Kejiang Chen
Kejiang Chen
Department of Electronic Engineering and Information Science, University of Science and Technology
Verified email at mail.ustc.edu.cn
Title
Cited by
Cited by
Year
Adversarial examples against deep neural network based steganalysis
Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
342018
Reversible data hiding in color image with grayscale invariance
D Hou, W Zhang, K Chen, SJ Lin, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018
282018
Comments on “Steganography using reversible texture synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
262017
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
242018
Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
192019
Defining joint distortion for JPEG steganography
W Li, W Zhang, K Chen, W Zhou, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
162018
Defining cost functions for adaptive steganography at the microscale
K Chen, W Zhang, H Zhou, N Yu, G Feng
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
142016
Distortion Design for Secure Adaptive 3-D Mesh Steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
72018
Journal of visual communication and image representation
J Wang, Y Wang, M Jiang
vol 25 (5), 2014
72014
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu
Signal Processing 168, 107343, 2020
62020
Side channel steganalysis: When behavior is considered in steganographer detection
L Li, W Zhang, K Chen, H Zha, N Yu
Multimedia Tools and Applications 78 (7), 8041-8055, 2019
62019
Derivative-based steganographic distortion and its non-additive extensions for audio
K Chen, H Zhou, W Li, K Yang, W Zhang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2027-2032, 2019
52019
Targeted attack and security enhancement on texture synthesis based steganography
H Zhou, K Chen, W Zhang, Z Qian, N Yu
Journal of Visual Communication and Image Representation 54, 100-107, 2018
52018
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks
H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
42020
Controversial ‘pixel’prior rule for JPEG adaptive steganography
W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu
IET Image Processing 13 (1), 24-33, 2018
42018
Provably secure generative steganography based on autoregressive model
K Yang, K Chen, W Zhang, N Yu
International Workshop on Digital Watermarking, 55-68, 2018
32018
Deflecting 3d adversarial point clouds through outlier-guided removal
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
arXiv preprint arXiv, 1812
31812
Semi-supervised Learning Approach to Generate Neuroimaging Modalities with Adversarial Training
H Nguyen, S Luo, F Ramos
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 409-421, 2020
22020
Feature-preserving tensor voting model for mesh steganalysis
H Zhou, K Chen, W Zhang, C Qin, N Yu
IEEE transactions on visualization and computer graphics 27 (1), 57-67, 2019
22019
Jpeg steganography with estimated side-information
W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20