Follow
weiming zhang
Title
Cited by
Cited by
Year
Reversible data hiding in encrypted images by reserving room before encryption
K Ma, W Zhang, X Zhao, N Yu, F Li
IEEE Transactions on information forensics and security 8 (3), 553-562, 2013
8642013
Cswin transformer: A general vision transformer backbone with cross-shaped windows
X Dong, J Bao, D Chen, W Zhang, N Yu, L Yuan, D Chen, B Guo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
8332022
Multi-attentional Deepfake Detection
H Zhao, W Zhou, D Chen, T Wei, W Zhang, N Yu
CVPR 2021, 2021
5622021
Reversibility improved data hiding in encrypted images
W Zhang, K Ma, N Yu
Signal Processing 94, 118-127, 2014
4432014
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
3822015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3632013
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu
CVPR 2021, 2021
3332021
DeepFaceLab: Integrated, flexible and extensible face-swapping framework
I Perov, D Gao, N Chervoniy, K Liu, S Marangonda, C Umé, M Dpfks, ...
arXiv preprint arXiv:2005.05535, 2020
3152020
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2612013
Peco: Perceptual codebook for bert pre-training of vision transformers
X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N Yu, ...
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 552-560, 2023
2112023
On the fault-tolerant performance for a class of robust image steganography
Y Zhang, C Qin, W Zhang, F Liu, X Luo
Signal Processing 146, 99-111, 2018
1902018
Improving various reversible data hiding schemes via optimal codes for binary covers
W Zhang, B Chen, N Yu
IEEE transactions on image processing 21 (6), 2991-3003, 2012
1672012
Reversible data hiding in encrypted images by reversible image transformation
W Zhang, H Wang, D Hou, N Yu
IEEE Transactions on Multimedia 18 (8), 1469-1479, 2016
1642016
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
(ICCV)Proceedings of the IEEE International Conference on Computer Vision …, 2019
1472019
A double layered “plus-minus one” data embedding scheme
W Zhang, X Zhang, S Wang
IEEE signal processing letters 14 (11), 848-851, 2007
1352007
Improving embedding efficiency of covering codes for applications in steganography
W Zhang, S Wang, X Zhang
IEEE Communications Letters 11 (8), 680-682, 2007
1312007
Separable reversible data hiding in encrypted JPEG bitstreams
Z Qian, H Zhou, X Zhang, W Zhang
IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016
1282016
GDroid: Android malware detection and classification with graph convolutional network
H Gao, S Cheng, W Zhang
Computers & Security 106, 102264, 2021
1232021
Screen-Shooting Resilient Watermarking
H Fang, W Zhang, H Zhou, H Cui, N Yu
IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018
1232018
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View
J Liu, W Zhang, Y Zhang, D Hou, Y Liu, H Zha, N Yu
(CVPR)Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
1222019
The system can't perform the operation now. Try again later.
Articles 1–20