BibTeX records: Zhao-Xia Yin

download as .bib file

@article{DBLP:journals/eswa/YuanZWY24,
  author       = {Zihan Yuan and
                  Xinpeng Zhang and
                  Zichi Wang and
                  Zhaoxia Yin},
  title        = {Semi-fragile neural network watermarking for content authentication
                  and tampering localization},
  journal      = {Expert Syst. Appl.},
  volume       = {236},
  pages        = {121315},
  year         = {2024}
}
@article{DBLP:journals/mta/ChenZAY24,
  author       = {Li Chen and
                  Shaowei Zhu and
                  Abel Andrew and
                  Zhaoxia Yin},
  title        = {Reversible attack based on local visible adversarial perturbation},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {4},
  pages        = {11215--11227},
  year         = {2024}
}
@article{DBLP:journals/tcsv/ZhouHZYH24,
  author       = {Xiaoyi Zhou and
                  Kaiyue Hou and
                  Yu{-}Jian Zhuang and
                  Zhaoxia Yin and
                  Wenbao Han},
  title        = {General Pairwise Modification Framework for Reversible Data Hiding
                  in {JPEG} Images},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {1},
  pages        = {153--167},
  year         = {2024}
}
@article{DBLP:journals/visintelligence/TangYSL024,
  author       = {Lichun Tang and
                  Zhaoxia Yin and
                  Hang Su and
                  Wanli Lyu and
                  Bin Luo},
  title        = {{WFSS:} weighted fusion of spectral transformer and spatial self-attention
                  for robust hyperspectral image classification against adversarial
                  attacks},
  journal      = {Vis. Intell.},
  volume       = {2},
  number       = {1},
  year         = {2024}
}
@article{DBLP:journals/cviu/ChenYYMCPGYS23,
  author       = {Jiawei Chen and
                  Xiao Yang and
                  Heng Yin and
                  Mingzhi Ma and
                  Bihui Chen and
                  Jianteng Peng and
                  Yandong Guo and
                  Zhaoxia Yin and
                  Hang Su},
  title        = {AdvFAS: {A} robust face anti-spoofing framework against adversarial
                  examples},
  journal      = {Comput. Vis. Image Underst.},
  volume       = {235},
  pages        = {103779},
  year         = {2023}
}
@article{DBLP:journals/eswa/DuanLYZL23,
  author       = {Xiaolong Duan and
                  Bin Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Robust image steganography against lossy {JPEG} compression based
                  on embedding domain selection and adaptive error correction},
  journal      = {Expert Syst. Appl.},
  volume       = {229},
  number       = {Part {A}},
  pages        = {120416},
  year         = {2023}
}
@article{DBLP:journals/jvcir/LyuYY23,
  author       = {Wan{-}Li Lyu and
                  Yajie Yue and
                  Zhaoxia Yin},
  title        = {Reversible data hiding based on automatic contrast enhancement using
                  histogram expansion},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {92},
  pages        = {103798},
  year         = {2023}
}
@article{DBLP:journals/prl/YinCLL23,
  author       = {Zhaoxia Yin and
                  Li Chen and
                  Wanli Lyu and
                  Bin Luo},
  title        = {Reversible attack based on adversarial perturbation and reversible
                  data hiding in {YUV} colorspace},
  journal      = {Pattern Recognit. Lett.},
  volume       = {166},
  pages        = {1--7},
  year         = {2023}
}
@inproceedings{DBLP:conf/apsipa/YinYYLW23,
  author       = {Yujie Yin and
                  Heng Yin and
                  Zhaoxia Yin and
                  Wanli Lyu and
                  Sha Wei},
  title        = {High-Quality Triggers Based Fragile Watermarking for Optical Character
                  Recognition Model},
  booktitle    = {{APSIPA} {ASC}},
  pages        = {468--475},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/apsipa/LyuCYL23,
  author       = {Wanli Lyu and
                  Lulu Cheng and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB
                  Substitution and Ring-prediction},
  booktitle    = {{APSIPA} {ASC}},
  pages        = {1907--1914},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/apsipa/LyuWYL23,
  author       = {Wanli Lyu and
                  Mengjiang Wu and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial
                  Attacks},
  booktitle    = {{APSIPA} {ASC}},
  pages        = {1915--1922},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/icct/DuanYYL23,
  author       = {Jialin Duan and
                  Zhaoxia Yin and
                  Chenyi Yang and
                  Kunhao Liang},
  title        = {Reversible Data Hiding Based on Elastic Net Predictor},
  booktitle    = {{ICCT}},
  pages        = {1247--1252},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/icip/MaZLRSY23,
  author       = {Mingzhi Ma and
                  Weijie Zheng and
                  Wanli Lv and
                  Lu Ren and
                  Hang Su and
                  Zhaoxia Yin},
  title        = {Multi-Label Adversarial Attack Based on Label Correlation},
  booktitle    = {{ICIP}},
  pages        = {2050--2054},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/icip/ZhangWLY23,
  author       = {Jiefei Zhang and
                  Jie Wang and
                  Wanli Lyu and
                  Zhaoxia Yin},
  title        = {Local Texture Complexity Guided Adversarial Attack},
  booktitle    = {{ICIP}},
  pages        = {2065--2069},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/ijcnn/ZhuYLZL23,
  author       = {Tong Zhu and
                  Zhaoxia Yin and
                  Wanli Lyu and
                  Jiefei Zhang and
                  Bin Luo},
  title        = {Imperceptible Adversarial Attack on {S} Channel of {HSV} Colorspace},
  booktitle    = {{IJCNN}},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2304-13297,
  author       = {Xiaolong Duan and
                  Bin Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Robust image steganography against lossy {JPEG} compression based
                  on embedding domain selection and adaptive error correction},
  journal      = {CoRR},
  volume       = {abs/2304.13297},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2305-04436,
  author       = {Zhaoxia Yin and
                  Shaowei Zhu and
                  Hang Su and
                  Jianteng Peng and
                  Wanli Lyu and
                  Bin Luo},
  title        = {Adversarial Examples Detection with Enhanced Image Difference Features
                  based on Local Histogram Equalization},
  journal      = {CoRR},
  volume       = {abs/2305.04436},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2305-09684,
  author       = {Zhaoxia Yin and
                  Heng Yin and
                  Hang Su and
                  Xinpeng Zhang and
                  Zhenzhe Gao},
  title        = {Decision-based iterative fragile watermarking for model integrity
                  verification},
  journal      = {CoRR},
  volume       = {abs/2305.09684},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2308-02116,
  author       = {Jiawei Chen and
                  Xiao Yang and
                  Heng Yin and
                  Mingzhi Ma and
                  Bihui Chen and
                  Jianteng Peng and
                  Yandong Guo and
                  Zhaoxia Yin and
                  Hang Su},
  title        = {AdvFAS: {A} robust face anti-spoofing framework against adversarial
                  examples},
  journal      = {CoRR},
  volume       = {abs/2308.02116},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2308-11235,
  author       = {Zhenzhe Gao and
                  Zhaoxia Yin and
                  Hongjian Zhan and
                  Heng Yin and
                  Yue Lu},
  title        = {Adaptive White-Box Watermarking with Self-Mutual Check Parameters
                  in Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2308.11235},
  year         = {2023}
}
@article{DBLP:journals/cogcom/XuTLY22,
  author       = {Na Xu and
                  Jin Tang and
                  Bin Luo and
                  Zhaoxia Yin},
  title        = {Separable Reversible Data Hiding Based on Integer Mapping and {MSB}
                  Prediction for Encrypted 3D Mesh Models},
  journal      = {Cogn. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {1172--1181},
  year         = {2022}
}
@article{DBLP:journals/compsec/WangYJTL22,
  author       = {Jie Wang and
                  Zhaoxia Yin and
                  Jing Jiang and
                  Jin Tang and
                  Bin Luo},
  title        = {{PISA:} Pixel skipping-based attentional black-box adversarial attack},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102947},
  year         = {2022}
}
@article{DBLP:journals/ijis/WangYJD22,
  author       = {Jie Wang and
                  Zhaoxia Yin and
                  Jing Jiang and
                  Yang Du},
  title        = {Attention-guided black-box adversarial attacks with large-scale multiobjective
                  evolutionary optimization},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7526--7547},
  year         = {2022}
}
@article{DBLP:journals/isci/DuY22,
  author       = {Yang Du and
                  Zhaoxia Yin},
  title        = {New framework for code-mapping-based reversible data hiding in {JPEG}
                  images},
  journal      = {Inf. Sci.},
  volume       = {609},
  pages        = {319--338},
  year         = {2022}
}
@article{DBLP:journals/sigpro/LyuCY22,
  author       = {Wan{-}Li Lyu and
                  Lulu Cheng and
                  Zhaoxia Yin},
  title        = {High-capacity reversible data hiding in encrypted 3D mesh models based
                  on multi-MSB prediction},
  journal      = {Signal Process.},
  volume       = {201},
  pages        = {108686},
  year         = {2022}
}
@article{DBLP:journals/tdsc/YinPX22,
  author       = {Zhaoxia Yin and
                  Yinyin Peng and
                  Youzhi Xiang},
  title        = {Reversible Data Hiding in Encrypted Images Based on Pixel Prediction
                  and Bit-Plane Compression},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {992--1002},
  year         = {2022}
}
@article{DBLP:journals/tdsc/DuYZ22,
  author       = {Yang Du and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {High Capacity Lossless Data Hiding in {JPEG} Bitstream Based on General
                  {VLC} Mapping},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1420--1433},
  year         = {2022}
}
@inproceedings{DBLP:conf/icip/YinY022,
  author       = {Zhaoxia Yin and
                  Heng Yin and
                  Xinpeng Zhang},
  title        = {Neural Network Fragile watermarking With No Model Performance Degradation},
  booktitle    = {{ICIP}},
  pages        = {3958--3962},
  publisher    = {{IEEE}},
  year         = {2022}
}
@inproceedings{DBLP:conf/iftc/ZhuLLY022,
  author       = {Shaowei Zhu and
                  Wanli Lyu and
                  Bin Li and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {Adversarial Example Defense via Perturbation Grading Strategy},
  booktitle    = {{IFTC}},
  series       = {Communications in Computer and Information Science},
  volume       = {1766},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iftc/YinY0022,
  author       = {Wen Yin and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {On the Robustness of "Robust Reversible Data Hiding Scheme Based
                  on Two-Layer Embedding Strategy"},
  booktitle    = {{IFTC}},
  series       = {Communications in Computer and Information Science},
  volume       = {1766},
  pages        = {512--524},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iwdw/TangCLY22,
  author       = {Yun Tang and
                  Lulu Cheng and
                  Wanli Lyu and
                  Zhaoxia Yin},
  title        = {High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models
                  Based on Topology},
  booktitle    = {{IWDW}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/mmsp/WangFYL22,
  author       = {Qingyu Wang and
                  Guorui Feng and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {Universal adversarial perturbation for remote sensing images},
  booktitle    = {{MMSP}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2202-10693,
  author       = {Zhaoxia Yin and
                  Qingyu Wang and
                  Jin Tang and
                  Bin Luo},
  title        = {Universal adversarial perturbation for remote sensing images},
  journal      = {CoRR},
  volume       = {abs/2202.10693},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2208-07585,
  author       = {Zhaoxia Yin and
                  Heng Yin and
                  Xinpeng Zhang},
  title        = {Neural network fragile watermarking with no model performance degradation},
  journal      = {CoRR},
  volume       = {abs/2208.07585},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2211-02801,
  author       = {Yun Tang and
                  Lulu Cheng and
                  Wanli Lyv and
                  Zhaoxia Yin},
  title        = {High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models
                  Based on Topology},
  journal      = {CoRR},
  volume       = {abs/2211.02801},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2212-08341,
  author       = {Shaowei Zhu and
                  Wanli Lyu and
                  Bin Li and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {Adversarial Example Defense via Perturbation Grading Strategy},
  journal      = {CoRR},
  volume       = {abs/2212.08341},
  year         = {2022}
}
@article{DBLP:journals/mta/KeY21,
  author       = {Longfei Ke and
                  Zhaoxia Yin},
  title        = {On the security and robustness of "Keyless dynamic optimal multi-bit
                  image steganography using energetic pixels"},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {3},
  pages        = {3997--4005},
  year         = {2021}
}
@article{DBLP:journals/sigpro/YinSTL21,
  author       = {Zhaoxia Yin and
                  Xiaomeng She and
                  Jin Tang and
                  Bin Luo},
  title        = {Reversible data hiding in encrypted images based on pixel prediction
                  and multi-MSB planes rearrangement},
  journal      = {Signal Process.},
  volume       = {187},
  pages        = {108146},
  year         = {2021}
}
@article{DBLP:journals/tsipn/YinK21,
  author       = {Zhaoxia Yin and
                  Longfei Ke},
  title        = {Robust Adaptive Steganography Based on Dither Modulation and Modification
                  With Re-Compression},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {7},
  pages        = {336--345},
  year         = {2021}
}
@inproceedings{DBLP:conf/acmturc/LvGDHY21,
  author       = {Wanli Lv and
                  Hongnian Guo and
                  Yang Du and
                  Jinmin Hu and
                  Zhaoxia Yin},
  title        = {Multi-domain Reversible Data Hiding in {JPEG} Images},
  booktitle    = {{ACM} {TUR-C}},
  pages        = {241--247},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icmcs/ShiLYZQ21,
  author       = {Mengte Shi and
                  Sheng Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Zhenxing Qian},
  title        = {On Generating {JPEG} Adversarial Images},
  booktitle    = {{ICME}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ksem/ZhuWLYZQ21,
  author       = {Renjie Zhu and
                  Ping Wei and
                  Sheng Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Zhenxing Qian},
  title        = {Fragile Neural Network Watermarking with Trigger Image Set},
  booktitle    = {{KSEM}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12815},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/prcv/YinXWCL21,
  author       = {Zhaoxia Yin and
                  Na Xu and
                  Feng Wang and
                  Lulu Cheng and
                  Bin Luo},
  title        = {Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB
                  Prediction for Encrypted 3D Mesh Models},
  booktitle    = {{PRCV} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13020},
  pages        = {336--348},
  publisher    = {Springer},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2101-07512,
  author       = {Jie Wang and
                  Zhaoxia Yin and
                  Jing Jiang and
                  Yang Du},
  title        = {Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective
                  Evolutionary Optimization},
  journal      = {CoRR},
  volume       = {abs/2101.07512},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2101-07538,
  author       = {Jie Wang and
                  Zhaoxia Yin and
                  Jin Tang and
                  Jing Jiang and
                  Bin Luo},
  title        = {{PICA:} {A} Pixel Correlation-based Attentional Black-box Adversarial
                  Attack},
  journal      = {CoRR},
  volume       = {abs/2101.07538},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2102-12620,
  author       = {Youqing Wu and
                  Wenjing Ma and
                  Zhaoxia Yin},
  title        = {High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive
                  Encoding},
  journal      = {CoRR},
  volume       = {abs/2102.12620},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2109-11735,
  author       = {Wen Yin and
                  Longfei Ke and
                  Zhaoxia Yin and
                  Jin Tang and
                  Bin Luo},
  title        = {Comments on "Robust reversible data hiding scheme based on two-layer
                  embedding strategy"},
  journal      = {CoRR},
  volume       = {abs/2109.11735},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2110-01010,
  author       = {Wanli Lv and
                  Lulu Cheng and
                  Zhaoxia Yin},
  title        = {High Capacity Reversible Data Hiding in Encrypted 3D mesh models Based
                  on multi-MSB Prediction},
  journal      = {CoRR},
  volume       = {abs/2110.01010},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2110-02700,
  author       = {Zhaoxia Yin and
                  Li Chen and
                  Shaowei Zhu},
  title        = {Reversible adversarial examples against local visual perturbation},
  journal      = {CoRR},
  volume       = {abs/2110.02700},
  year         = {2021}
}
@article{DBLP:journals/ijis/YinWWTW20,
  author       = {Zhaoxia Yin and
                  Hua Wang and
                  Jie Wang and
                  Jin Tang and
                  Wenzhong Wang},
  title        = {Defense against adversarial attacks by low-level image transformations},
  journal      = {Int. J. Intell. Syst.},
  volume       = {35},
  number       = {10},
  pages        = {1453--1466},
  year         = {2020}
}
@article{DBLP:journals/mta/ChuangHCY20,
  author       = {Jun{-}Chou Chuang and
                  Yu{-}Chen Hu and
                  Chia{-}Mei Chen and
                  Zhaoxia Yin},
  title        = {Adaptive grayscale image coding scheme based on dynamic multi-grouping
                  absolute moment block truncation coding},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {37-38},
  pages        = {28189--28205},
  year         = {2020}
}
@article{DBLP:journals/tcsv/YinJL20,
  author       = {Zhaoxia Yin and
                  Yuan Ji and
                  Bin Luo},
  title        = {Reversible Data Hiding in {JPEG} Images With Multi-Objective Optimization},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {8},
  pages        = {2343--2352},
  year         = {2020}
}
@article{DBLP:journals/tmm/YinXZ20,
  author       = {Zhaoxia Yin and
                  Youzhi Xiang and
                  Xinpeng Zhang},
  title        = {Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction
                  and Huffman Coding},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {22},
  number       = {4},
  pages        = {874--884},
  year         = {2020}
}
@article{DBLP:journals/tmm/WuXGTY20,
  author       = {Youqing Wu and
                  Youzhi Xiang and
                  Yutang Guo and
                  Jin Tang and
                  Zhaoxia Yin},
  title        = {An Improved Reversible Data Hiding in Encrypted Images Using Parametric
                  Binary Tree Labeling},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {22},
  number       = {8},
  pages        = {1929--1938},
  year         = {2020}
}
@inproceedings{DBLP:conf/ml4cs/YinWW20,
  author       = {Zhaoxia Yin and
                  Hua Wang and
                  Jie Wang},
  title        = {War: An Efficient Pre-processing Method for Defending Adversarial
                  Attacks},
  booktitle    = {{ML4CS} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12487},
  pages        = {514--524},
  publisher    = {Springer},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2006-15984,
  author       = {Zhaoxia Yin and
                  Yang Du and
                  Yuan Ji},
  title        = {A Universal Framework to Construct a Huffman-Code-Mapping-based Reversible
                  Data Hiding Scheme for {JPEG} Images},
  journal      = {CoRR},
  volume       = {abs/2006.15984},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2007-03922,
  author       = {Zhaoxia Yin and
                  Xiaomeng She and
                  Jin Tang and
                  Bin Luo},
  title        = {Reversible data hiding in encrypted images based on pixel prediction
                  and multi-MSB planes rearrangement},
  journal      = {CoRR},
  volume       = {abs/2007.03922},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2007-04057,
  author       = {Youqing Wu and
                  Wenjing Ma and
                  Yinyin Peng and
                  Ruiling Zhang and
                  Zhaoxia Yin},
  title        = {Reversible Data Hiding in Encrypted Images Based on Bit plane Compression
                  of Prediction Error},
  journal      = {CoRR},
  volume       = {abs/2007.04057},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2007-08301,
  author       = {Zhaoxia Yin and
                  Longfei Ke},
  title        = {Robust adaptive steganography based on dither modulation and modification
                  with re-compression},
  journal      = {CoRR},
  volume       = {abs/2007.08301},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2011-04959,
  author       = {Zhaoxia Yin and
                  Hongnian Guo and
                  Yang Du},
  title        = {Multi-domain Reversible Data Hiding in {JPEG}},
  journal      = {CoRR},
  volume       = {abs/2011.04959},
  year         = {2020}
}
@article{DBLP:journals/ijdcf/WangYZ19,
  author       = {Zichi Wang and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {Asymmetric Distortion Function for {JPEG} Steganography Using Block
                  Artifact Compensation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {90--99},
  year         = {2019}
}
@article{DBLP:journals/sigpro/JiaYZL19,
  author       = {Yujie Jia and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Yonglong Luo},
  title        = {Reversible data hiding based on reducing invalid shifting of pixels
                  in histogram shifting},
  journal      = {Signal Process.},
  volume       = {163},
  pages        = {238--246},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-03533,
  author       = {Zhaoxia Yin and
                  Yuan Ji and
                  Bin Luo},
  title        = {Reversible Data Hiding in {JPEG} Images with Multi-objective Optimization},
  journal      = {CoRR},
  volume       = {abs/1905.03533},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-05365,
  author       = {Yujie Jia and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Yonglong Luo},
  title        = {Reversible data hiding based on reducing invalid shifting of pixels
                  in histogram shifting},
  journal      = {CoRR},
  volume       = {abs/1905.05365},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-05627,
  author       = {Yang Du and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {High Capacity Lossless Data Hiding for {JPEG} images by {NLCM} Relationship
                  Constrcution},
  journal      = {CoRR},
  volume       = {abs/1905.05627},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-08614,
  author       = {Hua Wang and
                  Jie Wang and
                  Zhaoxia Yin},
  title        = {War: Detecting adversarial examples by pre-processing input data},
  journal      = {CoRR},
  volume       = {abs/1905.08614},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-09625,
  author       = {Youqing Wu and
                  Youzhi Xiang and
                  Yutang Guo and
                  Jin Tang and
                  Zhaoxia Yin},
  title        = {An Improved Reversible Data Hiding in Encrypted Images using Parametric
                  Binary Tree Labeling},
  journal      = {CoRR},
  volume       = {abs/1905.09625},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1906-03175,
  author       = {Xiaoqing Liu and
                  Yinyin Peng and
                  Jie Wang and
                  Zhaoxia Yin},
  title        = {Image Encryption Algorithm Based on Facebook Social Network},
  journal      = {CoRR},
  volume       = {abs/1906.03175},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1908-02473,
  author       = {Na Xu and
                  Zhaoxia Yin},
  title        = {Separable Reversible Data Hiding Based on {MSB} Prediction for Encrypted
                  3D Mesh Models},
  journal      = {CoRR},
  volume       = {abs/1908.02473},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1911-01699,
  author       = {Zhaoxia Yin and
                  Yinyin Peng and
                  Youzhi Xiang},
  title        = {Reversible Data Hiding in Encrypted Images based on Pixel Prediction
                  and Bit-plane Compression},
  journal      = {CoRR},
  volume       = {abs/1911.01699},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1911-02360,
  author       = {Hua Wang and
                  Zhaoxia Yin},
  title        = {Reversible Adversarial Examples based on Reversible Image Transformation},
  journal      = {CoRR},
  volume       = {abs/1911.02360},
  year         = {2019}
}
@article{DBLP:journals/ijet/Yin18,
  author       = {Zhaoxia Yin},
  title        = {Training {\&} Evaluation System of Intelligent Oral Phonics Based
                  on Speech Recognition Technology},
  journal      = {Int. J. Emerg. Technol. Learn.},
  volume       = {13},
  number       = {4},
  pages        = {45--57},
  year         = {2018}
}
@article{DBLP:journals/istr/PengNFY18,
  author       = {Yinyin Peng and
                  Xuejing Niu and
                  Lei Fu and
                  Zhao{-}Xia Yin},
  title        = {Image authentication scheme based on reversible fragile watermarking
                  with two images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {236--246},
  year         = {2018}
}
@article{DBLP:journals/mta/WeiYWZ18,
  author       = {Qingde Wei and
                  Zhaoxia Yin and
                  Zichi Wang and
                  Xinpeng Zhang},
  title        = {Distortion function based on residual blocks for {JPEG} steganography},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {17875--17888},
  year         = {2018}
}
@article{DBLP:journals/mta/YinNZTL18,
  author       = {Zhao{-}Xia Yin and
                  Xuejing Niu and
                  Xinpeng Zhang and
                  Jin Tang and
                  Bin Luo},
  title        = {Reversible data hiding in encrypted {AMBTC} images},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18067--18083},
  year         = {2018}
}
@article{DBLP:journals/spl/WangZY18,
  author       = {Zichi Wang and
                  Xinpeng Zhang and
                  Zhaoxia Yin},
  title        = {Joint Cover-Selection and Payload-Allocation by Steganographic Distortion
                  Optimization},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {25},
  number       = {10},
  pages        = {1530--1534},
  year         = {2018}
}
@inproceedings{DBLP:conf/bics/HongYL18,
  author       = {Zhigao Hong and
                  Zhao{-}Xia Yin and
                  Bin Luo},
  title        = {Improved Reversible Data Hiding in {JPEG} Images Based on Interval
                  Correlation},
  booktitle    = {{BICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10989},
  pages        = {687--696},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/ialp/FuYWL18,
  author       = {Lei Fu and
                  Zhaoxia Yin and
                  Xin Wang and
                  Yi Liu},
  title        = {A Hybrid Algorithm for Text Classification Based on {CNN-BLSTM} with
                  Attention},
  booktitle    = {{IALP}},
  pages        = {31--34},
  publisher    = {{IEEE}},
  year         = {2018}
}
@inproceedings{DBLP:conf/icccsec/PuyangYZ18,
  author       = {Yi Puyang and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {Reversible Data Embedding and Scrambling Method Based on {JPEG} Images},
  booktitle    = {{ICCCS} {(4)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {372--381},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icccsec/PuyangQYZ18,
  author       = {Yi Puyang and
                  Zhenxing Qian and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {Style Transferring Based Data Hiding for Color Images},
  booktitle    = {{ICCCS} {(4)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {440--449},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iwdw/PengY18,
  author       = {Yinyin Peng and
                  Zhao{-}Xia Yin},
  title        = {A Strategy of Distinguishing Texture Feature for Reversible Data Hiding
                  Based on Histogram Shifting},
  booktitle    = {{IWDW}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {206--215},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/nlpcc/FuYLZ18,
  author       = {Lei Fu and
                  Zhaoxia Yin and
                  Yi Liu and
                  Jun Zhang},
  title        = {Convolution Neural Network with Active Learning for Information Extraction
                  of Enterprise Announcements},
  booktitle    = {{NLPCC} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11109},
  pages        = {330--339},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/pcm/YinXQZ18,
  author       = {Zhaoxia Yin and
                  Youzhi Xiang and
                  Zhenxing Qian and
                  Xinpeng Zhang},
  title        = {Unified Data Hiding and Scrambling Method for {JPEG} Images},
  booktitle    = {{PCM} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11166},
  pages        = {373--383},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/wifs/PuyangYQ18,
  author       = {Yi Puyang and
                  Zhaoxia Yin and
                  Zhenxing Qian},
  title        = {Reversible Data Hiding in Encrypted Images with Two-MSB Prediction},
  booktitle    = {{WIFS}},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1812-09499,
  author       = {Youzhi Xiang and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {Reversible Data Hiding in Encrypted Images based on {MSB} Prediction
                  and Huffman Coding},
  journal      = {CoRR},
  volume       = {abs/1812.09499},
  year         = {2018}
}
@article{DBLP:journals/ieicet/CaoFYF17,
  author       = {Bing Cao and
                  Guorui Feng and
                  Zhaoxia Yin and
                  Lingyan Fan},
  title        = {Unsupervised Image Steganalysis Method Using Self-Learning Ensemble
                  Discriminant Clustering},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {5},
  pages        = {1144--1147},
  year         = {2017}
}
@article{DBLP:journals/mta/HongCYLM17,
  author       = {Wien Hong and
                  Tung{-}Shou Chen and
                  Zhao{-}Xia Yin and
                  Bin Luo and
                  Yuanbo Ma},
  title        = {Data hiding in {AMBTC} images using quantization level modification
                  and perturbation technique},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {3},
  pages        = {3761--3782},
  year         = {2017}
}
@article{DBLP:journals/mta/YinATZL17,
  author       = {Zhao{-}Xia Yin and
                  Andrew Abel and
                  Jin Tang and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Reversible data hiding in encrypted images based on multi-level encryption
                  and block histogram modification},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {3},
  pages        = {3899--3920},
  year         = {2017}
}
@inproceedings{DBLP:conf/icccsec/PuyangYFA17,
  author       = {Yi Puyang and
                  Zhaoxia Yin and
                  Guorui Feng and
                  Andrew K. Abel},
  title        = {An Improved Reversible Information Hiding Scheme Based on {AMBTC}
                  Compressed Images},
  booktitle    = {{ICCCS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10602},
  pages        = {49--60},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/msn/DuYZ17,
  author       = {Yang Du and
                  Zhaoxia Yin and
                  Xinpeng Zhang},
  title        = {An Improved Lossless Data Hiding Scheme in {JPEG} Bitstream by {VLC}
                  Mapping},
  booktitle    = {{MSN}},
  series       = {Communications in Computer and Information Science},
  volume       = {747},
  pages        = {84--98},
  publisher    = {Springer},
  year         = {2017}
}
@article{DBLP:journals/cogcom/YinNZTL16,
  author       = {Zhao{-}Xia Yin and
                  Xuejing Niu and
                  Zhili Zhou and
                  Jin Tang and
                  Bin Luo},
  title        = {Improved Reversible Image Authentication Scheme},
  journal      = {Cogn. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {890--899},
  year         = {2016}
}
@article{DBLP:journals/ijes/YinHTL16,
  author       = {Zhao{-}Xia Yin and
                  Wien Hong and
                  Jin Tang and
                  Bin Luo},
  title        = {High capacity reversible steganography in encrypted images based on
                  feature mining in plaintext domain},
  journal      = {Int. J. Embed. Syst.},
  volume       = {8},
  number       = {2/3},
  pages        = {249--257},
  year         = {2016}
}
@article{DBLP:journals/jei/WangZY16,
  author       = {Zichi Wang and
                  Xinpeng Zhang and
                  Zhaoxia Yin},
  title        = {Hybrid distortion function for {JPEG} steganography},
  journal      = {J. Electronic Imaging},
  volume       = {25},
  number       = {5},
  pages        = {050501},
  year         = {2016}
}
@article{DBLP:journals/scn/YinL16,
  author       = {Zhao{-}Xia Yin and
                  Bin Luo},
  title        = {MDE-based image steganography with large embedding capacity},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {8},
  pages        = {721--728},
  year         = {2016}
}
@inproceedings{DBLP:conf/cloudcomp/ZhangYZCW016,
  author       = {Hao Zhang and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Jianpeng Chen and
                  Ruonan Wang and
                  Bin Luo},
  title        = {Adaptive Algorithm Based on Reversible Data Hiding Method for {JPEG}
                  Images},
  booktitle    = {CloudComp},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {197},
  pages        = {196--203},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icassp/YinAZL16,
  author       = {Zhao{-}Xia Yin and
                  Andrew Abel and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Reversible data hiding in encrypted image based on block histogram
                  shifting},
  booktitle    = {{ICASSP}},
  pages        = {2129--2133},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/icccsec/CaoFY16,
  author       = {Bing Cao and
                  Guorui Feng and
                  Zhaoxia Yin},
  title        = {Optimizing Feature for {JPEG} Steganalysis via Gabor Filter and Co-occurrences
                  Matrices},
  booktitle    = {{ICCCS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {84--93},
  year         = {2016}
}
@inproceedings{DBLP:conf/iwdw/NiuYZTL16,
  author       = {Xuejing Niu and
                  Zhao{-}Xia Yin and
                  Xinpeng Zhang and
                  Jin Tang and
                  Bin Luo},
  title        = {Reversible Data Hiding in Encrypted {AMBTC} Compressed Images},
  booktitle    = {{IWDW}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {436--445},
  year         = {2016}
}
@article{DBLP:journals/iet-ipr/YinCXL15,
  author       = {Zhao{-}Xia Yin and
                  Chin{-}Chen Chang and
                  Qin Xu and
                  Bin Luo},
  title        = {Second-order steganographic method based on adaptive reference matrix},
  journal      = {{IET} Image Process.},
  volume       = {9},
  number       = {4},
  pages        = {300--305},
  year         = {2015}
}
@inproceedings{DBLP:conf/icccsec/YinWZLZ15,
  author       = {Zhao{-}Xia Yin and
                  Huabin Wang and
                  Haifeng Zhao and
                  Bin Luo and
                  Xinpeng Zhang},
  title        = {Complete Separable Reversible Data Hiding in Encrypted Image},
  booktitle    = {{ICCCS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9483},
  pages        = {101--110},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/igta/XiaYW15,
  author       = {Yan Xia and
                  Zhaoxia Yin and
                  Liangmin Wang},
  title        = {Image Data Embedding with Large Payload Based on Reference-Matrix},
  booktitle    = {{IGTA}},
  series       = {Communications in Computer and Information Science},
  volume       = {525},
  pages        = {55--62},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/IEEEias/YinCZ09,
  author       = {Zhao{-}Xia Yin and
                  Chin{-}Chen Chang and
                  Yan{-}Ping Zhang},
  title        = {A High Embedding Efficiency Steganography Scheme for Wet Paper Codes},
  booktitle    = {{IAS}},
  pages        = {611--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics