Audio steganography based on iterative adversarial attacks against convolutional neural networks J Wu, B Chen, W Luo, Y Fang IEEE transactions on information forensics and security 15, 2282-2294, 2020 | 72 | 2020 |
Image watermarking algorithm applying CDMA Y Fang, J Huang, YQ Shi 2003 IEEE International Symposium on Circuits and Systems (ISCAS) 2, II-II, 2003 | 53 | 2003 |
Binary image steganalysis based on local texture pattern J Chen, W Lu, Y Fang, X Liu, Y Yeung, Y Xue Journal of Visual Communication and Image Representation 55, 149-156, 2018 | 44 | 2018 |
CDMA-based watermarking resisting to cropping Y Fang, J Huang, S Wu 2004 IEEE International Symposium on Circuits and Systems (ISCAS) 2, II-25, 2004 | 34 | 2004 |
Steganalysis of multiple-base notational system steganography B Li, Y Fang, J Huang IEEE Signal Processing Letters 15, 493-496, 2008 | 33 | 2008 |
Markov-based image forensics for photographic copying from printed picture J Yin, Y Fang Proceedings of the 20th ACM international conference on Multimedia, 1113-1116, 2012 | 29 | 2012 |
Digital image forensics for photographic copying J Yin, Y Fang Media Watermarking, Security, and Forensics 2012 8303, 115-121, 2012 | 29 | 2012 |
Source class identification for DSLR and compact cameras Y Fang, AE Dirik, X Sun, N Memon 2009 IEEE International Workshop on Multimedia Signal Processing, 1-5, 2009 | 21 | 2009 |
A DWT-based video watermarking algorithm applying DS-CDMA L Fan, F Yanmei TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006 | 19 | 2006 |
Image resampling detection based on convolutional neural network Y Liang, Y Fang, S Luo, B Chen 2019 15th International Conference on Computational Intelligence and …, 2019 | 14 | 2019 |
Revaluation of error correcting coding in watermarking channel L Gu, Y Fang, J Huang International Conference on Cryptology and Network Security, 274-287, 2005 | 11 | 2005 |
The m-band wavelets in image watermarking Y Fang, N Bi, D Huang, J Huang IEEE International Conference on Image Processing 2005 1, I-245, 2005 | 8 | 2005 |
Resampling factor estimation via dual-stream convolutional neural network S Luo, J Luo, W Lu, Y Fang, J Zeng, S Shi, Y Zhang Comput. Mater. Continua (CMC) 66 (1), 647-657, 2021 | 5 | 2021 |
On the security and robustness with fingerprint watermarking signal via compressed sensing H Zhao, Y Fang International Journal of Security and Its Applications 9 (1), 221-236, 2015 | 5 | 2015 |
Upscaling factor estimation on pre-JPEG compressed images based on difference histogram of spectral peaks S Luo, J Liu, W Xu, W Lu, Y Fang, J Zeng, S Shi Signal Processing: Image Communication 94, 116223, 2021 | 3 | 2021 |
Spatial steganalysis based on gradient-based neural architecture search X Deng, W Luo, Y Fang Provable and Practical Security: 15th International Conference, ProvSec 2021 …, 2021 | 3 | 2021 |
A robust blind watermarking scheme for color images using quaternion Fourier transform R Liang, P Zheng, Y Fang, T Song Artificial Intelligence and Security: 6th International Conference, ICAIS …, 2020 | 2 | 2020 |
Performance analysis of CDMA-based watermarking channel with side-information embedding. YM Fang, LM Gu, JW Huang Dianzi Xuebao(Acta Electronica Sinica) 34 (1), 45-50, 2006 | 2 | 2006 |
LOFT: Latent Space Optimization and Generator Fine-Tuning for Defending Against Deepfakes S Zeng, W Wang, F Huang, Y Fang ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024 | 1 | 2024 |
Deliberate multi-attention network for image captioning Z Dan, Y Fang Chinese Conference on Pattern Recognition and Computer Vision (PRCV), 475-487, 2022 | 1 | 2022 |