Search

Your search keyword '"Zichi Wang"' showing total 60 results

Search Constraints

Start Over You searched for: Author "Zichi Wang" Remove constraint Author: "Zichi Wang" Database OpenAIRE Remove constraint Database: OpenAIRE
60 results on '"Zichi Wang"'

Search Results

5. An Effective Framework for Intellectual Property Protection of NLG Models

6. Steganalysis of Neural Networks Based on Symmetric Histogram Distribution

7. Repeatable Data Hiding: Towards the Reusability of Digital Images

13. Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]

17. Batch Steganography via Generative Network

18. Multichannel Steganography in Digital Images for Multiple Receivers

19. JPEG Steganography With Content Similarity Evaluation

20. A New Steganography Method for Dynamic GIF Images Based on Palette Sort

21. Multi-objective analysis of distributed energy system under different operation strategies

22. A Novel Location Privacy Protection Algorithm for Social Discovery Application

23. Steganography in Social Networks Based on Behavioral Correlation

24. Practical Cover Selection for Steganography

27. Privacy protection based on binary fingerprint compression

28. Towards Robust Image Steganography

29. Breaking Steganography

30. Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation

31. Secure Cover Selection for Steganography

32. Steganography in beautified mages

33. Research on remote visual operation and maintenance of substation GIS equipment based on digital modeling

34. Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images

35. Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network

36. Steganographic Distortion Function for Enhanced Images

37. Reversible Privacy Protection with the Capability of Antiforensics

38. Multisource Data Hiding in Digital Images

39. Data Computing in Covert Domain

40. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization

41. On Improving Distortion Functions for JPEG Steganography

42. Distortion function based on residual blocks for JPEG steganography

43. Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain

44. Towards Improved Steganalysis: When Cover Selection is Used in Steganography

45. Novel Simulation Model for Coil-Coil Type Electromagnetic Repulsion Actuator in Low Voltage DC Circuit Breaker

46. Research on Fault Characteristics of High-Voltage Side in Dual Active Bridge DC/DC Converter

47. An Improved Steganalysis Method Using Feature Combinations

48. Single Actor Pooled Steganalysis

49. Breaking CNN-Based Steganalysis

50. Distortion Function for Emoji Image Steganography

Catalog

Books, media, physical & digital resources