DUP-Net: Denoiser and upsampler network for 3D adversarial point clouds defense H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 160 | 2019 |
Screen-shooting resilient watermarking H Fang, W Zhang, H Zhou, H Cui, N Yu IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018 | 131 | 2018 |
Separable reversible data hiding in encrypted JPEG bitstreams Z Qian, H Zhou, X Zhang, W Zhang IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016 | 128 | 2016 |
Reversible data hiding in encrypted three-dimensional mesh models R Jiang, H Zhou, W Zhang, N Yu IEEE Transactions on Multimedia 20 (1), 55-67, 2017 | 122 | 2017 |
LG-GAN: Label guided adversarial network for flexible targeted attack of point cloud based deep networks H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 103 | 2020 |
Designing near-optimal steganographic codes in practice based on polar codes W Li, W Zhang, L Li, H Zhou, N Yu IEEE Transactions on Communications 68 (7), 3948-3962, 2020 | 75 | 2020 |
Shape-invariant 3D adversarial point clouds Q Huang, X Dong, D Chen, H Zhou, W Zhang, N Yu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 60 | 2022 |
Defining cost functions for adaptive JPEG steganography at the microscale K Chen, H Zhou, W Zhou, W Zhang, N Yu IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018 | 57 | 2018 |
Robust steganography using texture synthesis Z Qian, H Zhou, W Zhang, X Zhang Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2017 | 57 | 2017 |
Reversible watermarking in deep convolutional neural networks for integrity authentication X Guan, H Feng, W Zhang, H Zhou, J Zhang, N Yu Proceedings of the 28th ACM International Conference on Multimedia, 2273-2280, 2020 | 56 | 2020 |
Self-robust 3D point recognition via gather-vector guidance X Dong, D Chen, H Zhou, G Hua, W Zhang, N Yu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 54 | 2020 |
Distortion design for secure adaptive 3-D mesh steganography H Zhou, K Chen, W Zhang, Y Yao, N Yu IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018 | 49 | 2018 |
A camera shooting resilient watermarking scheme for underpainting documents H Fang, W Zhang, Z Ma, H Zhou, S Sun, H Cui, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (11), 4075 …, 2019 | 47 | 2019 |
Homomorphic encryption-based reversible data hiding for 3D mesh models M Shah, W Zhang, H Hu, H Zhou, T Mahmood Arabian Journal for Science and Engineering 43, 8145-8157, 2018 | 39 | 2018 |
Comments on “steganography using reversible texture synthesis” H Zhou, K Chen, W Zhang, N Yu IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017 | 37 | 2017 |
Content-adaptive reversible visible watermarking in encrypted images Y Yao, W Zhang, H Wang, H Zhou, N Yu Signal Processing 164, 386-401, 2019 | 35 | 2019 |
Distribution-preserving steganography based on text-to-speech generative models K Chen, H Zhou, H Zhao, D Chen, W Zhang, N Yu IEEE Transactions on Dependable and Secure Computing 19 (5), 3343-3356, 2021 | 28* | 2021 |
Self-supervised adversarial training K Chen, Y Chen, H Zhou, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu IEEE International Conference on Acoustics, Speech and Signal Processing …, 2020 | 28* | 2020 |
JPEG steganography with estimated side-information W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019 | 24 | 2019 |
Defining cost functions for adaptive steganography at the microscale K Chen, W Zhang, H Zhou, N Yu, G Feng IEEE International Workshop on Information Forensics and Security, 1-6, 2016 | 24 | 2016 |