Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 194 | 2019 |
Lg-gan: Label guided adversarial network for flexible targeted attack of point cloud based deep networks H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 124 | 2020 |
Adversarial examples against deep neural network based steganalysis Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu Proceedings of the 6th ACM Workshop on information hiding and multimedia …, 2018 | 110 | 2018 |
Reversible data hiding in color image with grayscale invariance D Hou, W Zhang, K Chen, SJ Lin, N Yu IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018 | 71 | 2018 |
Tracing text provenance via context-aware lexical substitution X Yang, J Zhang, K Chen, W Zhang, Z Ma, F Wang, N Yu Proceedings of the AAAI Conference on Artificial Intelligence 36 (10), 11613 …, 2022 | 67 | 2022 |
Toward understanding and boosting adversarial transferability from a distribution perspective Y Zhu, Y Chen, X Li, K Chen, Y He, X Tian, B Zheng, Y Chen, Q Huang IEEE Transactions on Image Processing 31, 6487-6501, 2022 | 63 | 2022 |
Watermarking text generated by black-box language models X Yang, K Chen, W Zhang, C Liu, Y Qi, J Zhang, H Fang, N Yu arXiv preprint arXiv:2305.08883, 2023 | 59 | 2023 |
Defining cost functions for adaptive JPEG steganography at the microscale K Chen, H Zhou, W Zhou, W Zhang, N Yu IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018 | 59 | 2018 |
Distortion design for secure adaptive 3-D mesh steganography H Zhou, K Chen, W Zhang, Y Yao, N Yu IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018 | 53 | 2018 |
A brief survey on deep learning based data hiding C Zhang, C Lin, P Benz, K Chen, W Zhang, IS Kweon arXiv preprint arXiv:2103.01607, 2021 | 51 | 2021 |
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu Signal Processing 168, 107343, 2020 | 51 | 2020 |
Pseudo label-guided model inversion attack via conditional generative adversarial network X Yuan, K Chen, J Zhang, W Zhang, N Yu, Y Zhang Proceedings of the AAAI Conference on Artificial Intelligence 37 (3), 3349-3357, 2023 | 40 | 2023 |
Defining joint distortion for JPEG steganography W Li, W Zhang, K Chen, W Zhou, N Yu Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018 | 39 | 2018 |
Provably secure generative steganography based on autoregressive model K Yang, K Chen, W Zhang, N Yu International Workshop on Digital Watermarking, 55-68, 2018 | 37 | 2018 |
Comments on “steganography using reversible texture synthesis” H Zhou, K Chen, W Zhang, N Yu IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017 | 37 | 2017 |
Gpt paternity test: Gpt generated text detection with gpt genetic inheritance X Yu, Y Qi, K Chen, G Chen, X Yang, P Zhu, W Zhang, N Yu CoRR, 2023 | 36 | 2023 |
Gaussian shading: Provable performance-lossless image watermarking for diffusion models Z Yang, K Zeng, K Chen, H Fang, W Zhang, N Yu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | 35 | 2024 |
Flow-based robust watermarking with invertible noise layer for black-box distortions H Fang, Y Qiu, K Chen, J Zhang, W Zhang, EC Chang Proceedings of the AAAI conference on artificial intelligence 37 (4), 5054-5061, 2023 | 35 | 2023 |
Adversarial batch image steganography against CNN-based pooled steganalysis L Li, W Zhang, C Qin, K Chen, W Zhou, N Yu Signal Processing 181, 107920, 2021 | 35 | 2021 |
Discop: Provably secure steganography in practice based on" distribution copies" J Ding, K Chen, Y Wang, N Zhao, W Zhang, N Yu 2023 IEEE Symposium on Security and Privacy (SP), 2238-2255, 2023 | 30 | 2023 |