Xiangui Kang

Orcid: 0000-0002-3134-0353

According to our database1, Xiangui Kang authored at least 115 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024

ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Deepfake Feature Extractors Using Unsupervised Domain Adaptation.
IEEE Signal Process. Lett., 2024

L<sub>p</sub>-norm Distortion-Efficient Adversarial Attack.
CoRR, 2024

GM-DF: Generalized Multi-Scenario Deepfake Detection.
CoRR, 2024

Transferable and high-quality adversarial example generation leveraging diffusion model.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion.
IEEE Trans. Dependable Secur. Comput., 2023

Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing.
IEEE Signal Process. Lett., 2023

Robust data hiding for JPEG images with invertible neural network.
Neural Networks, 2023

Forgery-aware Adaptive Vision Transformer for Face Forgery Detection.
CoRR, 2023

Adversarial Attacks on Generated Text Detectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Boosting Transferability of Adversarial Example via an Enhanced Euler's Method.
Proceedings of the IEEE International Conference on Acoustics, 2023

Double Compression Detection Based on the De-Blocking Filtering of HEVC Videos.
Proceedings of the IEEE International Conference on Acoustics, 2023

Robust Image Steganography: Hiding Messages in Frequency Coefficients.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning.
IEEE Signal Process. Lett., 2022

Synthetic Speech Detection Based on Local Autoregression and Variance Statistics.
IEEE Signal Process. Lett., 2022

An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics.
Comput. Secur., 2022

Spatial Image Steganography Using a Correlational Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation.
IEEE Trans. Inf. Forensics Secur., 2021

A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics.
Multim. Syst., 2021

JPEG Steganography with Embedding Cost Learning and Side-Information Estimation.
CoRR, 2021

Face Forgery Detection Based On Segmentation Network.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

A Capsule Network Based Approach for Detection of Audio Spoofing Attacks.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2021

Deriving a Compact Analytical Model for Camera Response Functions with Application to Chartless Radiometric Calibration.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
An Embedding Cost Learning Framework Using GAN.
IEEE Trans. Inf. Forensics Secur., 2020

General and Improved Five-Step Discrete-Time Zeroing Neural Dynamics Solving Linear Time-Varying Matrix Equation with Unknown Transpose.
Neural Process. Lett., 2020

Automated Design of Neural Network Architectures With Reinforcement Learning for Detection of Global Manipulations.
IEEE J. Sel. Top. Signal Process., 2020

Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks.
Proceedings of the Advances in Digital Forensics XVI, 2020

Auto-Generating Neural Networks with Reinforcement Learning for Multi-Purpose Image Forensics.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Autoregressive Model Based Smoothing Forensics Of Very Short Speech Clips.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Hiding Traces of Camera Anonymization by Poisson Blending.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Approaching Optimal Embedding In Audio Steganography With GAN.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Zhang Neural Dynamics (ZND) Tracking Control of Multiple Integrator Systems with Noise Disturbances: Theoretical and Simulative Results.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

A Generative Adversarial Network Framework for JPEG Anti-Forensics.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Densely Connected Convolutional Network for Audio Spoofing Detection.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
JPEG steganalysis with combined dense connected CNNs and SCA-GFR.
Multim. Tools Appl., 2019

A multi-purpose image forensic method using densely connected convolutional neural networks.
J. Real Time Image Process., 2019

A Universal Image Forensics of Smoothing Filtering.
Int. J. Digit. Crime Forensics, 2019

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode.
IEEE Access, 2019

Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images.
IEEE Access, 2019

Depthwise Separable Convolutional Neural Network for Image Forensics.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

IStego100K: Large-Scale Image Steganalysis Dataset.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Towards Automatic Embedding Cost Learning for JPEG Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

New 5-Step Discrete-Time Zeroing Neuronet for Time-Dependent Matrix Square Root Finding.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Multiple-Operation Image Anti-Forensics with WGAN-GP Framework.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Three-step general discrete-time Zhang neural network design and application to time-variant matrix inversion.
Neurocomputing, 2018

Spatial Image Steganography Based on Generative Adversarial Network.
CoRR, 2018

Countering JPEG anti-forensics based on noise level estimation.
Sci. China Inf. Sci., 2018

Revealing the processing history of pitch-shifted voice using CNNs.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

A Rotation-Invariant Convolutional Neural Network for Image Enhancement Forensics.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Anti-Forensics of JPEG Compression Using Generative Adversarial Networks.
Proceedings of the 26th European Signal Processing Conference, 2018

Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Deep Learning with Feature Reuse for JPEG Image Steganalysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
A Framework of Camera Source Identification Bayesian Game.
IEEE Trans. Cybern., 2017

Image splicing localization using PCA-based noise level estimation.
Multim. Tools Appl., 2017

Exposing speech tampering via spectral phase analysis.
Digit. Signal Process., 2017

JPEG Steganalysis Based on DenseNet.
CoRR, 2017

Revealing Traces of Image Resampling and Resampling Antiforensics.
Adv. Multim., 2017

Ensemble of CNN and rich model for steganalysis.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017

Steganalysis Based on Awareness of Selection-Channel and Deep Learning.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Image Forensics Based on Transfer Learning and Convolutional Neural Network.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Zhang dynamics tracking control of varactor system with stability analysis.
Proceedings of the 13th International Conference on Natural Computation, 2017

Supervised audio tampering detection using an autoregressive model.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Recognition of spoofed voice using convolutional neural networks.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Multi-channel neural network for steganalysis.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Audio Recapture Detection With Convolutional Neural Networks.
IEEE Trans. Multim., 2016

Forensics and counter anti-forensics of video inter-frame forgery.
Multim. Tools Appl., 2016

A Multi-purpose countermeasure against image anti-forensics using autoregressive model.
Neurocomputing, 2016

A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Pedestrian detection via a leg-driven physiology framework.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Exposing heterogeneous chain of video recompression.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2015
Median Filtering Forensics Based on Convolutional Neural Networks.
IEEE Signal Process. Lett., 2015

Removing camera fingerprint to disguise photograph source.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Countering anti-forensics of image resampling.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
A context-adaptive SPN predictor for trustworthy source camera identification.
EURASIP J. Image Video Process., 2014

ZG trajectory generation of Van der Pol oscillator in affine-control form with division-by-zero problem handled.
Proceedings of the 10th International Conference on Natural Computation, 2014

Countering anti-forensics of median filtering.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Robust Median Filtering Forensics Using an Autoregressive Model.
IEEE Trans. Inf. Forensics Secur., 2013

Performing scalable lossy compression on pixel encrypted images.
EURASIP J. Image Video Process., 2013

Camera Source Identification Game with Incomplete Information.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Mixed-strategy Nash equilibrium in the camera source identification game.
Proceedings of the IEEE International Conference on Image Processing, 2013

Forensic sensor pattern noise extraction from large image data set.
Proceedings of the IEEE International Conference on Acoustics, 2013

Device identification based on H.264 cues.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

Game theoretic analysis of camera source identification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

The game of countering JPEG anti-forensics based on the noise level estimation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise.
IEEE Trans. Inf. Forensics Secur., 2012

Robust Median Filtering Detection Based on Filtered Residual.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A context adaptive predictor of sensor pattern noise for camera source identification.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Scalable Lossy Compression for Pixel-Value Encrypted Images.
Proceedings of the 2012 Data Compression Conference, Snowbird, UT, USA, April 10-12, 2012, 2012

Robust median filtering forensics based on the autoregressive model of median filtered residual.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Geometric Invariant Audio Watermarking Based on an LCM Feature.
IEEE Trans. Multim., 2011

Enhancing ROC performance of trustworthy camera source identification.
Proceedings of the Media Forensics and Security III, 2011

2010
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping.
IEEE Trans. Inf. Forensics Secur., 2010

2009
Non-ambiguity of blind watermarking: a revisit with analytical resolution.
Sci. China Ser. F Inf. Sci., 2009

2008
Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver.
IEEE Trans. Multim., 2008

A Multi-band Wavelet Watermarking Scheme.
Int. J. Netw. Secur., 2008

A Practical Print-and-Scan Resilient Watermarking for High Resolution Images.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Robust Audio Watermarking Based on Log-Polar Frequency Index.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

An efficient print-scanning resilient data hiding scheme based on a novel LPM.
Proceedings of the International Conference on Image Processing, 2008

2007
Fast and automatic watermark resynchronization based on zernike moments.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Achieving non-ambiguity of quantization-based watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

SNR-Based Bit Allocation in Video Quality Smoothing.
Proceedings of the Advances in Multimedia Information Processing, 2006

2005
SNR-Based Frame-Level Video Bit Rate Allocation.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

2004
Improve robustness of image watermarking via adaptive receiving.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Technol., 2003

Robust Watermarking with Adaptive Receiving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
An Image Watermarking Algorithm Robust to Geometric Distortion.
Proceedings of the Digital Watermarking, First International Workshop, 2002


  Loading...