Prompt-guided and degradation prior supervised transformer for adverse weather image restoration.
Appl. Intell., January, 2025
Advancing Few-Shot Black-Box Attack With Alternating Training.
IEEE Trans. Reliab., September, 2024
Dual stage black-box adversarial attack against vision transformer.
Int. J. Mach. Learn. Cybern., August, 2024
Boundary-Aware Spatial and Frequency Dual-Domain Transformer for Remote Sensing Urban Images Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2024
Background-focused contrastive learning for unpaired image-to-image translation.
J. Electronic Imaging, 2024
Deceptive deraining attack: a restorative adversarial attack by rain removal.
J. Electronic Imaging, 2024
Inter-Class Topology Alignment for Efficient Black-Box Substitute Attacks.
Proceedings of the Computer Vision - ECCV 2024, 2024
An End-to-End Heart Rate Estimation Scheme Using Divided Space-Time Attention.
Neural Process. Lett., June, 2023
Data-free Black-box Attack based on Diffusion Model.
CoRR, 2023
An image steganography scheme based on ResNet.
Multim. Tools Appl., November, 2022
A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net.
Secur. Commun. Networks, 2022
Reversible data hiding in encrypted images based on IWT and chaotic system.
Multim. Tools Appl., 2022
An adaptive reversible watermarking in IWT domain.
Multim. Tools Appl., 2021
A data hiding scheme based on U-Net and wavelet transform.
Knowl. Based Syst., 2021
Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification.
Int. J. Digit. Crime Forensics, 2021