Audio steganalysis with improved convolutional neural network Y Lin, R Wang, D Yan, L Dong, X Zhang Proceedings of the ACM workshop on information hiding and multimedia …, 2019 | 28 | 2019 |
Adversarial examples attack and countermeasure for speech recognition system: A survey D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong International Conference on Security and Privacy in Digital Economy, 443-468, 2020 | 19 | 2020 |
An explainable person-job fit model incorporating structured information Y Zhang, B Liu, J Qian, J Qin, X Zhang, X Jiang 2021 IEEE International Conference on Big Data (Big Data), 3571-3579, 2021 | 6 | 2021 |
Selecting optimal submatrix for syndrome-trellis codes (stcs)-based steganography with segmentation X Zhang, R Wang, D Yan, L Dong, Y Lin IEEE Access 8, 61754-61766, 2020 | 5 | 2020 |
Split Two-Tower Model for Efficient and Privacy-Preserving Cross-device Federated Recommendation J Qin, B Liu, X Zhang, J Qian arXiv preprint arXiv:2206.13715, 2022 | 1 | 2022 |
Towards breaking DNN-based audio steganalysis with GAN J Wang, R Wang, L Dong, D Yan, X Zhang, Y Lin International Journal of Autonomous and Adaptive Communications Systems 14 …, 2021 | 1 | 2021 |
基于分段 STC 的音频隐写算法 张雪垣, 王让定, 严迪群, 林昱臻 电信科学 35 (7), 115-123, 2019 | 1 | 2019 |
Towards Designing an Effective Complexity Indicator for Audio Steganography X Zhang, R Wang, L Dong, D Yan, Y Lin, J Wang ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | | 2020 |
Post-processing for Enhancing Audio Steganographic Undetectability X Zhang, R Wang, L Dong, D Yan Security and Privacy in Digital Economy: First International Conference …, 2020 | | 2020 |