关注
Yi Chen
Yi Chen
Guizhou University
在 gzu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain
Y Chen, H Wang, KKR Choo, P He, Z Salcic, D Kaafar, X Zhang
IEEE transactions on dependable and secure computing 19 (4), 2405-2420, 2021
312021
An efficient fingerprint identification algorithm based on minutiae and invariant moment
J Sang, H Wang, Q Qian, H Wu, Y Chen
Personal and Ubiquitous Computing 22, 71-80, 2018
282018
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering
Y Liu, H Wang, Y Chen, H Wu, H Wang
Multimedia Tools and Applications 79, 477-500, 2020
262020
An adaptive data hiding algorithm with low bitrate growth for H. 264/AVC video stream
Y Chen, H Wang, H Wu, Y Liu
Multimedia Tools and Applications 77, 20157-20175, 2018
172018
Reversible video data hiding using zero QDCT coefficient-pairs
Y Chen, H Wang, H Wu, Y Liu
Multimedia Tools and Applications 78, 23097-23115, 2019
162019
EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks
H Hu, Z Salcic, G Dobbie, Y Chen, X Zhang
IJCNN, 2021
142021
A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images
B He, Y Chen, Y Zhou, Y Wang, Y Chen
International Journal of Distributed Sensor Networks 18 (3), 15501329221084226, 2022
92022
Reversible data hiding based on a modified difference expansion for H. 264/AVC video streams
X Tang, H Wang, Y Chen
Multimedia Tools and Applications 79, 28661-28674, 2020
72020
A data hiding scheme with high quality for H. 264/AVC video streams
Y Chen, H Wang, H Wu, Y Chen, Y Liu
Cloud Computing and Security: 4th International Conference, ICCCS 2018 …, 2018
72018
A novel lossless data hiding scheme in homomorphically encrypted images
A Malik, H Wang, AN Khan, Y Chen, Y Chen
Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020
62020
A novel two-dimensional reversible data hiding method with high embedding capacity in H. 264/advanced video coding
Y Chen, H Wang, X Tang, Y Liu, H Wu, Y Chen
International Journal of Distributed Sensor Networks 16 (3), 1550147720911001, 2020
42020
An efficient copy-move detection algorithm based on superpixel segmentation and Harris key-points
Y Liu, HX Wang, HZ Wu, Y Chen
Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017
42017
NACA: a joint distortion-based non-additive cost assignment method for video steganography
Y Chen, Z Salcic, H Wang, KKR Choo, X Zhang
IEEE Transactions on Dependable and Secure Computing 20 (3), 2360-2374, 2022
32022
Exploiting texture characteristics and spatial correlations forrobustness metric of data hiding with noisy transmission
Y Chen, H Wang, H Wu, Y Zhou, L Zhou, Y Chen
IET Image Processing, 2021
32021
GRU-SVM model for synthetic speech detection
T Huang, H Wang, Y Chen, P He
Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020
32020
Reversible data hiding based on run-level coding in H.264/AVC video streams
Y Chen, HX Wang, XY Zhang
Computers, Materials & Continua, 2020
32020
USAGE: Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method
K Wang, Y Cui, Q Qian, Y Chen, C Guo, G Shen
Journal of Network and Computer Applications 219, 103722, 2023
22023
SNDMI: Spyware network traffic detection method based on inducement operations
J Peng, C Guo, Y Ping, Y Cui, Y Chen, G Shen
Computers & Security 140, 103806, 2024
12024
Robust video watermarking using normalized Zernike moments
S Chen, Y Chen, Y Chen, L Zhou, H Wu
International Conference on Artificial Intelligence and Security, 323-336, 2022
12022
Defining cost function for robust embedding
YL Chen, H Wang, H Wu, Y Chen, Z Dong
International Conference on Artificial Intelligence and Security, 2020
1*2020
系统目前无法执行此操作,请稍后再试。
文章 1–20