Zhenxing Qian

Orcid: 0000-0002-5224-6374

According to our database1, Zhenxing Qian authored at least 180 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.
Comput. J., February, 2024

Hide and Recognize Your Privacy Image.
IEEE Trans. Netw. Sci. Eng., 2024

Establishing Robust Generative Image Steganography via Popular Stable Diffusion.
IEEE Trans. Inf. Forensics Secur., 2024

Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

Backdoor attack detection via prediction trustworthiness assessment.
Inf. Sci., 2024

ScreenMark: Watermarking Arbitrary Visual Content on Screen.
CoRR, 2024

Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game.
CoRR, 2024

What Makes Good Few-shot Examples for Vision-Language Models?
CoRR, 2024

Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models.
CoRR, 2024

Fact-checking based fake news detection: a review.
CoRR, 2024

PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning.
CoRR, 2024

From Covert Hiding to Visual Editing: Robust Generative Video Steganography.
CoRR, 2024

Sparse Backdoor Attack Against Neural Networks.
Comput. J., 2024

Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.
Comput. J., 2024

From Covert Hiding To Visual Editing: Robust Generative Video Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Are handcrafted filters helpful for attributing AI-generated images?
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cover-separable Fixed Neural Network Steganography via Deep Generative Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Engaging Live Video Comments Generation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

DANCE: Dual-View Distribution Alignment for Dataset Condensation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Revocable Backdoor for Deep Model Trading.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Purified and Unified Steganographic Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Learning to Immunize Images for Tamper Localization and Self-Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning.
Inf. Sci., November, 2023

Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding.
IEEE Trans. Circuits Syst. Video Technol., June, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Image Inpainting Anti-Forensics Network via Attention-Guided Hierarchical Reconstruction.
Symmetry, February, 2023

JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation.
IEEE Trans. Multim., 2023

JPEG Steganography With Content Similarity Evaluation.
IEEE Trans. Cybern., 2023

STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack.
IEEE Signal Process. Lett., 2023

Model Copyright Protection in Buyer-seller Environment.
CoRR, 2023

Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models.
CoRR, 2023

Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection.
CoRR, 2023

Towards Deep Network Steganography: From Networks to Networks.
CoRR, 2023

StyleStegan: Leak-free Style Transfer Based on Feature Steganography.
CoRR, 2023

Generative Steganography Diffusion.
CoRR, 2023

Improved CNN Prediction Based Reversible Data Hiding.
CoRR, 2023

Trojaning semi-supervised learning model via poisoning wild images on the web.
CoRR, 2023

VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

On Physically Occluded Fake Identity Document Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Deep Neural Network Watermarking against Model Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Securing Fixed Neural Network Steganography.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Federated Learning with Label-Masking Distillation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Physical Invisible Backdoor Based on Camera Imaging.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023

PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

Multimodal Fake News Detection via CLIP-Guided Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Image Protection for Robust Cropping Localization and Recovery.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

DRAW: Defending Camera-shooted RAW against Image Manipulation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Identifying the Style of Chatting.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

StyleStegan: Leak-free Style Transfer Based on Feature Steganography.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Preemptive Image Protection against Steganography.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Bootstrapping Multi-View Representations for Fake News Detection.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Steganography of Steganographic Networks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Unified Performance Evaluation Method for Perceptual Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2022

High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2022

Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain.
IEEE Trans. Circuits Syst. Video Technol., 2022

Perceptual Hash of Neural Networks.
Symmetry, 2022

Breaking Robust Data Hiding in Online Social Networks.
IEEE Signal Process. Lett., 2022

An SVD-based screen-shooting resilient watermarking scheme.
Multim. Tools Appl., 2022

Robust backdoor injection with the capability of resisting network transfer.
Inf. Sci., 2022

Exploring Depth Information for Face Manipulation Detection.
CoRR, 2022

Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
CoRR, 2022

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion.
CoRR, 2022

Multimodal Fake News Detection via CLIP-Guided Learning.
CoRR, 2022

Hiding Images in Deep Probabilistic Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Privacy-Preserving Student Learning with Differentially Private Data-Free Distillation.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

HF-Defend: Defending Against Adversarial Examples Based on Halftoning.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Hiding Function with Neural Networks.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

On Generating Identifiable Virtual Faces.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Image Generation Network for Covert Transmission in Online Social Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Generative Steganography Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Imperceptible Backdoor Attack: From Input Space to Feature Representation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Generative Steganographic Flow.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Unlabeled Backdoor Poisoning in Semi-Supervised Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Invertible Image Dataset Protection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

RWN: Robust Watermarking Network for Image Cropping Localization.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Hiding Images Into Images with Real-World Robustness.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation.
Proceedings of the IEEE International Conference on Acoustics, 2022

Image Steganalysis with Convolutional Vision Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Object-Oriented Backdoor Attack Against Image Captioning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Encryption Resistant Deep Neural Network Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2022

Stealthy Backdoor Attack with Adversarial Training.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Diffusion: A General Module for Face Manipulation Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

Batch Steganography via Generative Network.
IEEE Trans. Circuits Syst. Video Technol., 2021

Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension.
IEEE Trans. Circuits Syst. Video Technol., 2021

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021

Reversible Privacy Protection with the Capability of Antiforensics.
Secur. Commun. Networks, 2021

Steganography in animated emoji using self-reference.
Multim. Syst., 2021

Destroying robust steganography in online social networks.
Inf. Sci., 2021

No way to crop: On robust image crop localization.
CoRR, 2021

High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding.
CoRR, 2021

Deep Neural Network Retrieval.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

From Image to Imuge: Immunized Image Generation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Diffusing the Liveness Cues for Face Anti-spoofing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Fragile Neural Network Watermarking with Trigger Image Set.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Undetectable Adversarial Examples Based on Microscopical Regularization.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Reversible Privacy-Preserving Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

On Generating JPEG Adversarial Images.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
Wirel. Commun. Mob. Comput., 2020

Key Based Artificial Fingerprint Generation for Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Diversity-Based Cascade Filters for JPEG Steganalysis.
IEEE Trans. Circuits Syst. Video Technol., 2020

How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

Practical Cover Selection for Steganography.
IEEE Signal Process. Lett., 2020

Reversible data hiding in encrypted images using adaptive reversible integer transformation.
Signal Process., 2020

Anti-forensics of diffusion-based image inpainting.
J. Electronic Imaging, 2020

Defeating data hiding in social networks using generative adversarial network.
EURASIP J. Image Video Process., 2020

Semi-structured data protection scheme based on robust watermarking.
EURASIP J. Image Video Process., 2020

Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis.
CoRR, 2020

Computing in Covert Domain Using Data Hiding.
CoRR, 2020

Reversible Data Hiding in Encrypted Images With Dual Data Embedding.
IEEE Access, 2020

Data Computing in Covert Domain.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., 2019

Additional articles of special issue on Real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Special issue on real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Steganography in stylized images.
J. Electronic Imaging, 2019

Breaking Steganography: Slight Modification with Distortion Minimization.
Int. J. Digit. Crime Forensics, 2019

Reversible Data Hiding With Image Enhancement Using Histogram Shifting.
IEEE Access, 2019

Breaking Permutation-Based Mesh Steganography and Security Improvement.
IEEE Access, 2019

New Paradigm for Self-embedding Image Watermarking with Poisson Equation.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

An Improved Steganalysis Method Using Feature Combinations.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Dependable Secur. Comput., 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Secur. Commun. Networks, 2018

Targeted attack and security enhancement on texture synthesis based steganography.
J. Vis. Commun. Image Represent., 2018

Lossless data hiding in JPEG bitstream using alternative embedding.
J. Vis. Commun. Image Represent., 2018

Constructive Steganography by Tangles.
KSII Trans. Internet Inf. Syst., 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Reversible Data Hiding in Encrypted Images with Two-MSB Prediction.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Unified Data Hiding and Scrambling Method for JPEG Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Distortion Function for Steganography in Texture Synthesized Images.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Single Actor Pooled Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Breaking CNN-Based Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Steganography by Constructing Marbling Texture.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Style Transferring Based Data Hiding for Color Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Reversible Data Hiding in JPEG Images Using Ordered Embedding.
KSII Trans. Internet Inf. Syst., 2017

2016
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2016

Adaptive Reversible Data Hiding by Extending the Generalized Integer Transformation.
IEEE Signal Process. Lett., 2016

Reversible Data Hiding in Encrypted Images Based on Progressive Recovery.
IEEE Signal Process. Lett., 2016

Block cipher based separable reversible data hiding in encrypted images.
Multim. Tools Appl., 2016

Improved joint reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2016

Reversible Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine.
IEEE Trans. Cybern., 2015

JPEG encryption for image rescaling in the encrypted domain.
J. Vis. Commun. Image Represent., 2015

Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes.
Int. J. Netw. Secur., 2015

Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Compressing Encrypted Images With Auxiliary Information.
IEEE Trans. Multim., 2014

Reversible Data Hiding in Encrypted JPEG Bitstream.
IEEE Trans. Multim., 2014

Efficient reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2014

Improved anti-forensics of JPEG compression.
J. Syst. Softw., 2014

Reversible Data Hiding in Encrypted Images Based on Image Interpolation.
Int. J. Digit. Crime Forensics, 2014

Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Simplified Anti-Forensics of JPEG Compression.
J. Comput., 2013

2012
Scalable Coding of Encrypted Images.
IEEE Trans. Image Process., 2012

Spectrum-estimation based lossless information recovery for sparse array patterns.
Telecommun. Syst., 2012

Evolutionary selection extreme learning machine optimization for regression.
Soft Comput., 2012

Lossless data hiding in JPEG bitstream.
J. Syst. Softw., 2012

Reversible watermarking via extreme learning machine prediction.
Neurocomputing, 2012

Generalized Quality Assessment of Blocking Artifacts for Compressed Images.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

2011
Reference Sharing Mechanism for Watermark Self-Embedding.
IEEE Trans. Image Process., 2011

Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011

Self-embedding watermark with flexible restoration quality.
Multim. Tools Appl., 2011

Image self-embedding with high-quality restoration capability.
Digit. Signal Process., 2011

Compressing Encrypted Image Using Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Inpainting Assisted Self Recovery With Decreased Embedding Data.
IEEE Signal Process. Lett., 2010

Reversible fragile watermarking for locating tampered blocks in JPEG images.
Signal Process., 2010

Colour filter array interpolation based self recovery with anti-cropping capability.
Int. J. Multim. Intell. Secur., 2010

Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

2009
Matrix Selection in High Payload Embedding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009


  Loading...