default search action
Peisong He
Person information
- unicode name: 何沛松
- affiliation: Sichuan University, College of Cybersecurity, Chengdu, China
- affiliation (former, PhD 2018): Shanghai Jiao Tong University, School of Information Security Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Shenglie Zhou, Peisong He, Jiayong Liu, Jie Luo:
Towards robust image watermarking via random distortion assignment based meta-learning. J. Vis. Commun. Image Represent. 103: 104238 (2024) - [i1]Peisong He, Leyao Zhu, Jiaxing Li, Shiqi Wang, Haoliang Li:
Exposing AI-generated Videos: A Benchmark Dataset and a Local-and-Global Temporal Defect Based Detection Method. CoRR abs/2405.04133 (2024) - 2023
- [j31]Jie Luo, Peisong He, Jiayong Liu, Hong-Xia Wang, Chunwang Wu, Chao Yuan, Qiang Xia:
Improving security for image steganography using content-adaptive adversarial perturbations. Appl. Intell. 53(12): 16059-16076 (2023) - [j30]Xiong Xu, Shuai Tang, Mingcheng Zhu, Peisong He, Sirui Li, Yun Cao:
A novel model compression method based on joint distillation for deepfake video detection. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101792 (2023) - [j29]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Shenglie Zhou:
Reversible adversarial steganography for security enhancement. J. Vis. Commun. Image Represent. 97: 103935 (2023) - [j28]Jingyuan Zhang, Hongxia Wang, Peisong He:
Dual-branch multi-scale densely connected network for image splicing detection and localization. Signal Process. Image Commun. 119: 117045 (2023) - [j27]Yanjiang Zhou, Peisong He, Weichuang Li, Yun Cao, Xinghao Jiang:
Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning. IEEE Signal Process. Lett. 30: 1767-1771 (2023) - [j26]Yi Dong, Xinghao Jiang, Zhaohong Li, Tanfeng Sun, Peisong He:
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model. IEEE Trans. Dependable Secur. Comput. 20(1): 769-783 (2023) - [j25]Ruimei Zhang, Hongxia Wang, Ju H. Park, Peisong He, Xiangpeng Xie:
Event-Triggered Impulsive Fault-Tolerant Control for Memristor-Based RDNNs With Actuator Faults. IEEE Trans. Neural Networks Learn. Syst. 34(6): 2993-3004 (2023) - [j24]Ruimei Zhang, Hongxia Wang, Ju H. Park, Kaibo Shi, Peisong He:
Mode-Dependent Adaptive Event-Triggered Control for Stabilization of Markovian Memristor-Based Reaction-Diffusion Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 34(8): 3939-3951 (2023) - [c13]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Yijing Chen, Wanjie Li, Jiangchuan Li:
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning. ICME 2023: 49-54 - 2022
- [j23]Jialong Li, Hongxia Wang, Peisong He, Sani M. Abdullahi, Bin Li:
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection. Digit. Signal Process. 120: 103256 (2022) - [j22]Menghua Chen, Peisong He, Jiayong Liu:
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography. J. Vis. Commun. Image Represent. 89: 103646 (2022) - [j21]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Exposing unseen GAN-generated image using unsupervised domain adaptation. Knowl. Based Syst. 257: 109905 (2022) - [j20]Chao Yuan, Hongxia Wang, Peisong He, Jie Luo, Bin Li:
GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion. Multim. Tools Appl. 81(5): 6681-6701 (2022) - [j19]Weichuang Li, Peisong He, Haoliang Li, Hongxia Wang, Ruimei Zhang:
Detection of GAN-Generated Images by Estimating Artifact Similarity. IEEE Signal Process. Lett. 29: 862-866 (2022) - [j18]Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j17]Lei Zhang, Sani M. Abdullahi, Peisong He, Hongxia Wang:
Dataset mismatched steganalysis using subdomain adaptation with guiding feature. Telecommun. Syst. 80(2): 263-276 (2022) - [j16]Ruimei Zhang, Hongxia Wang, Ju H. Park, Peisong He, Deqiang Zeng, Xiangpeng Xie:
Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks. IEEE Trans. Fuzzy Syst. 30(8): 3347-3359 (2022) - [j15]Ruimei Zhang, Hongxia Wang, Ju H. Park, Hak-Keung Lam, Peisong He:
Quasisynchronization of Reaction-Diffusion Neural Networks Under Deception Attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(12): 7833-7844 (2022) - [c12]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Improving GAN-Generated Image Detection Generalization Using Unsupervised Domain Adaptation. ICME 2022: 1-6 - 2021
- [j14]Peisong He, Hongxia Wang, Ruimei Zhang, Yue Li:
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency. Secur. Commun. Networks 2021: 5568351:1-5568351:14 (2021) - [j13]Peisong He, Haoliang Li, Hongxia Wang, Shiqi Wang, Xinghao Jiang, Ruimei Zhang:
Frame-Wise Detection of Double HEVC Compression by Learning Deep Spatio-Temporal Representations in Compression Domain. IEEE Trans. Multim. 23: 3179-3192 (2021) - [c11]Ling Yang, Hongxia Wang, Yulin Zhang, Jinhe Li, Peisong He, Sijiang Meng:
A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks. IWDW 2021: 149-162 - 2020
- [j12]Asad Malik, Peisong He, Hongxia Wang, Ahmad Neyaz Khan, Saied Pirasteh, Sani M. Abdullahi:
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access 8: 148997-149010 (2020) - [j11]Haoliang Li, Shiqi Wang, Peisong He, Anderson Rocha:
Face Anti-Spoofing With Deep Neural Network Distillation. IEEE J. Sel. Top. Signal Process. 14(5): 933-946 (2020) - [j10]Peisong He, Haoliang Li, Hongxia Wang, Ruimei Zhang:
Detection of Computer Graphics Using Attention-Based Dual-Branch Convolutional Neural Network from Fused Color Components. Sensors 20(17): 4743 (2020) - [j9]Peisong He, Haoliang Li, Bin Li, Hongxia Wang, Liang Liu:
Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4034-4049 (2020) - [j8]Xinghao Jiang, Qiang Xu, Tanfeng Sun, Bin Li, Peisong He:
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process. IEEE Trans. Inf. Forensics Secur. 15: 250-263 (2020) - [c10]Hongxia Wang, Zhilong Chen, Peisong He:
Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach. IWDW 2020: 53-67
2010 – 2019
- 2019
- [j7]Xinghao Jiang, Peisong He, Tanfeng Sun, Renfang Wang:
Detection of Double Compressed HEVC Videos Using GOP-Based PU Type Statistics. IEEE Access 7: 95364-95375 (2019) - [c9]Yong Fu, Tanfeng Sun, Xinghao Jiang, Ke Xu, Peisong He:
Robust GAN-Face Detection Based on Dual-Channel CNN Network. CISP-BMEI 2019: 1-5 - [c8]Qiyuan Wu, Tanfeng Sun, Xinghao Jiang, Ke Xu, Qiang Xu, Peisong He:
HEVC Double Compression Detection with Non-Aligned GOP Structures Based on a Fusion Feature with Optical Flow and Prediction Units. CISP-BMEI 2019: 1-6 - [c7]Peisong He, Haoliang Li, Hongxia Wang:
Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces. ICIP 2019: 2299-2303 - [c6]Ting Huang, Hongxia Wang, Yi Chen, Peisong He:
GRU-SVM Model for Synthetic Speech Detection. IWDW 2019: 115-125 - 2018
- [j6]Peisong He, Xinghao Jiang, Tanfeng Sun, Haoliang Li:
Computer Graphics Identification Combining Convolutional and Recurrent Neural Networks. IEEE Signal Process. Lett. 25(9): 1369-1373 (2018) - [j5]Xinghao Jiang, Peisong He, Tanfeng Sun, Feng Xie, Shilin Wang:
Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 170-185 (2018) - [j4]Haoliang Li, Peisong He, Shiqi Wang, Anderson Rocha, Xinghao Jiang, Alex C. Kot:
Learning Generalized Deep Feature Representation for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 13(10): 2639-2652 (2018) - [c5]Qiang Xu, Xinghao Jiang, Tanfeng Sun, Peisong He, Shilin Wang, Bin Li:
Relocated I-Frames Detection in H.264 Double Compressed Videos Based on Genetic-CNN. APSIPA 2018: 710-716 - 2017
- [j3]Peisong He, Xinghao Jiang, Tanfeng Sun, Shilin Wang:
Detection of double compression in MPEG-4 videos based on block artifact measurement. Neurocomputing 228: 84-96 (2017) - [j2]Peisong He, Xinghao Jiang, Tanfeng Sun, Shilin Wang, Bin Li, Yi Dong:
Frame-wise detection of relocated I-frames in double compressed H.264 videos based on convolutional neural network. J. Vis. Commun. Image Represent. 48: 149-158 (2017) - [c4]Junjia Zheng, Tanfeng Sun, Xinghao Jiang, Peisong He:
Double H.264 Compression Detection Scheme Based on Prediction Residual of Background Regions. ICIC (1) 2017: 471-482 - 2016
- [j1]Peisong He, Xinghao Jiang, Tanfeng Sun, Shilin Wang:
Double compression detection based on local motion vector field analysis in static-background videos. J. Vis. Commun. Image Represent. 35: 55-66 (2016) - [c3]Jieyuan Chen, Xinghao Jiang, Tanfeng Sun, Peisong He, Shilin Wang:
Detecting double MPEG compression with the same quantiser scale based on MBM feature. ICASSP 2016: 2064-2068 - [c2]Shuo Chen, Tanfeng Sun, Xinghao Jiang, Peisong He, Shilin Wang, Yun Q. Shi:
Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution. IWDW 2016: 61-74 - 2015
- [c1]Peisong He, Tanfeng Sun, Xinghao Jiang, Shilin Wang:
Double Compression Detection in MPEG-4 Videos Based on Block Artifact Measurement with Variation of Prediction Footprint. ICIC (3) 2015: 787-793
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint