default search action
Weixuan Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Yu Ran, Ao-Xiang Zhang, Mingjie Li, Weixuan Tang, Yuan-Gen Wang:
Black-box adversarial attacks against image quality assessment models. Expert Syst. Appl. 260: 125415 (2025) - 2024
- [j21]Shi Chen, Wennan Wang, Yubin Zhong, Zuobin Ying, Weixuan Tang, Zijie Pan:
HP-MIA: A novel membership inference attack scheme for high membership prediction precision. Comput. Secur. 136: 103571 (2024) - [j20]Fengchuang Xing, Yuan-Gen Wang, Weixuan Tang, Guopu Zhu, Sam Kwong:
CoSTA: Co-training spatial-temporal attention for blind video quality assessment. Expert Syst. Appl. 255: 124651 (2024) - [j19]Weixiang Li, Shihang Wu, Bin Li, Weixuan Tang, Xinpeng Zhang:
Payload-Independent Direct Cost Learning for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1970-1975 (2024) - [j18]Ao-Xiang Zhang, Yuan-Gen Wang, Weixuan Tang, Leida Li, Sam Kwong:
A Spatial-Temporal Video Quality Assessment Method via Comprehensive HVS Simulation. IEEE Trans. Cybern. 54(8): 4749-4762 (2024) - [j17]Qi Cui, Weixuan Tang, Zhili Zhou, Ruohan Meng, Guoshun Nan, Yun-Qing Shi:
Meta Security Metric Learning for Secure Deep Image Hiding. IEEE Trans. Dependable Secur. Comput. 21(5): 4907-4920 (2024) - [j16]Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. IEEE Trans. Inf. Forensics Secur. 19: 15-29 (2024) - [j15]Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. IEEE Trans. Inf. Forensics Secur. 19: 2826-2839 (2024) - [c14]Weixuan Tang, Haoyu Yang, Yuan Rao, Zhili Zhou, Fei Peng:
Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography. ACM Multimedia 2024: 10440-10448 - [i10]Yu Ran, Ao-Xiang Zhang, Mingjie Li, Weixuan Tang, Yuan-Gen Wang:
Black-box Adversarial Attacks Against Image Quality Assessment Models. CoRR abs/2402.17533 (2024) - [i9]Wei Wu, Xi Guo, Weixuan Tang, Tingxuan Huang, Chiyu Wang, Dongyue Chen, Chenjing Ding:
DriveScape: Towards High-Resolution Controllable Multi-View Driving Video Generation. CoRR abs/2409.05463 (2024) - [i8]Chenjing Ding, Chiyu Wang, Boshi Liu, Xi Guo, Weixuan Tang, Wei Wu:
SGC-VQGAN: Towards Complex Scene Representation via Semantic Guided Clustering Codebook. CoRR abs/2409.06105 (2024) - 2023
- [j14]Weixuan Tang, Bin Li, Weixiang Li, Yuangen Wang, Jiwu Huang:
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci. China Inf. Sci. 66(3) (2023) - [j13]Kanghua Mo, Weixuan Tang, Jin Li, Xu Yuan:
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy. IEEE Trans. Dependable Secur. Comput. 20(1): 758-768 (2023) - [j12]Xianbo Mo, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. IEEE Trans. Inf. Forensics Secur. 18: 1524-1538 (2023) - [j11]Zijie Pan, Li Hu, Weixuan Tang, Jin Li, Yi He, Zheli Liu:
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework. IEEE Trans. Knowl. Data Eng. 35(3): 2975-2986 (2023) - [j10]Pei-Gen Ye, Yuan-Gen Wang, Weixuan Tang:
S-MFRL: Spiking Mean Field Reinforcement Learning for Dynamic Resource Allocation of D2D Networks. IEEE Trans. Veh. Technol. 72(1): 1032-1047 (2023) - [j9]Ruitao Hou, Teng Huang, Hongyang Yan, Lishan Ke, Weixuan Tang:
A stealthy and robust backdoor attack via frequency domain transform. World Wide Web (WWW) 26(5): 2767-2783 (2023) - [c13]Wei Zhang, Weixuan Tang, Yuan Rao, Bin Li, Jiwu Huang:
Deep Multi-image Hiding with Random Key. AIS&P (1) 2023: 33-41 - [c12]Weixuan Tang, Yadong Liu:
Active Defense Against Image Steganography. AIS&P (1) 2023: 131-141 - [c11]Weixuan Tang, Yingjie Xie:
An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards. AIS&P (1) 2023: 272-282 - [c10]Zhipeng Bao, Zhili Zhou, Xutong Cui, Weixuan Tang, Chengsheng Yuan:
Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing Environment. ICPADS 2023: 1999-2006 - [c9]Aoxiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang:
Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. NeurIPS 2023 - [c8]Ya Fang, Zipeng Chen, Weixuan Tang, Yuan-Gen Wang:
SemanticCrop: Boosting Contrastive Learning via Semantic-Cropped Views. PRCV (6) 2023: 335-346 - [c7]Yifeng Zhou, Shuheng Wang, Wenfa Li, Chao Zhang, Li Rao, Pu Cheng, Yi Xu, Jinle Ke, Wenduo Feng, Wen Zhou, Hao Xu, Yukang Gao, Yang Ding, Weixuan Tang, Shaohui Jiao:
Live4D: A Real-time Capture System for Streamable Volumetric Video. SIGGRAPH Asia Technical Communications 2023: 23:1-23:4 - [i7]Fengchuang Xing, Yuan-Gen Wang, Weixuan Tang, Guopu Zhu, Sam Kwong:
StarVQA+: Co-training Space-Time Attention for Video Quality Assessment. CoRR abs/2306.12298 (2023) - [i6]Ao-Xiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang:
Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. CoRR abs/2309.13609 (2023) - 2022
- [j8]Da Lin, Yuan-Gen Wang, Weixuan Tang, Xiangui Kang:
Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning. IEEE Signal Process. Lett. 29: 2557-2561 (2022) - [j7]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4081-4095 (2022) - [j6]Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang:
Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5110-5123 (2022) - [c6]Weixuan Tang, Danping Zou:
Multi-instance Point Cloud Registration by Efficient Correspondence Clustering. CVPR 2022: 6657-6666 - [i5]Ao-Xiang Zhang, Yuan-Gen Wang, Weixuan Tang, Leida Li, Sam Kwong:
HVS Revisited: A Comprehensive Video Quality Assessment Framework. CoRR abs/2210.04158 (2022) - 2021
- [j5]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 16: 952-967 (2021) - [c5]Weixuan Tang, Danping Zou, Ping Li:
Learning-based Point Cloud Registration: A Short Review and Evaluation. AIEE 2021: 27-34 - [c4]Xinghong Qin, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image. ICASSP 2021: 2705-2709 - [c3]Dequ Huang, Weixuan Tang, Bin Li:
Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network. ICIG (1) 2021: 759-771 - [i4]Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang:
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image. CoRR abs/2101.05209 (2021) - [i3]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. CoRR abs/2105.03867 (2021) - [i2]Weixuan Tang, Danping Zou:
Multi-instance Point Cloud Registration by Efficient Correspondence Clustering. CoRR abs/2111.14582 (2021)
2010 – 2019
- 2019
- [j4]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN-Based Adversarial Embedding for Image Steganography. IEEE Trans. Inf. Forensics Secur. 14(8): 2074-2087 (2019) - 2018
- [c2]Shijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li:
Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information. IWDW 2018: 261-274 - [i1]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography. CoRR abs/1803.09043 (2018) - 2017
- [j3]Weixuan Tang, Shunquan Tan, Bin Li, Jiwu Huang:
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Process. Lett. 24(10): 1547-1551 (2017) - 2016
- [j2]Weixuan Tang, Bin Li, Weiqi Luo, Jiwu Huang:
Clustering Steganographic Modification Directions for Color Components. IEEE Signal Process. Lett. 23(2): 197-201 (2016) - [j1]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive Steganalysis Based on Embedding Probabilities of Pixels. IEEE Trans. Inf. Forensics Secur. 11(4): 734-745 (2016) - 2014
- [c1]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. IH&MMSec 2014: 91-96
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint