Follow
weiming zhang
Title
Cited by
Cited by
Year
Reversible data hiding in encrypted images by reserving room before encryption
K Ma, W Zhang, X Zhao, N Yu, F Li
IEEE Transactions on information forensics and security 8 (3), 553-562, 2013
8552013
Cswin transformer: A general vision transformer backbone with cross-shaped windows
X Dong, J Bao, D Chen, W Zhang, N Yu, L Yuan, D Chen, B Guo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
7362022
Multi-attentional Deepfake Detection
H Zhao, W Zhou, D Chen, T Wei, W Zhang, N Yu
CVPR 2021, 2021
5102021
Reversibility improved data hiding in encrypted images
W Zhang, K Ma, N Yu
Signal Processing 94, 118-127, 2014
4392014
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
3752015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3582013
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu
CVPR 2021, 2021
3062021
DeepFaceLab: Integrated, flexible and extensible face-swapping framework
I Perov, D Gao, N Chervoniy, K Liu, S Marangonda, C Umé, M Dpfks, ...
arXiv preprint arXiv:2005.05535, 2020
2952020
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2602013
Peco: Perceptual codebook for bert pre-training of vision transformers
X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N Yu, ...
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 552-560, 2023
1952023
On the fault-tolerant performance for a class of robust image steganography
Y Zhang, C Qin, W Zhang, F Liu, X Luo
Signal Processing 146, 99-111, 2018
1902018
Improving various reversible data hiding schemes via optimal codes for binary covers
W Zhang, B Chen, N Yu
IEEE transactions on image processing 21 (6), 2991-3003, 2012
1672012
Reversible data hiding in encrypted images by reversible image transformation
W Zhang, H Wang, D Hou, N Yu
IEEE Transactions on Multimedia 18 (8), 1469-1479, 2016
1602016
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
(ICCV)Proceedings of the IEEE International Conference on Computer Vision …, 2019
1442019
A double layered “plus-minus one” data embedding scheme
W Zhang, X Zhang, S Wang
IEEE signal processing letters 14 (11), 848-851, 2007
1342007
Improving embedding efficiency of covering codes for applications in steganography
W Zhang, S Wang, X Zhang
IEEE Communications Letters 11 (8), 680-682, 2007
1312007
Separable reversible data hiding in encrypted JPEG bitstreams
Z Qian, H Zhou, X Zhang, W Zhang
IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016
1272016
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View
J Liu, W Zhang, Y Zhang, D Hou, Y Liu, H Zha, N Yu
(CVPR)Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
1192019
Model watermarking for image processing networks
J Zhang, D Chen, J Liao, H Fang, W Zhang, W Zhou, H Cui, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 12805 …, 2020
1182020
Reversible data hiding in JPEG image based on DCT frequency and block selection
D Hou, H Wang, W Zhang, N Yu
Signal Processing 148, 41-47, 2018
1162018
The system can't perform the operation now. Try again later.
Articles 1–20