Suivre
Diqun Yan
Diqun Yan
Adresse e-mail validée de nbu.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
Reversible data hiding for audio based on prediction error expansion
D Yan, R Wang
2008 International Conference on Intelligent Information Hiding and …, 2008
502008
Steganography for MP3 audio by exploiting the rule of window switching
D Yan, R Wang, X Yu, J Zhu
Computers & Security 31 (5), 704-716, 2012
462012
Steganalysis of MP3Stego with low embedding-rate using Markov feature
C Jin, R Wang, D Yan
Multimedia Tools and Applications 76, 6143-6158, 2017
382017
Targeted speech adversarial example generation with generative adversarial network
D Wang, L Dong, R Wang, D Yan, J Wang
IEEE Access 8, 124503-124513, 2020
372020
Identification of fake stereo audio using SVM and CNN
T Liu, D Yan, R Wang, N Yan, G Chen
Information 12 (7), 263, 2021
352021
Audio steganalysis with improved convolutional neural network
Y Lin, R Wang, D Yan, L Dong, X Zhang
Proceedings of the ACM workshop on information hiding and multimedia …, 2019
342019
Steganalysis for MP3Stego using differential statistics of quantization step
D Yan, R Wang, X Yu, J Zhu
Digital Signal Processing 23 (4), 1181-1185, 2013
322013
Source cell-phone identification in the presence of additive noise from CQT domain
T Qin, R Wang, D Yan, L Lin
Information 9 (8), 205, 2018
312018
Quantization step parity-based steganography for MP3 audio
Y Diqun, W Rangding, Z Liguang
Fundamenta Informaticae 97 (1-2), 1-14, 2009
292009
Huffman table swapping-based steganograpy for MP3 audio
D Yan, R Wang
Multimedia Tools and Applications 52, 291-305, 2011
282011
Learning to generate steganographic cover for audio steganography using gan
L Chen, R Wang, D Yan, J Wang
IEEE Access 9, 88098-88107, 2021
262021
Semi-supervised semantic segmentation with cross teacher training
H Xiao, D Li, H Xu, S Fu, D Yan, K Song, C Peng
Neurocomputing 508, 36-46, 2022
242022
Adaptive audio steganography based on improved syndrome-trellis codes
K Ying, R Wang, Y Lin, D Yan
IEEE Access 9, 11705-11715, 2021
232021
Detection of MP3Stego exploiting recompression calibration-based feature
D Yan, R Wang
Multimedia tools and applications 72, 865-878, 2014
232014
Adversarial examples attack and countermeasure for speech recognition system: A survey
D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong
International Conference on Security and Privacy in Digital Economy, 443-468, 2020
222020
Source smartphone identification by exploiting encoding characteristics of recorded speech
C Jin, R Wang, D Yan
Digital Investigation 29, 129-146, 2019
222019
Anti-forensics of audio source identification using generative adversarial network
X Li, D Yan, L Dong, R Wang
IEEE Access 7, 184332-184339, 2019
212019
A high capacity MP3 steganography based on Huffman coding
D Yan, R Wang, LG Zhang
Journal of Sichuan University (Natural Science Edition) 6, 013, 2011
212011
The sign bits of huffman codeword-based steganography for aac audio
J Zhu, R Wang, D Yan
2010 International conference on multimedia technology, 1-4, 2010
172010
A high-capacity reversible data hiding scheme using dual-channel audio
H Yu, R Wang, L Dong, D Yan, Y Gong, Y Lin
IEEE Access 8, 162271-162278, 2020
142020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20