Author of the publication

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography.

, , , , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (6): 2985-2999 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China., , , and . PAM, volume 12048 of Lecture Notes in Computer Science, page 314-328. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography., , , , , , , and . IEEE Trans. Comput. Soc. Syst., 10 (6): 2985-2999 (December 2023)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , and . CoRR, (2022)Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples., , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (11): 6976-6982 (2022)MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks., , , , , , , and . CoRR, (2023)TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems., , , , and . CoRR, (2021)VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints., , , and . CoRR, (2023)A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services., , , , , , , and . CoRR, (2023)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , and . CoRR, (2023)Hidden Backdoors in Human-Centric Language Models., , , , , , and . CCS, page 3123-3140. ACM, (2021)