Follow
Hang Zhou
Hang Zhou
Verified email at ualberta.ca - Homepage
Title
Cited by
Cited by
Year
DUP-Net: Denoiser and upsampler network for 3D adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
1872019
Screen-shooting resilient watermarking
H Fang, W Zhang, H Zhou, H Cui, N Yu
IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018
1542018
Separable reversible data hiding in encrypted JPEG bitstreams
Z Qian, H Zhou, X Zhang, W Zhang
IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016
1312016
Reversible data hiding in encrypted three-dimensional mesh models
R Jiang, H Zhou, W Zhang, N Yu
IEEE Transactions on Multimedia 20 (1), 55-67, 2017
1292017
LG-GAN: Label guided adversarial network for flexible targeted attack of point cloud based deep networks
H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
1162020
Designing near-optimal steganographic codes in practice based on polar codes
W Li, W Zhang, L Li, H Zhou, N Yu
IEEE Transactions on Communications 68 (7), 3948-3962, 2020
832020
Shape-invariant 3D adversarial point clouds
Q Huang, X Dong, D Chen, H Zhou, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
732022
Self-robust 3D point recognition via gather-vector guidance
X Dong, D Chen, H Zhou, G Hua, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
612020
Reversible watermarking in deep convolutional neural networks for integrity authentication
X Guan, H Feng, W Zhang, H Zhou, J Zhang, N Yu
Proceedings of the 28th ACM International Conference on Multimedia, 2273-2280, 2020
602020
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
592018
Robust steganography using texture synthesis
Z Qian, H Zhou, W Zhang, X Zhang
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2017
592017
A camera shooting resilient watermarking scheme for underpainting documents
H Fang, W Zhang, Z Ma, H Zhou, S Sun, H Cui, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (11), 4075 …, 2019
522019
Distortion design for secure adaptive 3-D mesh steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
522018
Homomorphic encryption-based reversible data hiding for 3D mesh models
M Shah, W Zhang, H Hu, H Zhou, T Mahmood
Arabian Journal for Science and Engineering 43, 8145-8157, 2018
412018
Content-adaptive reversible visible watermarking in encrypted images
Y Yao, W Zhang, H Wang, H Zhou, N Yu
Signal Processing 164, 386-401, 2019
372019
Comments on “steganography using reversible texture synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
372017
Encoded feature enhancement in watermarking network for distortion in real scenes
H Fang, Z Jia, H Zhou, Z Ma, W Zhang
IEEE Transactions on Multimedia 25, 2648-2660, 2022
342022
Distribution-preserving steganography based on text-to-speech generative models
K Chen, H Zhou, H Zhao, D Chen, W Zhang, N Yu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3343-3356, 2021
30*2021
Self-supervised adversarial training
K Chen, Y Chen, H Zhou, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2020
30*2020
Defining cost functions for adaptive steganography at the microscale
K Chen, W Zhang, H Zhou, N Yu, G Feng
IEEE International Workshop on Information Forensics and Security, 1-6, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20