Weiqi Luo

Orcid: 0000-0002-8999-6064

Affiliations:
  • Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China (PhD 2008)
  • Fujian Normal University, Key Lab of Network Security and Cryptology, Fuzhou


According to our database1, Weiqi Luo authored at least 81 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling.
IEEE Trans. Inf. Forensics Secur., 2024

One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network.
IEEE Trans. Inf. Forensics Secur., 2024

GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking.
Proceedings of the 2024 16th International Conference on Machine Learning and Computing, 2024

A Fast and Tunable Privacy-Preserving Action Recognition Framework over Compressed Video.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

A Novel Residual-Guided Learning Method for Image Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2024

SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Residual guided coordinate attention for selection channel aware image steganalysis.
Multim. Syst., August, 2023

DeepFake detection with multi-scale convolution and vision transformer.
Digit. Signal Process., April, 2023

Adversarial Steganography Embedding via Stego Generation and Selection.
IEEE Trans. Dependable Secur. Comput., 2023

Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

AI-Generated Image Detection using a Cross-Attention Enhanced Dual-Stream Network.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation.
IEEE Trans. Inf. Forensics Secur., 2022

Adversarial robust image steganography against lossy JPEG compression.
Signal Process., 2022

Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling.
J. Comput. Sci. Technol., 2022

Dual Stream Computer-Generated Image Detection Network Based On Channel Joint And Softpool.
CoRR, 2022

IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Secure Evaluation of Discrete Sine Transform in Homomorphic Encrypted Domain.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
A New Adversarial Embedding Method for Enhancing Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Spatial Steganalysis Based on Gradient-Based Neural Architecture Search.
Proceedings of the Provable and Practical Security, 2021

Enhancing Image Steganography Via Stego Generation And Selection.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2020

A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020

Universal stego post-processing for enhancing image steganography.
J. Inf. Secur. Appl., 2020

Image processing operations identification via convolutional neural network.
Sci. China Inf. Sci., 2020

Compression Detection of Audio Waveforms Based on Stacked Autoencoders.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Universal Stego Post-processing for Enhancing Image Steganography.
CoRR, 2019

Enhancing JPEG Steganography using Iterative Adversarial Examples.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Fast and Effective Global Covariance Pooling Network for Image Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Identification of Various Image Operations Using Residual-Based Features.
IEEE Trans. Circuits Syst. Video Technol., 2018

Fake Faces Identification via Convolutional Neural Network.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Identification of Audio Processing Operations Based on Convolutional Neural Network.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
Image Forgery Localization via Integrating Tampering Possibility Maps.
IEEE Trans. Inf. Forensics Secur., 2017

Localization of Diffusion-Based Inpainting in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2017

Image Processing Operations Identification via Convolutional Neural Network.
CoRR, 2017

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017

Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Audio Steganalysis with Convolutional Neural Network.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Exposing Video Forgeries by Detecting Misaligned Double Compression.
Proceedings of the International Conference on Video and Image Processing, 2017

2016
Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Inf. Forensics Secur., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

2015
Anti-forensics of double JPEG compression with the same quantization matrix.
Multim. Tools Appl., 2015

Identification of Image Operations Based on Steganalytic Features.
CoRR, 2015

2014
Identifying Compression History of Wave Audio and Its Applications.
ACM Trans. Multim. Comput. Commun. Appl., 2014

Exposing Fake Bit Rate Videos and Estimating Original Bit Rates.
IEEE Trans. Circuits Syst. Video Technol., 2014

Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity.
Multim. Tools Appl., 2014

A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics.
Sci. China Inf. Sci., 2014

Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A universal image forensic strategy based on steganalytic model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

2013
Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Exposing fake bitrate video and its original bitrate.
Proceedings of the IEEE International Conference on Image Processing, 2013

2012
Video Sequence Matching Based on the Invariance of Color Correlation.
IEEE Trans. Circuits Syst. Video Technol., 2012

Countering anti-JPEG compression forensics.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Compression history identification for digital audio signal.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics.
Proceedings of the Computational Visual Media - First International Conference, 2012

2011
Security Analysis on Spatial ± 1 Steganography for JPEG Decompressed Images.
IEEE Signal Process. Lett., 2011

A more secure steganography based on adaptive pixel-value differencing scheme.
Multim. Tools Appl., 2011

Steganalysis of JPEG steganography with complementary embedding strategy.
IET Inf. Secur., 2011

2010
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
IEEE Trans. Inf. Forensics Secur., 2010

JPEG error analysis and its applications to digital image forensics.
IEEE Trans. Inf. Forensics Secur., 2010

Edge adaptive image steganography based on LSB matching revisited.
IEEE Trans. Inf. Forensics Secur., 2010

2008
MPEG recompression detection based on block artifacts.
Proceedings of the Security, 2008

A Novel Method for Block Size Forensics Based on Morphological Operations.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.
Proceedings of the IEEE International Conference on Acoustics, 2008

2007
A survey of passive technology for digital image forensics.
Frontiers Comput. Sci. China, 2007

A Novel Method for Detecting Cropped and Recompressed Image Block.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Robust Detection of Region-Duplication Forgery in Digital Image.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006


  Loading...