Cswin transformer: A general vision transformer backbone with cross-shaped windows X Dong, J Bao, D Chen, W Zhang, N Yu, L Yuan, D Chen, B Guo Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 875 | 2022 |
Reversible data hiding in encrypted images by reserving room before encryption K Ma, W Zhang, X Zhao, N Yu, F Li IEEE Transactions on information forensics and security 8 (3), 553-562, 2013 | 869 | 2013 |
Multi-attentional Deepfake Detection H Zhao, W Zhou, D Chen, T Wei, W Zhang, N Yu CVPR 2021, 2021 | 589 | 2021 |
Reversibility improved data hiding in encrypted images W Zhang, K Ma, N Yu Signal Processing 94, 118-127, 2014 | 445 | 2014 |
Efficient reversible data hiding based on multiple histograms modification X Li, W Zhang, X Gui, B Yang IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015 | 384 | 2015 |
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification X Li, W Zhang, X Gui, B Yang IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013 | 363 | 2013 |
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu CVPR 2021, 2021 | 342 | 2021 |
DeepFaceLab: Integrated, flexible and extensible face-swapping framework I Perov, D Gao, N Chervoniy, K Liu, S Marangonda, C Umé, M Dpfks, ... arXiv preprint arXiv:2005.05535, 2020 | 324 | 2020 |
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression W Zhang, X Hu, X Li, N Yu IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013 | 263 | 2013 |
Peco: Perceptual codebook for bert pre-training of vision transformers X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N Yu, ... Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 552-560, 2023 | 212 | 2023 |
On the fault-tolerant performance for a class of robust image steganography Y Zhang, C Qin, W Zhang, F Liu, X Luo Signal Processing 146, 99-111, 2018 | 191 | 2018 |
Improving various reversible data hiding schemes via optimal codes for binary covers W Zhang, B Chen, N Yu IEEE transactions on image processing 21 (6), 2991-3003, 2012 | 168 | 2012 |
Reversible data hiding in encrypted images by reversible image transformation W Zhang, H Wang, D Hou, N Yu IEEE Transactions on Multimedia 18 (8), 1469-1479, 2016 | 166 | 2016 |
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu (ICCV)Proceedings of the IEEE International Conference on Computer Vision …, 2019 | 151 | 2019 |
A double layered “plus-minus one” data embedding scheme W Zhang, X Zhang, S Wang IEEE signal processing letters 14 (11), 848-851, 2007 | 136 | 2007 |
Improving embedding efficiency of covering codes for applications in steganography W Zhang, S Wang, X Zhang IEEE Communications Letters 11 (8), 680-682, 2007 | 131 | 2007 |
Separable reversible data hiding in encrypted JPEG bitstreams Z Qian, H Zhou, X Zhang, W Zhang IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016 | 128 | 2016 |
GDroid: Android malware detection and classification with graph convolutional network H Gao, S Cheng, W Zhang Computers & Security 106, 102264, 2021 | 127 | 2021 |
Screen-Shooting Resilient Watermarking H Fang, W Zhang, H Zhou, H Cui, N Yu IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018 | 126 | 2018 |
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View J Liu, W Zhang, Y Zhang, D Hou, Y Liu, H Zha, N Yu (CVPR)Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019 | 125 | 2019 |