关注
Kejiang Chen
Kejiang Chen
Department of Electronic Engineering and Information Science, University of Science and Technology
在 mail.ustc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
1892019
Lg-gan: Label guided adversarial network for flexible targeted attack of point cloud based deep networks
H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
1202020
Adversarial examples against deep neural network based steganalysis
Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu
Proceedings of the 6th ACM Workshop on information hiding and multimedia …, 2018
1152018
Reversible data hiding in color image with grayscale invariance
D Hou, W Zhang, K Chen, SJ Lin, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018
702018
Toward understanding and boosting adversarial transferability from a distribution perspective
Y Zhu, Y Chen, X Li, K Chen, Y He, X Tian, B Zheng, Y Chen, Q Huang
IEEE Transactions on Image Processing 31, 6487-6501, 2022
622022
Tracing text provenance via context-aware lexical substitution
X Yang, J Zhang, K Chen, W Zhang, Z Ma, F Wang, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 36 (10), 11613 …, 2022
622022
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
612018
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu
Signal Processing 168, 107343, 2020
542020
Distortion design for secure adaptive 3-D mesh steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
532018
Watermarking text generated by black-box language models
X Yang, K Chen, W Zhang, C Liu, Y Qi, J Zhang, H Fang, N Yu
arXiv preprint arXiv:2305.08883, 2023
522023
A brief survey on deep learning based data hiding
C Zhang, C Lin, P Benz, K Chen, W Zhang, IS Kweon
arXiv preprint arXiv:2103.01607, 2021
502021
Defining joint distortion for JPEG steganography
W Li, W Zhang, K Chen, W Zhou, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
422018
Provably secure generative steganography based on autoregressive model
K Yang, K Chen, W Zhang, N Yu
International Workshop on Digital Watermarking, 55-68, 2018
392018
Pseudo label-guided model inversion attack via conditional generative adversarial network
X Yuan, K Chen, J Zhang, W Zhang, N Yu, Y Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (3), 3349-3357, 2023
382023
Comments on “steganography using reversible texture synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
372017
Adversarial batch image steganography against CNN-based pooled steganalysis
L Li, W Zhang, C Qin, K Chen, W Zhou, N Yu
Signal Processing 181, 107920, 2021
342021
Flow-based robust watermarking with invertible noise layer for black-box distortions
H Fang, Y Qiu, K Chen, J Zhang, W Zhang, EC Chang
Proceedings of the AAAI conference on artificial intelligence 37 (4), 5054-5061, 2023
302023
Gpt paternity test: Gpt generated text detection with gpt genetic inheritance
X Yu, Y Qi, K Chen, G Chen, X Yang, P Zhu, W Zhang, N Yu
CoRR, 2023
302023
Improving robust adaptive steganography via minimizing channel errors
K Zeng, K Chen, W Zhang, Y Wang, N Yu
Signal Processing 195, 108498, 2022
282022
Self-supervised adversarial training
K Chen, Y Chen, H Zhou, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
272020
系统目前无法执行此操作,请稍后再试。
文章 1–20