Follow
weiming zhang
Title
Cited by
Cited by
Year
Cswin transformer: A general vision transformer backbone with cross-shaped windows
X Dong, J Bao, D Chen, W Zhang, N Yu, L Yuan, D Chen, B Guo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
10252022
Reversible data hiding in encrypted images by reserving room before encryption
K Ma, W Zhang, X Zhao, N Yu, F Li
IEEE Transactions on information forensics and security 8 (3), 553-562, 2013
8972013
Multi-attentional Deepfake Detection
H Zhao, W Zhou, D Chen, T Wei, W Zhang, N Yu
CVPR 2021, 2021
6882021
Reversibility improved data hiding in encrypted images
W Zhang, K Ma, N Yu
Signal Processing 94, 118-127, 2014
4522014
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu
CVPR 2021, 2021
4032021
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
4032015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3692013
DeepFaceLab: Integrated, flexible and extensible face-swapping framework
I Perov, D Gao, N Chervoniy, K Liu, S Marangonda, C Umé, M Dpfks, ...
arXiv preprint arXiv:2005.05535, 2020
3532020
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2722013
Peco: Perceptual codebook for bert pre-training of vision transformers
X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N Yu, ...
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 552-560, 2023
2332023
On the fault-tolerant performance for a class of robust image steganography
Y Zhang, C Qin, W Zhang, F Liu, X Luo
Signal Processing 146, 99-111, 2018
1952018
Improving various reversible data hiding schemes via optimal codes for binary covers
W Zhang, B Chen, N Yu
IEEE transactions on image processing 21 (6), 2991-3003, 2012
1702012
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
(ICCV)Proceedings of the IEEE International Conference on Computer Vision …, 2019
1682019
Reversible data hiding in encrypted images by reversible image transformation
W Zhang, H Wang, D Hou, N Yu
IEEE Transactions on Multimedia 18 (8), 1469-1479, 2016
1682016
Screen-Shooting Resilient Watermarking
H Fang, W Zhang, H Zhou, H Cui, N Yu
IEEE Transactions on Information Forensics and Security 14 (6), 1403-1418, 2018
1462018
GDroid: Android malware detection and classification with graph convolutional network
H Gao, S Cheng, W Zhang
Computers & Security 106, 102264, 2021
1402021
A double layered “plus-minus one” data embedding scheme
W Zhang, X Zhang, S Wang
IEEE signal processing letters 14 (11), 848-851, 2007
1362007
Model watermarking for image processing networks
J Zhang, D Chen, J Liao, H Fang, W Zhang, W Zhou, H Cui, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 12805 …, 2020
1352020
Protecting Celebrities from DeepFake with Identity Consistency Transformer
X Dong, J Bao, D Chen, T Zhang, W Zhang, N Yu, D Chen, F Wen, B Guo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1322022
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View
J Liu, W Zhang, Y Zhang, D Hou, Y Liu, H Zha, N Yu
(CVPR)Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
1322019
The system can't perform the operation now. Try again later.
Articles 1–20