Xianfeng Zhao
Orcid: 0000-0002-5617-8399
According to our database1,
Xianfeng Zhao
authored at least 152 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Neural Networks Learn. Syst., July, 2024
J. Vis. Commun. Image Represent., 2024
ProDub: Progressive Growing of Facial Dubbing Networks for Enhanced Lip Sync and Fidelity.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
RLVC: Robust and Lightweight Voice Conversion Using Cross-Adaptive Instance Normalization.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
2023
EURASIP J. Inf. Secur., December, 2023
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Robust Feature Decoupling in Voice Conversion by Using Locality-Based Instance Normalization.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Design for a Communication Signal Modulation Pattern Recognition System Based on AP-SoC.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023
2022
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
Robust video steganography for social media sharing based on principal component analysis.
EURASIP J. Inf. Secur., 2022
CoRR, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Improving Robustness of Speech Anti-Spoofing System Using Resnext with Neighbor Filters.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Video Frame Interpolation via Local Lightweight Bidirectional Encoding with Channel Attention Cascade.
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Signal Process. Lett., 2021
Multim. Tools Appl., 2021
J. Vis. Commun. Image Represent., 2021
J. Vis. Commun. Image Represent., 2021
Int. J. Intell. Syst., 2021
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
2020
Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Signal Process. Lett., 2020
IEEE Signal Process. Lett., 2020
Adaptive fault-tolerant consensus for a class of leader-following systems using neural network learning strategy.
Neural Networks, 2020
An AAC steganography scheme for adaptive embedding with distortion minimization model.
Multim. Tools Appl., 2020
Impact of altruistic motivation perception on corporate hypocrisy: A study based on fuzzy set qualitative comparative analysis.
J. Intell. Fuzzy Syst., 2020
Inf. Sci., 2020
A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering.
IEEE Access, 2020
Constrained Image Splicing Detection and Localization With Attention-Aware Encoder-Decoder and Atrous Convolution.
IEEE Access, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
2019
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching.
IEEE Trans. Inf. Forensics Secur., 2019
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model.
IEEE Trans. Inf. Forensics Secur., 2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019
Boosting Image Steganalysis Under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy.
IEEE Signal Process. Lett., 2019
Multim. Tools Appl., 2019
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation.
Int. J. Digit. Crime Forensics, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
Relationship Between Entrepreneurial Motivation and Crowdfunding Success Based on Qualitative Analysis-Based on Kickstarer Website Data.
Wirel. Pers. Commun., 2018
Signal Process. Image Commun., 2018
Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Real Time Image Process., 2018
J. Frankl. Inst., 2018
Int. J. Digit. Crime Forensics, 2018
CoRR, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017
Secur. Commun. Networks, 2017
Multim. Tools Appl., 2017
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Improving spatial image adaptive steganalysis incorporating the embedding impactont he feature.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
2016
Multim. Tools Appl., 2016
Novel cover selection criterion for spatial steganography using linear pixel prediction error.
Sci. China Inf. Sci., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015
Multim. Tools Appl., 2015
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. Comput. Intell. Syst., 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
2012
IEEE Signal Process. Lett., 2012
2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Inf. Secur., 2010
2009
Proceedings of the Multimedia and Security Workshop, 2009
2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the 15th Color and Imaging Conference, 2007
2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
2003
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003
Proceedings of the Advances in Web-Age Information Management, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002