Dengpan Ye
Orcid: 0000-0003-2510-9523
According to our database1,
Dengpan Ye
authored at least 81 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Trinity Detector: Text-Assisted and Attention Mechanisms Based Spectral Fusion for Diffusion Generation Image Detection.
IEEE Signal Process. Lett., 2025
AdvLUT: Cloaking Geographic Location With Semantic-Based Adversarial 3-D Lookup Tables.
IEEE Internet Things J., 2025
2024
IEEE Internet Things J., February, 2024
IEEE Internet Things J., January, 2024
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping.
IEEE Trans. Inf. Forensics Secur., 2024
AVT$^{2}$-DWF: Improving Deepfake Detection With Audio-Visual Fusion and Dynamic Weighting Strategies.
IEEE Signal Process. Lett., 2024
Factors affecting forensic electric network frequency matching - A comprehensive study.
Digit. Commun. Networks, 2024
ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models.
CoRR, 2024
Simplicity over Complexity: An ARN-Based Intrusion Detection Method for Industrial Control Network.
CoRR, 2024
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks.
CoRR, 2024
StyleMark: A Robust Watermarking Method for Art Style Images Against Black-Box Arbitrary Style Transfer.
CoRR, 2024
Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection.
CoRR, 2024
TEAM: Temporal Adversarial Examples Attack Model against Network Intrusion Detection System Applied to RNN.
CoRR, 2024
Trinity Detector:text-assisted and attention mechanisms based spectral fusion for diffusion generation image detection.
CoRR, 2024
Double Privacy Guard: Robust Traceable Adversarial Watermarking against Face Recognition.
CoRR, 2024
AVT2-DWF: Improving Deepfake Detection with Audio-Visual Fusion and Dynamic Weighting Strategies.
CoRR, 2024
Reputation Defender: Local Black-Box Adversarial Attack against Image-Translation-Based DeepFake.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Once and for All: Universal Transferable Adversarial Perturbation against Deep Hashing-Based Facial Image Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model.
Comput. J., November, 2023
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping.
CoRR, 2023
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors.
CoRR, 2023
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Int. J. Intell. Syst., December, 2022
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.
Sensors, 2022
Secur. Commun. Networks, 2022
Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning.
Proceedings of the IEEE International Conference on Trust, 2022
Robust Video Hashing Based on Local Fluctuation Preserving for Tracking Deep Fake Videos.
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Detection of Electric Network Frequency in Audio Recordings-From Theory to Practical Detectors.
IEEE Trans. Inf. Forensics Secur., 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.
Secur. Commun. Networks, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
2020
Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT).
Sensors, 2020
Multim. Tools Appl., 2020
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application.
J. Netw. Comput. Appl., 2020
Frontiers Comput. Sci., 2020
CoRR, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the MultiMedia Modeling - 26th International Conference, 2020
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multim. Tools Appl., 2019
J. Univers. Comput. Sci., 2019
J. Real Time Image Process., 2019
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.
J. Real Time Image Process., 2019
IEEE Internet Things J., 2019
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019
Neurocomputing, 2019
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019
IEEE Access, 2019
2018
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Secur. Commun. Networks, 2017
Displays, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016
2015
Int. J. Comput. Intell. Syst., 2015
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Int. J. Digit. Crime Forensics, 2014
2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012
Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.
Int. J. Comput. Intell. Syst., 2012
Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.
Int. J. Comput. Intell. Syst., 2012
2011
Soft Comput., 2011
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011