Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhao-Xia Yin
@article{DBLP:journals/eswa/YuanZWY24, author = {Zihan Yuan and Xinpeng Zhang and Zichi Wang and Zhaoxia Yin}, title = {Semi-fragile neural network watermarking for content authentication and tampering localization}, journal = {Expert Syst. Appl.}, volume = {236}, pages = {121315}, year = {2024} }
@article{DBLP:journals/mta/ChenZAY24, author = {Li Chen and Shaowei Zhu and Abel Andrew and Zhaoxia Yin}, title = {Reversible attack based on local visible adversarial perturbation}, journal = {Multim. Tools Appl.}, volume = {83}, number = {4}, pages = {11215--11227}, year = {2024} }
@article{DBLP:journals/tcsv/ZhouHZYH24, author = {Xiaoyi Zhou and Kaiyue Hou and Yu{-}Jian Zhuang and Zhaoxia Yin and Wenbao Han}, title = {General Pairwise Modification Framework for Reversible Data Hiding in {JPEG} Images}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {1}, pages = {153--167}, year = {2024} }
@article{DBLP:journals/visintelligence/TangYSL024, author = {Lichun Tang and Zhaoxia Yin and Hang Su and Wanli Lyu and Bin Luo}, title = {{WFSS:} weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks}, journal = {Vis. Intell.}, volume = {2}, number = {1}, year = {2024} }
@article{DBLP:journals/cviu/ChenYYMCPGYS23, author = {Jiawei Chen and Xiao Yang and Heng Yin and Mingzhi Ma and Bihui Chen and Jianteng Peng and Yandong Guo and Zhaoxia Yin and Hang Su}, title = {AdvFAS: {A} robust face anti-spoofing framework against adversarial examples}, journal = {Comput. Vis. Image Underst.}, volume = {235}, pages = {103779}, year = {2023} }
@article{DBLP:journals/eswa/DuanLYZL23, author = {Xiaolong Duan and Bin Li and Zhaoxia Yin and Xinpeng Zhang and Bin Luo}, title = {Robust image steganography against lossy {JPEG} compression based on embedding domain selection and adaptive error correction}, journal = {Expert Syst. Appl.}, volume = {229}, number = {Part {A}}, pages = {120416}, year = {2023} }
@article{DBLP:journals/jvcir/LyuYY23, author = {Wan{-}Li Lyu and Yajie Yue and Zhaoxia Yin}, title = {Reversible data hiding based on automatic contrast enhancement using histogram expansion}, journal = {J. Vis. Commun. Image Represent.}, volume = {92}, pages = {103798}, year = {2023} }
@article{DBLP:journals/prl/YinCLL23, author = {Zhaoxia Yin and Li Chen and Wanli Lyu and Bin Luo}, title = {Reversible attack based on adversarial perturbation and reversible data hiding in {YUV} colorspace}, journal = {Pattern Recognit. Lett.}, volume = {166}, pages = {1--7}, year = {2023} }
@inproceedings{DBLP:conf/apsipa/YinYYLW23, author = {Yujie Yin and Heng Yin and Zhaoxia Yin and Wanli Lyu and Sha Wei}, title = {High-Quality Triggers Based Fragile Watermarking for Optical Character Recognition Model}, booktitle = {{APSIPA} {ASC}}, pages = {468--475}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/apsipa/LyuCYL23, author = {Wanli Lyu and Lulu Cheng and Zhaoxia Yin and Bin Luo}, title = {Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB Substitution and Ring-prediction}, booktitle = {{APSIPA} {ASC}}, pages = {1907--1914}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/apsipa/LyuWYL23, author = {Wanli Lyu and Mengjiang Wu and Zhaoxia Yin and Bin Luo}, title = {MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial Attacks}, booktitle = {{APSIPA} {ASC}}, pages = {1915--1922}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/icct/DuanYYL23, author = {Jialin Duan and Zhaoxia Yin and Chenyi Yang and Kunhao Liang}, title = {Reversible Data Hiding Based on Elastic Net Predictor}, booktitle = {{ICCT}}, pages = {1247--1252}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/icip/MaZLRSY23, author = {Mingzhi Ma and Weijie Zheng and Wanli Lv and Lu Ren and Hang Su and Zhaoxia Yin}, title = {Multi-Label Adversarial Attack Based on Label Correlation}, booktitle = {{ICIP}}, pages = {2050--2054}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/icip/ZhangWLY23, author = {Jiefei Zhang and Jie Wang and Wanli Lyu and Zhaoxia Yin}, title = {Local Texture Complexity Guided Adversarial Attack}, booktitle = {{ICIP}}, pages = {2065--2069}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/ijcnn/ZhuYLZL23, author = {Tong Zhu and Zhaoxia Yin and Wanli Lyu and Jiefei Zhang and Bin Luo}, title = {Imperceptible Adversarial Attack on {S} Channel of {HSV} Colorspace}, booktitle = {{IJCNN}}, pages = {1--7}, publisher = {{IEEE}}, year = {2023} }
@article{DBLP:journals/corr/abs-2304-13297, author = {Xiaolong Duan and Bin Li and Zhaoxia Yin and Xinpeng Zhang and Bin Luo}, title = {Robust image steganography against lossy {JPEG} compression based on embedding domain selection and adaptive error correction}, journal = {CoRR}, volume = {abs/2304.13297}, year = {2023} }
@article{DBLP:journals/corr/abs-2305-04436, author = {Zhaoxia Yin and Shaowei Zhu and Hang Su and Jianteng Peng and Wanli Lyu and Bin Luo}, title = {Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization}, journal = {CoRR}, volume = {abs/2305.04436}, year = {2023} }
@article{DBLP:journals/corr/abs-2305-09684, author = {Zhaoxia Yin and Heng Yin and Hang Su and Xinpeng Zhang and Zhenzhe Gao}, title = {Decision-based iterative fragile watermarking for model integrity verification}, journal = {CoRR}, volume = {abs/2305.09684}, year = {2023} }
@article{DBLP:journals/corr/abs-2308-02116, author = {Jiawei Chen and Xiao Yang and Heng Yin and Mingzhi Ma and Bihui Chen and Jianteng Peng and Yandong Guo and Zhaoxia Yin and Hang Su}, title = {AdvFAS: {A} robust face anti-spoofing framework against adversarial examples}, journal = {CoRR}, volume = {abs/2308.02116}, year = {2023} }
@article{DBLP:journals/corr/abs-2308-11235, author = {Zhenzhe Gao and Zhaoxia Yin and Hongjian Zhan and Heng Yin and Yue Lu}, title = {Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks}, journal = {CoRR}, volume = {abs/2308.11235}, year = {2023} }
@article{DBLP:journals/cogcom/XuTLY22, author = {Na Xu and Jin Tang and Bin Luo and Zhaoxia Yin}, title = {Separable Reversible Data Hiding Based on Integer Mapping and {MSB} Prediction for Encrypted 3D Mesh Models}, journal = {Cogn. Comput.}, volume = {14}, number = {3}, pages = {1172--1181}, year = {2022} }
@article{DBLP:journals/compsec/WangYJTL22, author = {Jie Wang and Zhaoxia Yin and Jing Jiang and Jin Tang and Bin Luo}, title = {{PISA:} Pixel skipping-based attentional black-box adversarial attack}, journal = {Comput. Secur.}, volume = {123}, pages = {102947}, year = {2022} }
@article{DBLP:journals/ijis/WangYJD22, author = {Jie Wang and Zhaoxia Yin and Jing Jiang and Yang Du}, title = {Attention-guided black-box adversarial attacks with large-scale multiobjective evolutionary optimization}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7526--7547}, year = {2022} }
@article{DBLP:journals/isci/DuY22, author = {Yang Du and Zhaoxia Yin}, title = {New framework for code-mapping-based reversible data hiding in {JPEG} images}, journal = {Inf. Sci.}, volume = {609}, pages = {319--338}, year = {2022} }
@article{DBLP:journals/sigpro/LyuCY22, author = {Wan{-}Li Lyu and Lulu Cheng and Zhaoxia Yin}, title = {High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction}, journal = {Signal Process.}, volume = {201}, pages = {108686}, year = {2022} }
@article{DBLP:journals/tdsc/YinPX22, author = {Zhaoxia Yin and Yinyin Peng and Youzhi Xiang}, title = {Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {992--1002}, year = {2022} }
@article{DBLP:journals/tdsc/DuYZ22, author = {Yang Du and Zhaoxia Yin and Xinpeng Zhang}, title = {High Capacity Lossless Data Hiding in {JPEG} Bitstream Based on General {VLC} Mapping}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1420--1433}, year = {2022} }
@inproceedings{DBLP:conf/icip/YinY022, author = {Zhaoxia Yin and Heng Yin and Xinpeng Zhang}, title = {Neural Network Fragile watermarking With No Model Performance Degradation}, booktitle = {{ICIP}}, pages = {3958--3962}, publisher = {{IEEE}}, year = {2022} }
@inproceedings{DBLP:conf/iftc/ZhuLLY022, author = {Shaowei Zhu and Wanli Lyu and Bin Li and Zhaoxia Yin and Bin Luo}, title = {Adversarial Example Defense via Perturbation Grading Strategy}, booktitle = {{IFTC}}, series = {Communications in Computer and Information Science}, volume = {1766}, pages = {407--420}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iftc/YinY0022, author = {Wen Yin and Zhaoxia Yin and Xinpeng Zhang and Bin Luo}, title = {On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy"}, booktitle = {{IFTC}}, series = {Communications in Computer and Information Science}, volume = {1766}, pages = {512--524}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iwdw/TangCLY22, author = {Yun Tang and Lulu Cheng and Wanli Lyu and Zhaoxia Yin}, title = {High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology}, booktitle = {{IWDW}}, series = {Lecture Notes in Computer Science}, volume = {13825}, pages = {205--218}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/mmsp/WangFYL22, author = {Qingyu Wang and Guorui Feng and Zhaoxia Yin and Bin Luo}, title = {Universal adversarial perturbation for remote sensing images}, booktitle = {{MMSP}}, pages = {1--6}, publisher = {{IEEE}}, year = {2022} }
@article{DBLP:journals/corr/abs-2202-10693, author = {Zhaoxia Yin and Qingyu Wang and Jin Tang and Bin Luo}, title = {Universal adversarial perturbation for remote sensing images}, journal = {CoRR}, volume = {abs/2202.10693}, year = {2022} }
@article{DBLP:journals/corr/abs-2208-07585, author = {Zhaoxia Yin and Heng Yin and Xinpeng Zhang}, title = {Neural network fragile watermarking with no model performance degradation}, journal = {CoRR}, volume = {abs/2208.07585}, year = {2022} }
@article{DBLP:journals/corr/abs-2211-02801, author = {Yun Tang and Lulu Cheng and Wanli Lyv and Zhaoxia Yin}, title = {High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology}, journal = {CoRR}, volume = {abs/2211.02801}, year = {2022} }
@article{DBLP:journals/corr/abs-2212-08341, author = {Shaowei Zhu and Wanli Lyu and Bin Li and Zhaoxia Yin and Bin Luo}, title = {Adversarial Example Defense via Perturbation Grading Strategy}, journal = {CoRR}, volume = {abs/2212.08341}, year = {2022} }
@article{DBLP:journals/mta/KeY21, author = {Longfei Ke and Zhaoxia Yin}, title = {On the security and robustness of "Keyless dynamic optimal multi-bit image steganography using energetic pixels"}, journal = {Multim. Tools Appl.}, volume = {80}, number = {3}, pages = {3997--4005}, year = {2021} }
@article{DBLP:journals/sigpro/YinSTL21, author = {Zhaoxia Yin and Xiaomeng She and Jin Tang and Bin Luo}, title = {Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement}, journal = {Signal Process.}, volume = {187}, pages = {108146}, year = {2021} }
@article{DBLP:journals/tsipn/YinK21, author = {Zhaoxia Yin and Longfei Ke}, title = {Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {7}, pages = {336--345}, year = {2021} }
@inproceedings{DBLP:conf/acmturc/LvGDHY21, author = {Wanli Lv and Hongnian Guo and Yang Du and Jinmin Hu and Zhaoxia Yin}, title = {Multi-domain Reversible Data Hiding in {JPEG} Images}, booktitle = {{ACM} {TUR-C}}, pages = {241--247}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/icmcs/ShiLYZQ21, author = {Mengte Shi and Sheng Li and Zhaoxia Yin and Xinpeng Zhang and Zhenxing Qian}, title = {On Generating {JPEG} Adversarial Images}, booktitle = {{ICME}}, pages = {1--6}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/ksem/ZhuWLYZQ21, author = {Renjie Zhu and Ping Wei and Sheng Li and Zhaoxia Yin and Xinpeng Zhang and Zhenxing Qian}, title = {Fragile Neural Network Watermarking with Trigger Image Set}, booktitle = {{KSEM}}, series = {Lecture Notes in Computer Science}, volume = {12815}, pages = {280--293}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/prcv/YinXWCL21, author = {Zhaoxia Yin and Na Xu and Feng Wang and Lulu Cheng and Bin Luo}, title = {Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB Prediction for Encrypted 3D Mesh Models}, booktitle = {{PRCV} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {13020}, pages = {336--348}, publisher = {Springer}, year = {2021} }
@article{DBLP:journals/corr/abs-2101-07512, author = {Jie Wang and Zhaoxia Yin and Jing Jiang and Yang Du}, title = {Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization}, journal = {CoRR}, volume = {abs/2101.07512}, year = {2021} }
@article{DBLP:journals/corr/abs-2101-07538, author = {Jie Wang and Zhaoxia Yin and Jin Tang and Jing Jiang and Bin Luo}, title = {{PICA:} {A} Pixel Correlation-based Attentional Black-box Adversarial Attack}, journal = {CoRR}, volume = {abs/2101.07538}, year = {2021} }
@article{DBLP:journals/corr/abs-2102-12620, author = {Youqing Wu and Wenjing Ma and Zhaoxia Yin}, title = {High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive Encoding}, journal = {CoRR}, volume = {abs/2102.12620}, year = {2021} }
@article{DBLP:journals/corr/abs-2109-11735, author = {Wen Yin and Longfei Ke and Zhaoxia Yin and Jin Tang and Bin Luo}, title = {Comments on "Robust reversible data hiding scheme based on two-layer embedding strategy"}, journal = {CoRR}, volume = {abs/2109.11735}, year = {2021} }
@article{DBLP:journals/corr/abs-2110-01010, author = {Wanli Lv and Lulu Cheng and Zhaoxia Yin}, title = {High Capacity Reversible Data Hiding in Encrypted 3D mesh models Based on multi-MSB Prediction}, journal = {CoRR}, volume = {abs/2110.01010}, year = {2021} }
@article{DBLP:journals/corr/abs-2110-02700, author = {Zhaoxia Yin and Li Chen and Shaowei Zhu}, title = {Reversible adversarial examples against local visual perturbation}, journal = {CoRR}, volume = {abs/2110.02700}, year = {2021} }
@article{DBLP:journals/ijis/YinWWTW20, author = {Zhaoxia Yin and Hua Wang and Jie Wang and Jin Tang and Wenzhong Wang}, title = {Defense against adversarial attacks by low-level image transformations}, journal = {Int. J. Intell. Syst.}, volume = {35}, number = {10}, pages = {1453--1466}, year = {2020} }
@article{DBLP:journals/mta/ChuangHCY20, author = {Jun{-}Chou Chuang and Yu{-}Chen Hu and Chia{-}Mei Chen and Zhaoxia Yin}, title = {Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding}, journal = {Multim. Tools Appl.}, volume = {79}, number = {37-38}, pages = {28189--28205}, year = {2020} }
@article{DBLP:journals/tcsv/YinJL20, author = {Zhaoxia Yin and Yuan Ji and Bin Luo}, title = {Reversible Data Hiding in {JPEG} Images With Multi-Objective Optimization}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {8}, pages = {2343--2352}, year = {2020} }
@article{DBLP:journals/tmm/YinXZ20, author = {Zhaoxia Yin and Youzhi Xiang and Xinpeng Zhang}, title = {Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding}, journal = {{IEEE} Trans. Multim.}, volume = {22}, number = {4}, pages = {874--884}, year = {2020} }
@article{DBLP:journals/tmm/WuXGTY20, author = {Youqing Wu and Youzhi Xiang and Yutang Guo and Jin Tang and Zhaoxia Yin}, title = {An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling}, journal = {{IEEE} Trans. Multim.}, volume = {22}, number = {8}, pages = {1929--1938}, year = {2020} }
@inproceedings{DBLP:conf/ml4cs/YinWW20, author = {Zhaoxia Yin and Hua Wang and Jie Wang}, title = {War: An Efficient Pre-processing Method for Defending Adversarial Attacks}, booktitle = {{ML4CS} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {12487}, pages = {514--524}, publisher = {Springer}, year = {2020} }
@article{DBLP:journals/corr/abs-2006-15984, author = {Zhaoxia Yin and Yang Du and Yuan Ji}, title = {A Universal Framework to Construct a Huffman-Code-Mapping-based Reversible Data Hiding Scheme for {JPEG} Images}, journal = {CoRR}, volume = {abs/2006.15984}, year = {2020} }
@article{DBLP:journals/corr/abs-2007-03922, author = {Zhaoxia Yin and Xiaomeng She and Jin Tang and Bin Luo}, title = {Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement}, journal = {CoRR}, volume = {abs/2007.03922}, year = {2020} }
@article{DBLP:journals/corr/abs-2007-04057, author = {Youqing Wu and Wenjing Ma and Yinyin Peng and Ruiling Zhang and Zhaoxia Yin}, title = {Reversible Data Hiding in Encrypted Images Based on Bit plane Compression of Prediction Error}, journal = {CoRR}, volume = {abs/2007.04057}, year = {2020} }
@article{DBLP:journals/corr/abs-2007-08301, author = {Zhaoxia Yin and Longfei Ke}, title = {Robust adaptive steganography based on dither modulation and modification with re-compression}, journal = {CoRR}, volume = {abs/2007.08301}, year = {2020} }
@article{DBLP:journals/corr/abs-2011-04959, author = {Zhaoxia Yin and Hongnian Guo and Yang Du}, title = {Multi-domain Reversible Data Hiding in {JPEG}}, journal = {CoRR}, volume = {abs/2011.04959}, year = {2020} }
@article{DBLP:journals/ijdcf/WangYZ19, author = {Zichi Wang and Zhaoxia Yin and Xinpeng Zhang}, title = {Asymmetric Distortion Function for {JPEG} Steganography Using Block Artifact Compensation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {90--99}, year = {2019} }
@article{DBLP:journals/sigpro/JiaYZL19, author = {Yujie Jia and Zhaoxia Yin and Xinpeng Zhang and Yonglong Luo}, title = {Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting}, journal = {Signal Process.}, volume = {163}, pages = {238--246}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-03533, author = {Zhaoxia Yin and Yuan Ji and Bin Luo}, title = {Reversible Data Hiding in {JPEG} Images with Multi-objective Optimization}, journal = {CoRR}, volume = {abs/1905.03533}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-05365, author = {Yujie Jia and Zhaoxia Yin and Xinpeng Zhang and Yonglong Luo}, title = {Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting}, journal = {CoRR}, volume = {abs/1905.05365}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-05627, author = {Yang Du and Zhaoxia Yin and Xinpeng Zhang}, title = {High Capacity Lossless Data Hiding for {JPEG} images by {NLCM} Relationship Constrcution}, journal = {CoRR}, volume = {abs/1905.05627}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-08614, author = {Hua Wang and Jie Wang and Zhaoxia Yin}, title = {War: Detecting adversarial examples by pre-processing input data}, journal = {CoRR}, volume = {abs/1905.08614}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-09625, author = {Youqing Wu and Youzhi Xiang and Yutang Guo and Jin Tang and Zhaoxia Yin}, title = {An Improved Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling}, journal = {CoRR}, volume = {abs/1905.09625}, year = {2019} }
@article{DBLP:journals/corr/abs-1906-03175, author = {Xiaoqing Liu and Yinyin Peng and Jie Wang and Zhaoxia Yin}, title = {Image Encryption Algorithm Based on Facebook Social Network}, journal = {CoRR}, volume = {abs/1906.03175}, year = {2019} }
@article{DBLP:journals/corr/abs-1908-02473, author = {Na Xu and Zhaoxia Yin}, title = {Separable Reversible Data Hiding Based on {MSB} Prediction for Encrypted 3D Mesh Models}, journal = {CoRR}, volume = {abs/1908.02473}, year = {2019} }
@article{DBLP:journals/corr/abs-1911-01699, author = {Zhaoxia Yin and Yinyin Peng and Youzhi Xiang}, title = {Reversible Data Hiding in Encrypted Images based on Pixel Prediction and Bit-plane Compression}, journal = {CoRR}, volume = {abs/1911.01699}, year = {2019} }
@article{DBLP:journals/corr/abs-1911-02360, author = {Hua Wang and Zhaoxia Yin}, title = {Reversible Adversarial Examples based on Reversible Image Transformation}, journal = {CoRR}, volume = {abs/1911.02360}, year = {2019} }
@article{DBLP:journals/ijet/Yin18, author = {Zhaoxia Yin}, title = {Training {\&} Evaluation System of Intelligent Oral Phonics Based on Speech Recognition Technology}, journal = {Int. J. Emerg. Technol. Learn.}, volume = {13}, number = {4}, pages = {45--57}, year = {2018} }
@article{DBLP:journals/istr/PengNFY18, author = {Yinyin Peng and Xuejing Niu and Lei Fu and Zhao{-}Xia Yin}, title = {Image authentication scheme based on reversible fragile watermarking with two images}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {236--246}, year = {2018} }
@article{DBLP:journals/mta/WeiYWZ18, author = {Qingde Wei and Zhaoxia Yin and Zichi Wang and Xinpeng Zhang}, title = {Distortion function based on residual blocks for {JPEG} steganography}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17875--17888}, year = {2018} }
@article{DBLP:journals/mta/YinNZTL18, author = {Zhao{-}Xia Yin and Xuejing Niu and Xinpeng Zhang and Jin Tang and Bin Luo}, title = {Reversible data hiding in encrypted {AMBTC} images}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18067--18083}, year = {2018} }
@article{DBLP:journals/spl/WangZY18, author = {Zichi Wang and Xinpeng Zhang and Zhaoxia Yin}, title = {Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization}, journal = {{IEEE} Signal Process. Lett.}, volume = {25}, number = {10}, pages = {1530--1534}, year = {2018} }
@inproceedings{DBLP:conf/bics/HongYL18, author = {Zhigao Hong and Zhao{-}Xia Yin and Bin Luo}, title = {Improved Reversible Data Hiding in {JPEG} Images Based on Interval Correlation}, booktitle = {{BICS}}, series = {Lecture Notes in Computer Science}, volume = {10989}, pages = {687--696}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/ialp/FuYWL18, author = {Lei Fu and Zhaoxia Yin and Xin Wang and Yi Liu}, title = {A Hybrid Algorithm for Text Classification Based on {CNN-BLSTM} with Attention}, booktitle = {{IALP}}, pages = {31--34}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/icccsec/PuyangYZ18, author = {Yi Puyang and Zhaoxia Yin and Xinpeng Zhang}, title = {Reversible Data Embedding and Scrambling Method Based on {JPEG} Images}, booktitle = {{ICCCS} {(4)}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {372--381}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icccsec/PuyangQYZ18, author = {Yi Puyang and Zhenxing Qian and Zhaoxia Yin and Xinpeng Zhang}, title = {Style Transferring Based Data Hiding for Color Images}, booktitle = {{ICCCS} {(4)}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {440--449}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iwdw/PengY18, author = {Yinyin Peng and Zhao{-}Xia Yin}, title = {A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting}, booktitle = {{IWDW}}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {206--215}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/nlpcc/FuYLZ18, author = {Lei Fu and Zhaoxia Yin and Yi Liu and Jun Zhang}, title = {Convolution Neural Network with Active Learning for Information Extraction of Enterprise Announcements}, booktitle = {{NLPCC} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {11109}, pages = {330--339}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/pcm/YinXQZ18, author = {Zhaoxia Yin and Youzhi Xiang and Zhenxing Qian and Xinpeng Zhang}, title = {Unified Data Hiding and Scrambling Method for {JPEG} Images}, booktitle = {{PCM} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {11166}, pages = {373--383}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/wifs/PuyangYQ18, author = {Yi Puyang and Zhaoxia Yin and Zhenxing Qian}, title = {Reversible Data Hiding in Encrypted Images with Two-MSB Prediction}, booktitle = {{WIFS}}, pages = {1--7}, publisher = {{IEEE}}, year = {2018} }
@article{DBLP:journals/corr/abs-1812-09499, author = {Youzhi Xiang and Zhaoxia Yin and Xinpeng Zhang}, title = {Reversible Data Hiding in Encrypted Images based on {MSB} Prediction and Huffman Coding}, journal = {CoRR}, volume = {abs/1812.09499}, year = {2018} }
@article{DBLP:journals/ieicet/CaoFYF17, author = {Bing Cao and Guorui Feng and Zhaoxia Yin and Lingyan Fan}, title = {Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {5}, pages = {1144--1147}, year = {2017} }
@article{DBLP:journals/mta/HongCYLM17, author = {Wien Hong and Tung{-}Shou Chen and Zhao{-}Xia Yin and Bin Luo and Yuanbo Ma}, title = {Data hiding in {AMBTC} images using quantization level modification and perturbation technique}, journal = {Multim. Tools Appl.}, volume = {76}, number = {3}, pages = {3761--3782}, year = {2017} }
@article{DBLP:journals/mta/YinATZL17, author = {Zhao{-}Xia Yin and Andrew Abel and Jin Tang and Xinpeng Zhang and Bin Luo}, title = {Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification}, journal = {Multim. Tools Appl.}, volume = {76}, number = {3}, pages = {3899--3920}, year = {2017} }
@inproceedings{DBLP:conf/icccsec/PuyangYFA17, author = {Yi Puyang and Zhaoxia Yin and Guorui Feng and Andrew K. Abel}, title = {An Improved Reversible Information Hiding Scheme Based on {AMBTC} Compressed Images}, booktitle = {{ICCCS} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10602}, pages = {49--60}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/msn/DuYZ17, author = {Yang Du and Zhaoxia Yin and Xinpeng Zhang}, title = {An Improved Lossless Data Hiding Scheme in {JPEG} Bitstream by {VLC} Mapping}, booktitle = {{MSN}}, series = {Communications in Computer and Information Science}, volume = {747}, pages = {84--98}, publisher = {Springer}, year = {2017} }
@article{DBLP:journals/cogcom/YinNZTL16, author = {Zhao{-}Xia Yin and Xuejing Niu and Zhili Zhou and Jin Tang and Bin Luo}, title = {Improved Reversible Image Authentication Scheme}, journal = {Cogn. Comput.}, volume = {8}, number = {5}, pages = {890--899}, year = {2016} }
@article{DBLP:journals/ijes/YinHTL16, author = {Zhao{-}Xia Yin and Wien Hong and Jin Tang and Bin Luo}, title = {High capacity reversible steganography in encrypted images based on feature mining in plaintext domain}, journal = {Int. J. Embed. Syst.}, volume = {8}, number = {2/3}, pages = {249--257}, year = {2016} }
@article{DBLP:journals/jei/WangZY16, author = {Zichi Wang and Xinpeng Zhang and Zhaoxia Yin}, title = {Hybrid distortion function for {JPEG} steganography}, journal = {J. Electronic Imaging}, volume = {25}, number = {5}, pages = {050501}, year = {2016} }
@article{DBLP:journals/scn/YinL16, author = {Zhao{-}Xia Yin and Bin Luo}, title = {MDE-based image steganography with large embedding capacity}, journal = {Secur. Commun. Networks}, volume = {9}, number = {8}, pages = {721--728}, year = {2016} }
@inproceedings{DBLP:conf/cloudcomp/ZhangYZCW016, author = {Hao Zhang and Zhaoxia Yin and Xinpeng Zhang and Jianpeng Chen and Ruonan Wang and Bin Luo}, title = {Adaptive Algorithm Based on Reversible Data Hiding Method for {JPEG} Images}, booktitle = {CloudComp}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {197}, pages = {196--203}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icassp/YinAZL16, author = {Zhao{-}Xia Yin and Andrew Abel and Xinpeng Zhang and Bin Luo}, title = {Reversible data hiding in encrypted image based on block histogram shifting}, booktitle = {{ICASSP}}, pages = {2129--2133}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/icccsec/CaoFY16, author = {Bing Cao and Guorui Feng and Zhaoxia Yin}, title = {Optimizing Feature for {JPEG} Steganalysis via Gabor Filter and Co-occurrences Matrices}, booktitle = {{ICCCS} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {84--93}, year = {2016} }
@inproceedings{DBLP:conf/iwdw/NiuYZTL16, author = {Xuejing Niu and Zhao{-}Xia Yin and Xinpeng Zhang and Jin Tang and Bin Luo}, title = {Reversible Data Hiding in Encrypted {AMBTC} Compressed Images}, booktitle = {{IWDW}}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {436--445}, year = {2016} }
@article{DBLP:journals/iet-ipr/YinCXL15, author = {Zhao{-}Xia Yin and Chin{-}Chen Chang and Qin Xu and Bin Luo}, title = {Second-order steganographic method based on adaptive reference matrix}, journal = {{IET} Image Process.}, volume = {9}, number = {4}, pages = {300--305}, year = {2015} }
@inproceedings{DBLP:conf/icccsec/YinWZLZ15, author = {Zhao{-}Xia Yin and Huabin Wang and Haifeng Zhao and Bin Luo and Xinpeng Zhang}, title = {Complete Separable Reversible Data Hiding in Encrypted Image}, booktitle = {{ICCCS}}, series = {Lecture Notes in Computer Science}, volume = {9483}, pages = {101--110}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/igta/XiaYW15, author = {Yan Xia and Zhaoxia Yin and Liangmin Wang}, title = {Image Data Embedding with Large Payload Based on Reference-Matrix}, booktitle = {{IGTA}}, series = {Communications in Computer and Information Science}, volume = {525}, pages = {55--62}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/IEEEias/YinCZ09, author = {Zhao{-}Xia Yin and Chin{-}Chen Chang and Yan{-}Ping Zhang}, title = {A High Embedding Efficiency Steganography Scheme for Wet Paper Codes}, booktitle = {{IAS}}, pages = {611--614}, publisher = {{IEEE} Computer Society}, year = {2009} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.