst. 49(2): 179-185 (2012)
[j35]Xinpeng Zhang:
Separable Reversible Data Hiding in Encrypted Image. IEEE Trans. Inf. Forensics Secur. 7(2): 826-832 (2012)
[j34]Xinpeng Zhang, Guorui Feng, Yanli Ren, Zhenxing Qian
:
Scalable Coding of Encrypted Images. IEEE Trans. Image Process. 21(6): 3108-3114 (2012)
[c26]Roland Schmitz, Shujun Li
, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. Communications and Multimedia Security 2012: 117-130
[c25]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. ICDKE 2012: 230-242
[c24]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. ICICS 2012: 479-487
[c23]Zhenxing Qian
, Wenwen Wang, Xinpeng Zhang:
Generalized Quality Assessment of Blocking Artifacts for Compressed Images. IFTC 2012: 110-116
[c22]Xinpeng Zhang, Chuan Qin
, Guangling Sun:
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. IWDW 2012: 358-367
[c21]Guoqing Li, Guangling Sun, Xinpeng Zhang:
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency. NPC 2012: 616-624
[i1]Guangling Sun, Guoqing Li, Xinpeng Zhang:
Robust Degraded Face Recognition Using Enhanced Local Frequency Descriptor and Multi-scale Competition. CoRR abs/1210.1033 (2012)- 2011
[j33]Zhenxing Qian
, Guorui Feng, Xinpeng Zhang, Shuozhong Wang:
Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2): 278-286 (2011)
[j32]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Fundam. Informaticae 106(1): 75-91 (2011)
[j31]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. Intell. Autom. Soft Comput. 17(2): 233-243 (2011)
[j30]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao:
Lexicographical framework for image hashing with implementation based on DCT and NMF. Multim. Tools Appl. 52(2-3): 325-345 (2011)
[j29]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian
, Guorui Feng:
Self-embedding watermark with flexible restoration quality. Multim. Tools Appl. 54(2): 385-395 (2011)
[j28]Xinpeng Zhang:
Reversible Data Hiding in Encrypted Image. IEEE Signal Process. Lett. 18(4): 255-258 (2011)
[j27]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images. IEEE Signal Process. Lett. 18(10): 559-562 (2011)
[j26]Xinpeng Zhang:
Lossy Compression and Iterative Reconstruction for Encrypted Image. IEEE Trans. Inf. Forensics Secur. 6(1): 53-58 (2011)
[j25]Xinpeng Zhang, Zhenxing Qian
, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4): 1223-1232 (2011)
[j24]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian
, Guorui Feng:
Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 20(2): 485-495 (2011)
[c20]Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian
:
Compressing Encrypted Image Using Compressive Sensing. IIH-MSP 2011: 222-225
[c19]Cheonshik Kim
, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang:
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. STA 2011: 130-138- 2010
[j23]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles. Int. J. Found. Comput. Sci. 21(6): 1049-1063 (2010)
[j22]Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. Int. J. Multim. Intell. Secur. 1(2): 191-203 (2010)
[j21]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
New Fuzzy Identity-Based Encryption in the Standard Model. Informatica 21(3): 393-407 (2010)
[j20]Chuan Qin
, Qian Mao, Xinpeng Zhang:
Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes. J. Multim. 5(5): 427-433 (2010)
[j19]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian
, Guorui Feng:
Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12): 3026-3036 (2010)
[j18]Xinpeng Zhang:
Efficient Data Hiding With Plus-Minus One or Two. IEEE Signal Process. Lett. 17(7): 635-638 (2010)
[j17]Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5(3): 507-517 (2010)
[j16]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Near-optimal codes for information embedding in gray-scale signals. IEEE Trans. Inf. Theory 56(3): 1262-1270 (2010)
[c18]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Detection of Image Region-Duplication with Rotation and Scaling Tolerance. ICCCI (1) 2010: 100-108
2000 – 2009
- 2009
[j15]Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:
Steganography Combining Data Decomposition Mechanism and Stego-coding Method. Informatica (Slovenia) 33(1): 41-48 (2009)
[j14]Xinpeng Zhang, Shuozhong Wang:
Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4): 675-679 (2009)
[c17]Zhenxing Qian
, Xinpeng Zhang, Shuozhong Wang:
Matrix Selection in High Payload Embedding. IIH-MSP 2009: 328-331
[c16]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. IWDW 2009: 268-278
[c15]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. MUE 2009: 183-188- 2008
[j13]Xinpeng Zhang, Shuozhong Wang, Zhenyu Zhou:
Multibit Assignment Steganography in Palette Images. IEEE Signal Process. Lett. 15: 553-556 (2008)
[j12]Xinpeng Zhang, Shuozhong Wang:
Fragile Watermarking With Error-Free Restoration Capability. IEEE Trans. Multim. 10(8): 1490-1499 (2008)
[c14]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. Information Hiding 2008: 60-71
[c13]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. IIH-MSP 2008: 397-401
[c12]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. IIH-MSP 2008: 1301-1304- 2007
[j11]Weiming Zhang, Shuozhong Wang, Xinpeng Zhang:
Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE Commun. Lett. 11(8): 680-682 (2007)
[j10]Xinpeng Zhang, Shuozhong Wang:
Watermarking Scheme Capable of Resisting Sensitivity Attack. IEEE Signal Process. Lett. 14(2): 125-128 (2007)
[j9]Xinpeng Zhang, Shuozhong Wang:
Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Process. Lett. 14(10): 727-730 (2007)
[j8]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
A Double Layered "Plus-Minus One" Data Embedding Scheme. IEEE Signal Process. Lett. 14(11): 848-851 (2007)
[c11]Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360- 2006
[j7]Xinpeng Zhang, Shuozhong Wang:
Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun. Lett. 10(11): 781-783 (2006)
[j6]Xinpeng Zhang, Shuozhong Wang:
Dynamical running coding in digital steganography. IEEE Signal Process. Lett. 13(3): 165-168 (2006)
[c10]Chuan Qin
, Wei-Bin Lee, Xinpeng Zhang, Shuozhong Wang:
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting. ICARCV 2006: 1-4
[c9]Chao Chen, Shuozhong Wang, Xinpeng Zhang:
Information Hiding in Text Using Typesetting Tools with Stego-Encoding. ICICIC (1) 2006: 459-462
[c8]Xinpeng Zhang, Shuozhong Wang:
Information capacity of quantization steganography in the presence of active attack. MMM 2006- 2005
[j5]Xinpeng Zhang, Shuozhong Wang:
Stego-Encoding with Error Correction Capability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(12): 3663-3667 (2005)
[j4]Xinpeng Zhang, Shuozhong Wang:
Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1): 67-70 (2005)
[c7]Xinpeng Zhang, Shuozhong Wang:
Analysis of Parity Assignment Steganography in Palette Images. KES (3) 2005: 1025-1031
[c6]Xinpeng Zhang, Shuozhong Wang:
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. KES (2) 2005: 1134-1144- 2004
[j3]Xinpeng Zhang, Shuozhong Wang:
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 25(3): 331-339 (2004)
[j2]Xinpeng Zhang, Shuozhong Wang:
Invertibility attack against watermarking based on forged algorithm and a countermeasure. Pattern Recognit. Lett. 25(8): 967-973 (2004)
[c5]Xinpeng Zhang, Shuozhong Wang:
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. InfoSecu 2004: 247-248- 2003
[c4]Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. MMM-ACNS 2003: 360-370
[c3]Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:
Data Hiding in Digital Audio by Frequency Domain Dithering. MMM-ACNS 2003: 383-394
[c2]Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Steganography with Least Histogram Abnormality.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID