Author of the publication

GAN-TStega: Text Steganography Based on Generative Adversarial Networks.

, , , , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 18-31. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter100k: A Real-World Dataset for Weakly Supervised Cross-Media Retrieval., , , and . IEEE Trans. Multim., 20 (4): 927-938 (2018)UserBERT: Contrastive User Model Pre-training., , , , , and . CoRR, (2021)DebiasGAN: Eliminating Position Bias in News Recommendation with Adversarial Learning., , and . CoRR, (2021)FedNER: Privacy-preserving Medical Named Entity Recognition with Federated Learning., , , , , and . CoRR, (2020)FoodS and FoodIM: Food-Testing Item Recommendation Models for Two Different Users with Different Usage Abilities., , , and . ASSE, page 1-9. ACM, (2023)CBI: A Data Access Control System Based on Cloud and Blockchain Integration., , , and . HPCC/DSS/SmartCity, page 715-721. IEEE, (2020)Personalized Microblog Sentiment Classification via Multi-Task Learning., and . AAAI, page 3059-3065. AAAI Press, (2016)Microblog Sentiment Classification with Contextual Knowledge Regularization., , and . AAAI, page 2332-2338. AAAI Press, (2015)A Novel Focused Crawler Based on Breadcrumb Navigation., , , and . ICSI (2), volume 7332 of Lecture Notes in Computer Science, page 264-271. Springer, (2012)A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding., , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 752-762. Springer, (2017)