Author of the publication

Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network.

, , , , and . IEEE Trans. Cogn. Dev. Syst., 16 (2): 772-781 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel signature based on the combination of global and local signatures for image copy detection., , , , and . Secur. Commun. Networks, 7 (11): 1702-1711 (2014)Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment., , , , , , and . IEEE Access, (2020)Coverless Information Hiding Method Based on the Chinese Mathematical Expression., , , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 133-143. Springer, (2015)Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario., , , , , and . Wirel. Commun. Mob. Comput., (2021)Pseudo 2D String Matching Technique for High Efficiency Screen Content Coding., , , , and . IEEE Trans. Multim., 18 (3): 339-350 (2016)A Survey of DeFi Security: Challenges and Opportunities., , , , , and . CoRR, (2022)Coverless Image Steganography Without Embedding., , , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 123-132. Springer, (2015)Text coverless information hiding based on compound and selection of words., and . Soft Comput., 23 (15): 6323-6330 (2019)High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption., , , and . IEEE Access, (2018)Pseudo-2D-matching based enhancement to high efficiency video coding for screen contents., , , , and . Multim. Tools Appl., 74 (18): 7753-7771 (2015)