Multi-task few-shot text steganalysis based on context-attentive prototypes.
Expert Syst. Appl., 2024
Generalize Your Face Forgery Detectors: An Insertable Adaptation Module Is All You Need.
CoRR, 2024
Boosting the Targeted Transferability of Adversarial Examples via Salient Region & Weighted Feature Drop.
CoRR, 2024
A machine learning-based trust evaluation model for wireless sensor networks.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
EPR and single-particle hybridization.
Quantum Inf. Comput., 2021
Multi-party blind quantum computation protocol with mutual authentication in network.
Sci. China Inf. Sci., 2021
A novel quantum blockchain scheme base on quantum entanglement and DPoS.
Quantum Inf. Process., 2020
Multi-source Data Fusion Approach Based on Improved Evidence Theory.
J. Comput., 2013
Recoverable Video Watermark in DCT Domain.
J. Comput., 2013
Video Watermarking Algorithm Based on Relative Relationship of DCT Coefficients.
J. Comput., 2013
An Anti-JPEG Compression Image Perceptual Hashing Algorithm.
Proceedings of the Applied Informatics and Communication - International Conference, 2011
A near reversible image watermarking algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010