


Остановите войну!
for scientists:


default search action
Kejiang Chen
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j19]Kai Zeng, Kejiang Chen
, Weiming Zhang
, Yaofei Wang
, Nenghai Yu:
Improving robust adaptive steganography via minimizing channel errors. Signal Process. 195: 108498 (2022) - [j18]Kejiang Chen
, Hang Zhou
, Hanqing Zhao, Dongdong Chen
, Weiming Zhang
, Nenghai Yu
:
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models. IEEE Trans. Dependable Secur. Comput. 19(5): 3343-3356 (2022) - [j17]Yao Zhu
, Yuefeng Chen, Xiaodan Li, Kejiang Chen
, Yuan He
, Xiang Tian, Bolun Zheng
, Yaowu Chen
, Qingming Huang
:
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective. IEEE Trans. Image Process. 31: 6487-6501 (2022) - [j16]Jiansong Zhang
, Kejiang Chen
, Chuan Qin
, Weiming Zhang
, Nenghai Yu
:
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis. IEEE Trans. Multim. 24: 4538-4550 (2022) - [j15]Hang Zhou
, Weiming Zhang
, Kejiang Chen
, Weixiang Li
, Nenghai Yu
:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. IEEE Trans. Vis. Comput. Graph. 28(12): 5006-5025 (2022) - [c13]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. AAAI 2022: 11613-11621 - [c12]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition. ICASSP 2022: 3059-3063 - [c11]Jinliu Feng, Yaofei Wang
, Kejiang Chen, Weiming Zhang, Nenghai Yu:
An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression. ICASSP 2022: 3084-3088 - [c10]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. ICME 2022: 1-6 - [i14]Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Invertible Mask Network for Face Privacy-Preserving. CoRR abs/2204.08895 (2022) - [i13]Yao Zhu, Yuefeng Chen, Xiaodan Li, Kejiang Chen, Yuan He, Xiang Tian, Bolun Zheng, Yaowu Chen, Qingming Huang:
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective. CoRR abs/2210.04213 (2022) - [i12]Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. CoRR abs/2210.14632 (2022) - 2021
- [j14]Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181: 107920 (2021) - [j13]Kejiang Chen
, Hang Zhou
, Dongdong Hou
, Weiming Zhang
, Nenghai Yu
:
Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric. IEEE Trans. Circuits Syst. Video Technol. 31(10): 3942-3953 (2021) - [j12]Hang Zhou
, Kejiang Chen
, Weiming Zhang
, Chuan Qin
, Nenghai Yu
:
Feature-Preserving Tensor Voting Model for Mesh Steganalysis. IEEE Trans. Vis. Comput. Graph. 27(1): 57-67 (2021) - [c9]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin
, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection Beyond Image Space. ICASSP 2021: 3850-3854 - [i11]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection beyond Image Space. CoRR abs/2102.11586 (2021) - [i10]Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, In So Kweon:
A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs/2103.01607 (2021) - [i9]Hang Zhou
, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. CoRR abs/2104.10203 (2021) - [i8]Kai Zeng, Kejiang Chen, Yaofei Wang, Weiming Zhang, Nenghai Yu:
Improving Dither Modulation based Robust Steganography by Overflow Suppression. CoRR abs/2110.08697 (2021) - [i7]Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu:
Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition. CoRR abs/2110.09814 (2021) - [i6]Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu:
Tracing Text Provenance via Context-Aware Lexical Substitution. CoRR abs/2112.07873 (2021) - [i5]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. CoRR abs/2112.14420 (2021) - 2020
- [j11]Xinzhi Yu, Kejiang Chen
, Yaofei Wang
, Weixiang Li, Weiming Zhang
, Nenghai Yu:
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process. 168 (2020) - [j10]Kejiang Chen
, Hang Zhou
, Weixiang Li
, Kuan Yang, Weiming Zhang
, Nenghai Yu
:
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2027-2032 (2020) - [j9]Weixiang Li
, Kejiang Chen
, Weiming Zhang
, Hang Zhou
, Yaofei Wang
, Nenghai Yu
:
JPEG Steganography With Estimated Side-Information. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2288-2294 (2020) - [j8]Li Li, Weiming Zhang
, Kejiang Chen
, Nenghai Yu
:
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks. IEEE Trans. Multim. 22(10): 2526-2536 (2020) - [c8]Hang Zhou, Dongdong Chen, Jing Liao
, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Weiming Zhang, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks. CVPR 2020: 10353-10362 - [c7]Kejiang Chen, Yuefeng Chen, Hang Zhou, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-Supervised Adversarial Training. ICASSP 2020: 2218-2222 - [i4]Hang Zhou
, Dongdong Chen, Jing Liao, Weiming Zhang, Kejiang Chen, Xiaoyi Dong, Kunlin Liu, Gang Hua, Nenghai Yu:
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks. CoRR abs/2011.00566 (2020)
2010 – 2019
- 2019
- [j7]Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Controversial 'pixel' prior rule for JPEG adaptive steganography. IET Image Process. 13(1): 24-33 (2019) - [j6]Li Li, Weiming Zhang
, Kejiang Chen, Hongyue Zha, Nenghai Yu:
Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection. Multim. Tools Appl. 78(7): 8041-8055 (2019) - [j5]Dongdong Hou
, Weiming Zhang
, Kejiang Chen
, Sian-Jheng Lin
, Nenghai Yu:
Reversible Data Hiding in Color Image With Grayscale Invariance. IEEE Trans. Circuits Syst. Video Technol. 29(2): 363-374 (2019) - [j4]Kejiang Chen
, Hang Zhou, Wenbo Zhou, Weiming Zhang
, Nenghai Yu:
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale. IEEE Trans. Inf. Forensics Secur. 14(4): 1052-1066 (2019) - [j3]Hang Zhou
, Kejiang Chen
, Weiming Zhang
, Yuanzhi Yao
, Nenghai Yu:
Distortion Design for Secure Adaptive 3-D Mesh Steganography. IEEE Trans. Multim. 21(6): 1384-1398 (2019) - [c6]Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense. ICCV 2019: 1961-1970 - [i3]Kejiang Chen, Hang Zhou, Yuefeng Chen, Xiaofeng Mao, Yuhong Li, Yuan He, Hui Xue, Weiming Zhang, Nenghai Yu:
Self-supervised Adversarial Training. CoRR abs/1911.06470 (2019) - 2018
- [j2]Hang Zhou
, Kejiang Chen, Weiming Zhang
, Zhenxing Qian, Nenghai Yu:
Targeted attack and security enhancement on texture synthesis based steganography. J. Vis. Commun. Image Represent. 54: 100-107 (2018) - [c5]Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. IH&MMSec 2018: 5-16 - [c4]Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu:
Adversarial Examples Against Deep Neural Network based Steganalysis. IH&MMSec 2018: 67-72 - [c3]Kuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. IWDW 2018: 55-68 - [c2]Xinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang
, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. IWDW 2018: 248-260 - [i2]Kejiang Chen, Hang Zhou
, Dongdong Hou, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
Provably Secure Steganography on Generative Media. CoRR abs/1811.03732 (2018) - [i1]Hang Zhou
, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu:
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. CoRR abs/1812.11017 (2018) - 2017
- [j1]Hang Zhou
, Kejiang Chen, Weiming Zhang
, Nenghai Yu:
Comments on "Steganography Using Reversible Texture Synthesis". IEEE Trans. Image Process. 26(4): 1623-1625 (2017) - 2016
- [c1]Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. WIFS 2016: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-02-01 22:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint