Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Loading…
Loading…
CNN-Based Adversarial Embedding for Image Steganography
Weixuan Tang, Bin Li, Shunquan Tan, Barni, Mauro, Jiwu Huang
Published in IEEE transactions on information forensics and security (01.08.2019)
Published in IEEE transactions on information forensics and security (01.08.2019)
Get full text
Journal Article
Loading…
Loading…
Using Deep Convolutional Neural Network Architectures for Object Classification and Detection Within X-Ray Baggage Security Imagery
Akcay, Samet, Kundegorski, Mikolaj E., Willcocks, Chris G., Breckon, Toby P.
Published in IEEE transactions on information forensics and security (01.09.2018)
Published in IEEE transactions on information forensics and security (01.09.2018)
Get full text
Journal Article
Loading…
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network
George, Anjith, Mostaani, Zohreh, Geissenbuhler, David, Nikisins, Olegs, Anjos, Andre, Marcel, Sebastien
Published in IEEE transactions on information forensics and security (2020)
Published in IEEE transactions on information forensics and security (2020)
Get full text
Journal Article
Loading…
Loading…
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
Yang, Zhong-Liang, Guo, Xiao-Qing, Chen, Zi-Ming, Huang, Yong-Feng, Zhang, Yu-Jin
Published in IEEE transactions on information forensics and security (01.05.2019)
Published in IEEE transactions on information forensics and security (01.05.2019)
Get full text
Journal Article
Loading…
Loading…
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy
Xu, Chugui, Ren, Ju, Zhang, Deyu, Zhang, Yaoxue, Qin, Zhan, Ren, Kui
Published in IEEE transactions on information forensics and security (01.09.2019)
Published in IEEE transactions on information forensics and security (01.09.2019)
Get full text
Journal Article
Loading…
Loading…
Zipf's Law in Passwords
Wang, Ding, Cheng, Haibo, Wang, Ping, Huang, Xinyi, Jian, Gaopeng
Published in IEEE transactions on information forensics and security (01.11.2017)
Published in IEEE transactions on information forensics and security (01.11.2017)
Get full text
Journal Article
Loading…
Loading…
Black-Box Dataset Ownership Verification via Backdoor Watermarking
Li, Yiming, Zhu, Mingyan, Yang, Xue, Jiang, Yong, Wei, Tao, Xia, Shu-Tao
Published in IEEE transactions on information forensics and security (2023)
Published in IEEE transactions on information forensics and security (2023)
Get full text
Journal Article
Loading…
Loading…
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu, Man Ho Au, Ateniese, Giuseppe, Xinyi Huang, Susilo, Willy, Yuanshun Dai, Geyong Min
Published in IEEE transactions on information forensics and security (01.04.2017)
Published in IEEE transactions on information forensics and security (01.04.2017)
Get full text
Journal Article
Loading…