Weixuan Tang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
A trigger-perceivable backdoor attack framework driven by image steganography.
Pattern Recognit., 2025

Black-box adversarial attacks against image quality assessment models.
Expert Syst. Appl., 2025

2024
A Spatial-Temporal Video Quality Assessment Method via Comprehensive HVS Simulation.
IEEE Trans. Cybern., August, 2024

Payload-Independent Direct Cost Learning for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

HP-MIA: A novel membership inference attack scheme for high membership prediction precision.
Comput. Secur., January, 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network.
IEEE Trans. Inf. Forensics Secur., 2024

Meta Security Metric Learning for Secure Deep Image Hiding.
IEEE Trans. Dependable Secur. Comput., 2024

CoSTA: Co-training spatial-temporal attention for blind video quality assessment.
Expert Syst. Appl., 2024

InfinityDrive: Breaking Time Limits in Driving World Models.
CoRR, 2024

Secure Video Quality Assessment Resisting Adversarial Attacks.
CoRR, 2024

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023

Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023

S-MFRL: Spiking Mean Field Reinforcement Learning for Dynamic Resource Allocation of D2D Networks.
IEEE Trans. Veh. Technol., 2023

ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy.
IEEE Trans. Dependable Secur. Comput., 2023

StarVQA+: Co-training Space-Time Attention for Video Quality Assessment.
CoRR, 2023

Live4D: A Real-time Capture System for Streamable Volumetric Video.
Proceedings of the SIGGRAPH Asia 2023 Technical Communications, 2023

SemanticCrop: Boosting Contrastive Learning via Semantic-Cropped Views.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing Environment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Deep Multi-image Hiding with Random Key.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Active Defense Against Image Steganography.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning.
IEEE Signal Process. Lett., 2022

HVS Revisited: A Comprehensive Video Quality Assessment Framework.
CoRR, 2022

2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.
CoRR, 2021

Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image.
Proceedings of the IEEE International Conference on Acoustics, 2021

2019
CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2019

2018
CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

2017
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network.
IEEE Signal Process. Lett., 2017

2016
Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Inf. Forensics Secur., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

2014
Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014


  Loading...