Weixiang Li

Orcid: 0000-0001-5094-6548

According to our database1, Weixiang Li authored at least 25 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Payload-Independent Direct Cost Learning for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
IEEE Trans. Inf. Forensics Secur., 2024

DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Steganography With Generated Images: Leveraging Volatility to Enhance Security.
IEEE Trans. Dependable Secur. Comput., 2024

Spatial-Frequency Feature Fusion Network for Lightweight and Arbitrary-Sized JPEG Steganalysis.
IEEE Signal Process. Lett., 2024

Weighted Generalized Hesitant Fuzzy Sets and Its Application in Ensemble Learning.
IEICE Trans. Inf. Syst., 2024

Standing on the Shoulders of Giants: Reprogramming Visual-Language Model for General Deepfake Detection.
CoRR, 2024

Computational fluid dynamics investigation of aerodynamics for agricultural drones.
Comput. Electron. Agric., 2024

Computational fluid dynamics investigation of pesticide spraying by agricultural drones.
Comput. Electron. Agric., 2024

FT Player - Oh! This is the Fourier Transform!
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

2023
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023

Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Three-Dimensional Mesh Steganography and Steganalysis: A Review.
IEEE Trans. Vis. Comput. Graph., 2022

2021
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
IEEE Trans. Inf. Forensics Secur., 2021

BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2021

2020
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020

Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

JPEG Steganography With Estimated Side-Information.
IEEE Trans. Circuits Syst. Video Technol., 2020

Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020

Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes.
IEEE Trans. Commun., 2020

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020

2019
Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

Single Image Dehazing Algorithm Based on Sky Region Segmentation.
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019

2018
Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2008
Design and Study of Distribution Map of a General Architecture for Wireless Sensor Networks Based on GDI+.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...