关注
Hang Zhou
Hang Zhou
在 sfu.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
DUP-Net: Denoiser and upsampler network for 3D adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
1602019
Screen-shooting resilient watermarking
H Fang, W Zhang, H Zhou, H Cui, N Yu
IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018
1312018
Separable reversible data hiding in encrypted JPEG bitstreams
Z Qian, H Zhou, X Zhang, W Zhang
IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016
1282016
Reversible data hiding in encrypted three-dimensional mesh models
R Jiang, H Zhou, W Zhang, N Yu
IEEE Transactions on Multimedia 20 (1), 55-67, 2017
1222017
LG-GAN: Label guided adversarial network for flexible targeted attack of point cloud based deep networks
H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
1032020
Designing near-optimal steganographic codes in practice based on polar codes
W Li, W Zhang, L Li, H Zhou, N Yu
IEEE Transactions on Communications 68 (7), 3948-3962, 2020
752020
Shape-invariant 3D adversarial point clouds
Q Huang, X Dong, D Chen, H Zhou, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
602022
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
572018
Robust steganography using texture synthesis
Z Qian, H Zhou, W Zhang, X Zhang
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2017
572017
Reversible watermarking in deep convolutional neural networks for integrity authentication
X Guan, H Feng, W Zhang, H Zhou, J Zhang, N Yu
Proceedings of the 28th ACM International Conference on Multimedia, 2273-2280, 2020
562020
Self-robust 3D point recognition via gather-vector guidance
X Dong, D Chen, H Zhou, G Hua, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
542020
Distortion design for secure adaptive 3-D mesh steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
492018
A camera shooting resilient watermarking scheme for underpainting documents
H Fang, W Zhang, Z Ma, H Zhou, S Sun, H Cui, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (11), 4075 …, 2019
472019
Homomorphic encryption-based reversible data hiding for 3D mesh models
M Shah, W Zhang, H Hu, H Zhou, T Mahmood
Arabian Journal for Science and Engineering 43, 8145-8157, 2018
392018
Comments on “steganography using reversible texture synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
372017
Content-adaptive reversible visible watermarking in encrypted images
Y Yao, W Zhang, H Wang, H Zhou, N Yu
Signal Processing 164, 386-401, 2019
352019
Distribution-preserving steganography based on text-to-speech generative models
K Chen, H Zhou, H Zhao, D Chen, W Zhang, N Yu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3343-3356, 2021
28*2021
Self-supervised adversarial training
K Chen, Y Chen, H Zhou, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2020
28*2020
JPEG steganography with estimated side-information
W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019
242019
Defining cost functions for adaptive steganography at the microscale
K Chen, W Zhang, H Zhou, N Yu, G Feng
IEEE International Workshop on Information Forensics and Security, 1-6, 2016
242016
系统目前无法执行此操作,请稍后再试。
文章 1–20