Search

Your search keyword '"Wang, Rangding"' showing total 277 results

Search Constraints

Start Over You searched for: Author "Wang, Rangding" Remove constraint Author: "Wang, Rangding"
277 results on '"Wang, Rangding"'

Search Results

1. Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition

3. Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

4. Adversarial Privacy Protection on Speech Enhancement

5. Transferability of Adversarial Attacks on Synthetic Speech Detection

6. Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise

8. Physical Anti-copying Semi-robust Random Watermarking for QR Code

9. High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC

13. Efficient Generation of Speech Adversarial Examples with Generative Model

17. Detection of Operation Type and Order for Digital Speech

18. A Replay Speech Detection Algorithm Based on Sub-band Analysis

19. AAC Audio Compression Detection Based on QMDCT Coefficient

20. A Replay Voice Detection Algorithm Based on Multi-feature Fusion

25. Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos

26. Source Cell-Phone Identification Using Spectral Features of Device Self-noise

29. Completely Separable Reversible Data Hiding in Encrypted Images

30. Detection of Double Compression for HEVC Videos Based on the Co-occurrence Matrix of DCT Coefficients

31. Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors

32. Audio Tampering Detection Based on Quantization Artifacts

33. An Information Hiding Algorithm for HEVC Based on Differences of Intra Prediction Modes

35. Detecting Fake-Quality WAV Audio Based on Phase Differences

36. Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting

42. A Huffman Table Index Based Approach to Detect Double MP3 Compression

43. Reversible Data Hiding in Encrypted H.264/AVC Video Streams

44. Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention

45. Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern

Catalog

Books, media, physical & digital resources