From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection., , , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (3): 123:1-123:20 (2023)Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks., , , , , , , и . IEEE Trans. Artif. Intell., 4 (5): 1029-1040 (октября 2023)DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness., , , , , , , и . ACM Multimedia, стр. 7345-7353. ACM, (2023)ProTegO: Protect Text Content against OCR Extraction Attack., , , , , , , , , и . ACM Multimedia, стр. 7424-7434. ACM, (2023)A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking., , , , , и . CoRR, (2021)Three-Dimensional Mesh Steganography and Steganalysis: A Review., , , , и . CoRR, (2021)Controversial 'pixel' prior rule for JPEG adaptive steganography., , , , , и . IET Image Process., 13 (1): 24-33 (2019)Toward Secure and Robust Steganography for Black-Box Generated Images., , , , и . IEEE Trans. Inf. Forensics Secur., (2024)Cover Reproducible Steganography via Deep Generative Models., , , , , и . CoRR, (2022)ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography., , , , , и . ICASSP, стр. 1-5. IEEE, (2023)