Author of the publication

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.

, , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2088-2105 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Snoring Sound-Related Signals Based on MLP., , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 625-632. Springer, (2018)Stego-Encoding with Error Correction Capability., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (12): 3663-3667 (2005)An Effective Framework for Intellectual Property Protection of NLG Models., , and . Symmetry, 15 (6): 1287 (2023)Selective Ensemble Classification of Image Steganalysis Via Deep Q Network., , , and . IEEE Signal Process. Lett., 26 (7): 1065-1069 (2019)Reversible Data Hiding in Encrypted Images Based on Progressive Recovery., , and . IEEE Signal Process. Lett., 23 (11): 1672-1676 (2016)Efficient Data Hiding With Plus-Minus One or Two.. IEEE Signal Process. Lett., 17 (7): 635-638 (2010)Breaking Robust Data Hiding in Online Social Networks., , , , and . IEEE Signal Process. Lett., (2022)Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing., , and . KSII Trans. Internet Inf. Syst., 11 (7): 3648-3663 (2017)Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine., , , and . IEEE Trans. Cybern., 45 (2): 279-288 (2015)Additional articles of special issue on Real-time image watermarking and forensics in cloud computing., , , and . J. Real Time Image Process., 16 (4): 811-812 (2019)