Zhou Wenbo
Title
Cited by
Cited by
Year
A new rule for cost reassignment in adaptive steganography
W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 12 (11), 2654-2667, 2017
412017
Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
312019
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
282018
Defining joint distortion for JPEG steganography
W Li, W Zhang, K Chen, W Zhou, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
182018
Model watermarking for image processing networks
J Zhang, D Chen, J Liao, H Fang, W Zhang, W Zhou, H Cui, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 12805 …, 2020
172020
Multi-attentional deepfake detection
H Zhao, W Zhou, D Chen, T Wei, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
112021
Shortening the cover for fast JPEG steganography
W Li, W Zhou, W Zhang, C Qin, H Hu, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (6), 1745-1757, 2019
52019
Spatial-phase shallow learning: rethinking face forgery detection in frequency domain
H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
42021
Controversial ‘pixel’prior rule for JPEG adaptive steganography
W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu
IET Image Processing 13 (1), 24-33, 2018
42018
Deflecting 3d adversarial point clouds through outlier-guided removal
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
arXiv preprint arXiv:1812.11017, 2018
42018
Evolving distortion function by exploiting the differences among comparable adaptive steganography
W Zhou, W Zhang, N Yu
2016 12th International Conference on Natural Computation, Fuzzy Systems and …, 2016
42016
Ensemble Steganography
C Qin, W Zhou, W Zhang, N Yu
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
22018
A Simple Baseline for StyleGAN Inversion
T Wei, D Chen, W Zhou, J Liao, W Zhang, L Yuan, G Hua, N Yu
arXiv preprint arXiv:2104.07661, 2021
12021
Adversarial batch image steganography against CNN-based pooled steganalysis
L Li, W Zhang, C Qin, K Chen, W Zhou, N Yu
Signal Processing 181, 107920, 2021
12021
Improved Image Matting via Real-time User Clicks and Uncertainty Estimation
T Wei, D Chen, W Zhou, J Liao, H Zhao, W Zhang, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
12021
Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network
C Lu, B Liu, W Zhou, Q Chu, N Yu
2021 IEEE International Conference on Image Processing (ICIP), 3572-3576, 2021
2021
Adversarial defense via self-orthogonal randomization super-network
H Bian, D Chen, K Zhang, H Zhou, X Dong, W Zhou, W Zhang, N Yu
Neurocomputing 452, 147-158, 2021
2021
CDAE: Color decomposition-based adversarial examples for screen devices
H Bian, H Cui, K Liu, H Zhou, D Chen, W Zhou, W Zhang, N Yu
Information Sciences 569, 287-301, 2021
2021
JPEG Robust Invertible Grayscale
K Liu, D Chen, J Liao, W Zhang, H Zhou, J Zhang, W Zhou, N Yu
IEEE Transactions on Visualization and Computer Graphics, 2021
2021
Initiative Defense against Facial Manipulation
Q Huang, J Zhang, W Zhou, W Zhang, N Yu
Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1619-1627, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20