Weiqi Luo
Orcid: 0000-0002-8999-6064Affiliations:
- Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China (PhD 2008)
- Fujian Normal University, Key Lab of Network Security and Cryptology, Fuzhou
According to our database1,
Weiqi Luo
authored at least 81 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing.
IEEE Trans. Circuits Syst. Video Technol., September, 2024
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling.
IEEE Trans. Inf. Forensics Secur., 2024
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking.
Proceedings of the 2024 16th International Conference on Machine Learning and Computing, 2024
A Fast and Tunable Privacy-Preserving Action Recognition Framework over Compressed Video.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Multim. Syst., August, 2023
Digit. Signal Process., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023
Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation.
IEEE Trans. Inf. Forensics Secur., 2022
Signal Process., 2022
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling.
J. Comput. Sci. Technol., 2022
Dual Stream Computer-Generated Image Detection Network Based On Channel Joint And Softpool.
CoRR, 2022
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2020
A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020
J. Inf. Secur. Appl., 2020
Sci. China Inf. Sci., 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
IEEE Trans. Circuits Syst. Video Technol., 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
ACM Trans. Multim. Comput. Commun. Appl., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
CoRR, 2017
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Proceedings of the International Conference on Video and Image Processing, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Signal Process. Lett., 2016
2015
Multim. Tools Appl., 2015
2014
ACM Trans. Multim. Comput. Commun. Appl., 2014
IEEE Trans. Circuits Syst. Video Technol., 2014
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity.
Multim. Tools Appl., 2014
A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics.
Sci. China Inf. Sci., 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
2012
IEEE Trans. Circuits Syst. Video Technol., 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics.
Proceedings of the Computational Visual Media - First International Conference, 2012
2011
IEEE Signal Process. Lett., 2011
Multim. Tools Appl., 2011
IET Inf. Secur., 2011
2010
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
2008
Proceedings of the Security, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.
Proceedings of the IEEE International Conference on Acoustics, 2008
2007
Frontiers Comput. Sci. China, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006