


default search action
Yun Cao 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation (PhD 2012): University of Chinese Academy of Sciences, Beiing, China
Other persons with the same name
- Yun Cao — disambiguation page
- Yun Cao 0002 — Tencent Youtu Lab, Shenzen, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zeyu Zhang
, Xianfeng Zhao
, Yun Cao:
Unveiling tampering traces: Enhancing image reconstruction errors for visualization. J. Vis. Commun. Image Represent. 100: 104125 (2024) - [j16]Rongchuan Zhang
, Peisong He
, Haoliang Li
, Shiqi Wang
, Yun Cao
:
Temporal Diversified Self-Contrastive Learning for Generalized Face Forgery Detection. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12782-12795 (2024) - [c28]Yun Cao, Yanfei Tong, Han Bao, Xin Liao, Meineng Zhu:
OC-SAN: Unsupervised Deepfake Detection for Specific Individual Protection Based on Deep One-Class Classification. PRCV (10) 2024: 327-341 - [c27]Haocheng Fu, Yun Cao, Xiaolei He:
On the Performance Bounds of Steganographic Polar Codes. WCSP 2024: 115-120 - 2023
- [j15]Xiong Xu, Shuai Tang, Mingcheng Zhu
, Peisong He, Sirui Li, Yun Cao:
A novel model compression method based on joint distillation for deepfake video detection. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101792 (2023) - [j14]Yanjiang Zhou
, Peisong He
, Weichuang Li
, Yun Cao
, Xinghao Jiang
:
Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning. IEEE Signal Process. Lett. 30: 1767-1771 (2023) - [j13]Gen Li
, Xianfeng Zhao
, Yun Cao
:
Forensic Symmetry for DeepFakes. IEEE Trans. Inf. Forensics Secur. 18: 1095-1110 (2023) - [c26]Jinchuan Li
, Xianfeng Zhao
, Yun Cao
:
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks. IWDW 2023: 125-138 - [c25]Pengfei Pei
, Xianfeng Zhao
, Jinchuan Li
, Yun Cao
:
VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces. PRICAI (3) 2023: 434-446 - [i4]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao:
UVL: A Unified Framework for Video Tampering Localization. CoRR abs/2309.16126 (2023) - 2022
- [j12]Jingxuan Tan
, Xin Liao
, Jiate Liu, Yun Cao
, Hongbo Jiang:
Channel Attention Image Steganography With Generative Adversarial Networks. IEEE Trans. Netw. Sci. Eng. 9(2): 888-903 (2022) - [c24]Gen Li, Xianfeng Zhao
, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang:
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection. IH&MMSec 2022: 7-18 - [c23]Pengfei Pei, Xianfeng Zhao
, Yun Cao, Chengqiao Hu:
Visual Explanations for Exposing Potential Inconsistency of Deepfakes. IWDW 2022: 68-82 - [c22]Gen Li, Xianfeng Zhao
, Yun Cao, Chengqiao Hu:
Manipulated Face Detection and Localization Based on Semantic Segmentation. IWDW 2022: 98-113 - 2021
- [j11]Xin Liao
, Jing Peng
, Yun Cao:
GIFMarking: The robust watermarking for animated GIF based deep learning. J. Vis. Commun. Image Represent. 79: 103244 (2021) - [j10]Yu Wang
, Yun Cao
, Xianfeng Zhao
:
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding. IEEE Trans. Inf. Forensics Secur. 16: 333-345 (2021) - [j9]Yun Cao
, Hong Zhang
, Xianfeng Zhao
, Xiaolei He
:
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks. IEEE Trans. Inf. Forensics Secur. 16: 3326-3338 (2021) - [c21]Gen Li, Yun Cao, Xianfeng Zhao
:
Exploiting Facial Symmetry to Expose Deepfakes. ICIP 2021: 3587-3591 - [c20]Zeyu Zhang, Yun Cao, Xianfeng Zhao
:
A Multi-level Feature Enhancement Network for Image Splicing Localization. IWDW 2021: 3-16 - [i3]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao, Xiaowei Yi:
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos. CoRR abs/2112.08117 (2021) - 2020
- [j8]Yu Wang
, Yun Cao
, Xianfeng Zhao
:
CEC: Cluster Embedding Coding for H.264 Steganography. IEEE Signal Process. Lett. 27: 955-959 (2020)
2010 – 2019
- 2019
- [j7]Yaqi Liu
, Xiaobin Zhu, Xianfeng Zhao
, Yun Cao:
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution. IEEE Trans. Inf. Forensics Secur. 14(10): 2551-2566 (2019) - [c19]Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao
, Yun Cao:
Light Multiscale Conventional Neural Network for MP3 Steganalysis. IWDW 2019: 43-56 - 2018
- [c18]Yun Cao, Yu Wang, Xianfeng Zhao
, Meineng Zhu, Zhoujun Xu:
Cover Block Decoupling for Content-Adaptive H.264 Steganography. IH&MMSec 2018: 23-30 - [c17]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao
, Yun Cao:
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks. IH&MMSec 2018: 85-90 - [c16]Yu Wang, Yun Cao, Xianfeng Zhao
, Zhoujun Xu, Meineng Zhu:
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC. IH&MMSec 2018: 97-107 - [i2]Yaqi Liu, Xianfeng Zhao, Xiaobin Zhu, Yun Cao:
Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution. CoRR abs/1809.02791 (2018) - 2017
- [j6]Jie Zhu, Qingxiao Guan, Xianfeng Zhao
, Yun Cao, Gong Chen:
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics. Int. J. Digit. Crime Forensics 9(4): 1-14 (2017) - [j5]Peipei Wang
, Yun Cao, Xianfeng Zhao
:
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. Secur. Commun. Networks 2017: 8051389:1-8051389:12 (2017) - [j4]Hong Zhang
, Yun Cao, Xianfeng Zhao
:
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality. IEEE Trans. Inf. Forensics Secur. 12(2): 465-478 (2017) - [c15]Peipei Wang, Yun Cao, Xianfeng Zhao
, Meineng Zhu:
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos. IH&MMSec 2017: 123-133 - [c14]Yu Wang, Yun Cao, Xianfeng Zhao
, Linna Zhou:
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. IWDW 2017: 163-176 - [c13]Weike You, Yun Cao, Xianfeng Zhao
:
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy. IWDW 2017: 187-201 - [i1]Yaqi Liu, Qingxiao Guan, Xianfeng Zhao, Yun Cao:
Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks. CoRR abs/1706.07842 (2017) - 2016
- [j3]Hong Zhang
, Yun Cao, Xianfeng Zhao
:
Motion vector-based video steganography with preserved local optimality. Multim. Tools Appl. 75(21): 13503-13519 (2016) - [c12]Yu Wang, Yun Cao, Xianfeng Zhao
:
Video Steganalysis Based on Centralized Error Detection in Spatial Domain. Inscrypt 2016: 472-483 - [c11]Peipei Wang, Hong Zhang
, Yun Cao, Xianfeng Zhao
:
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution. IH&MMSec 2016: 127-137 - [c10]Hong Zhang
, Yun Cao, Xianfeng Zhao
, Haibo Yu, Changjun Liu:
Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern. IWDW 2016: 588-600 - 2015
- [j2]Yun Cao, Hong Zhang
, Xianfeng Zhao
, Haibo Yu:
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation. IEEE Commun. Lett. 19(2): 203-206 (2015) - [c9]Peipei Wang, Yun Cao, Xianfeng Zhao
, Bin Wu:
Motion vector reversion-based steganalysis revisited. ChinaSIP 2015: 463-467 - [c8]Lingyu Zhang, Diao Chen, Yun Cao, Xianfeng Zhao
:
A Practical Method to Determine Achievable Rates for Secure Steganography. HPCC/CSS/ICESS 2015: 1274-1281 - [c7]Peipei Wang, Yun Cao, Xianfeng Zhao
, Haibo Yu:
An adaptive detecting strategy against motion vector-based steganography. ICME 2015: 1-6 - [c6]Yun Cao, Hong Zhang
, Xianfeng Zhao
, Haibo Yu:
Video Steganography Based on Optimized Motion Estimation Perturbation. IH&MMSec 2015: 25-31 - [c5]Yanbin Zhao, Hong Zhang
, Yun Cao, Peipei Wang, Xianfeng Zhao
:
Video Steganalysis Based on Intra Prediction Mode Calibration. IWDW 2015: 119-133 - 2014
- [c4]Hong Zhang
, Yun Cao, Xianfeng Zhao
, Weiming Zhang, Nenghai Yu:
Video steganography with perturbed macroblock partition. IH&MMSec 2014: 115-122 - 2013
- [c3]Yun Cao, Xianfeng Zhao
, Fenghua Li, Nenghai Yu:
Video steganography with multi-path motion estimation. Media Watermarking, Security, and Forensics 2013: 86650K - 2012
- [j1]Yun Cao, Xianfeng Zhao
, Dengguo Feng:
Video Steganalysis Exploiting Motion Vector Reversion-Based Features. IEEE Signal Process. Lett. 19(1): 35-38 (2012) - 2011
- [c2]Yun Cao, Xianfeng Zhao
, Dengguo Feng, Rennong Sheng:
Video Steganography with Perturbed Motion Estimation. Information Hiding 2011: 193-207
2000 – 2009
- 2009
- [c1]Yun Cao, Xianfeng Zhao
, Dengguo Feng:
Entropy codec based on evolutionary MHT and its application in video encryption. MM&Sec 2009: 155-160
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 17:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint