Author of the publication

A black-box reversible adversarial example for authorizable recognition to shared images.

, , , and . Pattern Recognit., (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computation on Additive Shares., , , , and . CoRR, (2020)Conducting Correlated Laplace Mechanism for Differential Privacy., , , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 72-85. Springer, (2017)A content security protection scheme in JPEG compressed domain., , , and . J. Vis. Commun. Image Represent., 25 (5): 805-813 (2014)A secure re-encryption scheme for data services in a cloud computing environment., , and . Concurr. Comput. Pract. Exp., 27 (17): 4573-4585 (2015)Secure multimedia distribution in cloud computing using re-encryption and fingerprinting., , , and . Multim. Tools Appl., 78 (21): 30297-30313 (2019)A black-box reversible adversarial example for authorizable recognition to shared images., , , and . Pattern Recognit., (August 2023)Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction., , , and . IEEE Trans. Cloud Comput., 12 (1): 186-199 (January 2024)Efficient Privacy-Preserving Computation Based on Additive Secret Sharing., , , , and . CoRR, (2020)Privacy-Preserving Image Retrieval Based on Additive Secret Sharing., , , , and . CoRR, (2020)Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion., and . J. Inf. Secur. Appl., (2019)