Jinwei Wang

Orcid: 0009-0000-6055-0926

According to our database1, Jinwei Wang authored at least 112 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024

Forgery detection using polynomial fitting in recompressed JPEG images.
Signal Image Video Process., April, 2024

Interpretable Trend Analysis Neural Networks for Longitudinal Data Analysis.
ACM Trans. Comput. Heal., April, 2024

Trustworthy adaptive adversarial perturbations in social networks.
J. Inf. Secur. Appl., February, 2024

Graph-guided deep hashing networks for similar patient retrieval.
Comput. Biol. Medicine, February, 2024

Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Adversarial watermark: A robust and reliable watermark against removal.
J. Inf. Secur. Appl., 2024

Improving the transferability of adversarial examples through black-box feature attacks.
Neurocomputing, 2024

Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Generating Image Adversarial Example by Modifying JPEG Stream.
Proceedings of the International Conference on Computer Vision and Deep Learning, 2024

2023
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023

Detecting High-Resolution Adversarial Images with Few-Shot Deep Learning.
Remote. Sens., May, 2023

Time Series Data Cleaning Method Based on Optimized ELM Prediction Constraints.
J. Inf. Process. Syst., April, 2023

Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework.
IEEE Trans. Netw. Sci. Eng., 2023

Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples.
CoRR, 2023

Distributed Optical Fiber Sensing Event Recognition Based on Markov Transition Field and Knowledge Distillation.
IEEE Access, 2023

Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum.
Proceedings of the International Joint Conference on Neural Networks, 2023

LASTNet: A Swin Transformer with LANets Network for Video emotion recognition.
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023

Stress Expression Identification Model for Emotion-Driven Association Calculation over Social Network Blogs.
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023

2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022

Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022

A novel model-driven deterministic approach to wind power imputation.
Sustain. Comput. Informatics Syst., 2022

Contrastive Learning based Multi-task Network for Image Manipulation Detection.
Signal Process., 2022

GAN-generated fake face detection via two-stream CNN with PRNU in the wild.
Multim. Tools Appl., 2022

ESGAN for generating high quality enhanced samples.
Multim. Syst., 2022

A hybrid machine learning approach of fuzzy-rough-k-nearest neighbor, latent semantic analysis, and ranker search for efficient disease diagnosis.
J. Intell. Fuzzy Syst., 2022

Structure-aware siamese graph neural networks for encounter-level patient similarity learning.
J. Biomed. Informatics, 2022

A semantic element representation model for malicious domain name detection.
J. Inf. Secur. Appl., 2022

An accurate soft diagnosis method of breast cancer using the operative fusion of derived features and classification approaches.
Expert Syst. J. Knowl. Eng., 2022

Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Dual-Quaternion-Based Sampled-Data Pose Tracking Control of Spacecraft.
Proceedings of the 13th Asian Control Conference, 2022

2021
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature.
ACM Trans. Multim. Comput. Commun. Appl., 2021

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021

Patch-Wise Semantic Segmentation for Hyperspectral Images via a Cubic Capsule Network with EMAP Features.
Remote. Sens., 2021

Identifying forged seal imprints using positive and unlabeled learning.
Multim. Tools Appl., 2021

Fast3DS: A real-time full-convolutional malicious domain name detection system.
J. Inf. Secur. Appl., 2021

Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021

GCN-Geo: A Graph Convolution Network-based Fine-grained IP Geolocation System.
CoRR, 2021

Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

StrGAN for Generating Enhanced Samples.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Imperceptible and Reliable Adversarial Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Modeling Password Guessability via Variational Auto-Encoder.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Trend Analysis Neural Networks for Interpretable Analysis of Longitudinal Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020

A Novel Cubic Convolutional Neural Network for Hyperspectral Image Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020

Assessing economic losses of haze with uncertain probabilistic linguistic analytic hierarchy process.
J. Intell. Fuzzy Syst., 2020

Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform.
KSII Trans. Internet Inf. Syst., 2020

Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020

Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020

Lightweight DCT-Like Domain Forensics Model for Adversarial Example.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Hybrid Loss Network for Localization of Image Manipulation.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019

Dynamic multi-watermarking and detecting in DWT domain.
J. Real Time Image Process., 2019

A new method estimating linear gaussian filter kernel by image PRNU noise.
J. Inf. Secur. Appl., 2019

Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019

Discrimination of Computer Generated and Photographic Images Based on CQWT Quaternion Markov Features.
Int. J. Pattern Recognit. Artif. Intell., 2019

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation.
Int. J. Digit. Crime Forensics, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

Detection of Triple JPEG Compressed Color Images.
IEEE Access, 2019

Selective Learning Confusion Class for Text-Based CAPTCHA Recognition.
IEEE Access, 2019

Double JPEG Compression Detection Based on Markov Model.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
Deceptive SAR Jamming Based on 1-bit Sampling and Time-Varying Thresholds.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2018

Expose noise level inconsistency incorporating the inhomogeneity scoring strategy.
Multim. Tools Appl., 2018

Efficient large payloads ternary matrix embedding.
Multim. Tools Appl., 2018

Quaternion discrete fractional random transform for color image adaptive watermarking.
Multim. Tools Appl., 2018

Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain.
Int. J. Digit. Crime Forensics, 2018

Pain Intensity Estimation Using Deep Spatiotemporal and Handcrafted Features.
IEICE Trans. Inf. Syst., 2018

Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data Classification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
AMR Steganalysis Based on Second-Order Difference of Pitch Delay.
IEEE Trans. Inf. Forensics Secur., 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Process., 2017

Detecting Image Splicing Based on Noise Level Inconsistency.
Multim. Tools Appl., 2017

Improved reversible data hiding based on two-dimensional difference-histogram modification.
Multim. Tools Appl., 2017

Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
Multim. Tools Appl., 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multim. Tools Appl., 2017

Hybrid multiplicative multi-watermarking in DWT domain.
Multidimens. Syst. Signal Process., 2017

A privacy-preserving content-based image retrieval method in cloud environment.
J. Vis. Commun. Image Represent., 2017

High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

A Novel Robust Reversible Watermarking Scheme Based on IWT.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet.
Secur. Commun. Networks, 2016

Video inter-frame forgery identification based on the consistency of quotient of MSSIM.
Secur. Commun. Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multim. Tools Appl., 2016

High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion.
J. Vis. Commun. Image Represent., 2016

Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification.
J. Vis. Commun. Image Represent., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

2015
Hybrid additive multi-watermarking and decoding.
Multim. Syst., 2015

2014
A nonlocal energy minimization approach to brain image segmentation with simultaneous bias field estimation and denoising.
Mach. Vis. Appl., 2014

Study on some qualitative properties for solutions of a certain two-dimensional fractional differential system with Hadamard derivative.
Appl. Math. Lett., 2014

2013
Hybrid additive watermarking and its decoders.
Telecommun. Syst., 2013

A new level set method for inhomogeneous image segmentation.
Image Vis. Comput., 2013

Auto-Tuning of Thread Assignment for Matrix-Vector Multiplication on GPUs.
IEICE Trans. Inf. Syst., 2013

2012
On the hybrid multi-watermarking.
Signal Process., 2012

Content distribution and copyright authentication based on combined indexing and watermarking.
Multim. Tools Appl., 2012

On multiwatermarking in cloud environment.
Concurr. Comput. Pract. Exp., 2012

A new convex variational model for liver segmentation.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2009
MapView: visualization of short reads alignment on a desktop computer.
Bioinform., 2009

DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing.
Proceedings of the TASE 2009, 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Process., 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2006
Secure multimedia browser over network.
Proceedings of the Visual Information Processing XV, 2006

Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Semi-Fragile Watermarking Authentication with Local and Global Watermarks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Analysis on Resource Utilization Patterns of Office Computer.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...