What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiwu Huang
Google Scholar
83
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models.
Ye Lu
Shen Wang
Guopu Zhu
Zhaoyang Zhang
Jiwu Huang
2025
journals/tifs
A Forensic Framework With Diverse Data Generation for Generalizable Forgery Localization.
Yuanhang Huang
Weiqi Luo
Xiaochun Cao
Jiwu Huang
2024
journals/tifs
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy.
Zhaoyang Zhang
Shen Wang
Guopu Zhu
Dechen Zhan
Jiwu Huang
2024
journals/tifs
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
Weixuan Tang
Zhili Zhou
Bin Li
Kim-Kwang Raymond Choo
Jiwu Huang
2024
journals/tifs
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.
Anwei Luo
Chenqi Kong
Jiwu Huang
Yongjian Hu
Xiangui Kang
Alex C. Kot
2024
journals/tifs
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling.
Kangkang Wei
Weiqi Luo
Jiwu Huang
2024
journals/tifs
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization.
Rongxuan Peng
Shunquan Tan
Xianbo Mo
Bin Li
Jiwu Huang
2024
journals/tifs
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations.
Junyan Wu
Qilin Yin
Ziqi Sheng
Wei Lu
Jiwu Huang
Bin Li
2024
journals/tifs
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection.
Guoyuan Lin
Weiqi Luo
Da Luo
Jiwu Huang
2024
journals/tifs
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network.
Dongxia Huang
Weiqi Luo
Minglin Liu
Weixuan Tang
Jiwu Huang
2024
journals/tifs
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection.
Changsheng Chen
Bokang Li
Rizhao Cai
Jishen Zeng
Jiwu Huang
2024
conf/ccs
Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning.
Yufei Zhou
Peijia Zheng
Xiaochun Cao
Jiwu Huang
2024
conf/ih
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model.
Yang Su
Shunquan Tan
Jiwu Huang
2023
journals/tifs
Comprehensive Android Malware Detection Based on Federated Learning Architecture.
Wenbo Fang
Junjiang He
Wenshan Li
Xiaolong Lan
Yang Chen
Tao Li
Jiwu Huang
Linlin Zhang
2023
journals/tifs
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems.
Shen Wang
Zhaoyang Zhang
Guopu Zhu
Xinpeng Zhang
Yicong Zhou
Jiwu Huang
2023
journals/tifs
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection.
Qilin Yin
Wei Lu
Bin Li
Jiwu Huang
2023
journals/tifs
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
Xianbo Mo
Shunquan Tan
Weixuan Tang
Bin Li
Jiwu Huang
2023
journals/tifs
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization.
Peiyu Zhuang
Haodong Li
Rui Yang
Jiwu Huang
2023
conf/ccs
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Xianbo Mo
Shunquan Tan
Bin Li
Jiwu Huang
2022
journals/tifs
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks.
Changsheng Chen
Shuzheng Zhang
Fengbo Lan
Jiwu Huang
2022
journals/tifs
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells.
Zhaoxu Hu
Changsheng Chen
Wai Ho Mow
Jiwu Huang
2022
journals/tifs
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.
Long Zhuo
Shunquan Tan
Bin Li
Jiwu Huang
2022
journals/tifs
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation.
Kangkang Wei
Weiqi Luo
Shunquan Tan
Jiwu Huang
2021
journals/tifs
Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents.
Xianglei Hu
Jiangqun Ni
Weizhe Zhang
Jiwu Huang
2021
journals/tifs
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images.
Shunquan Tan
Weilong Wu
Zilong Shao
Qiushi Li
Bin Li
Jiwu Huang
2021
journals/tifs
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
Weixuan Tang
Bin Li
Mauro Barni
Jin Li
Jiwu Huang
2021
journals/tifs
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography.
Xianbo Mo
Shunquan Tan
Bin Li
Jiwu Huang
2021
journals/tifs
Image Tampering Localization Using a Dense Fully Convolutional Network.
Peiyu Zhuang
Haodong Li
Shunquan Tan
Bin Li
Jiwu Huang
2021
journals/tifs
A New Adversarial Embedding Method for Enhancing Image Steganography.
Minglin Liu
Weiqi Luo
Peijia Zheng
Jiwu Huang
2021
journals/tifs
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video.
Xianhao Tian
Peijia Zheng
Jiwu Huang
2020
journals/istr
Universal stego post-processing for enhancing image steganography.
Bolin Chen
Weiqi Luo
Peijia Zheng
Jiwu Huang
2020
journals/tifs
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models.
Changsheng Chen
Mulin Li
Anselmo Ferreira
Jiwu Huang
Rizhao Cai
2020
journals/tifs
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks.
Wenyun Sun
Yu Song
Changsheng Chen
Jiwu Huang
Alex C. Kot
2020
journals/tifs
An Embedding Cost Learning Framework Using GAN.
Jianhua Yang
Danyang Ruan
Jiwu Huang
Xiangui Kang
Yun-Qing Shi
2020
journals/tifs
Identification of VoIP Speech With Multiple Domain Deep Features.
Yuankun Huang
Bin Li
Mauro Barni
Jiwu Huang
2019
journals/tifs
Detection of Speech Smoothing on Very Short Clips.
Qi Yan
Rui Yang
Jiwu Huang
2019
journals/tifs
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.
Zhenghui Liu
Yuankun Huang
Jiwu Huang
2019
journals/tifs
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images.
Jishen Zeng
Shunquan Tan
Guangqing Liu
Bin Li
Jiwu Huang
2019
journals/tifs
CNN-Based Adversarial Embedding for Image Steganography.
Weixuan Tang
Bin Li
Shunquan Tan
Mauro Barni
Jiwu Huang
2019
journals/tifs
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant.
Qi Yan
Rui Yang
Jiwu Huang
2018
journals/tifs
Band Energy Difference for Source Attribution in Audio Forensics.
Da Luo
Pawel Korus
Jiwu Huang
2018
journals/tifs
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework.
Jishen Zeng
Shunquan Tan
Bin Li
Jiwu Huang
2017
journals/tifs
Localization of Diffusion-Based Inpainting in Digital Images.
Haodong Li
Weiqi Luo
Jiwu Huang
2017
journals/tifs
Data-Driven Feature Characterization Techniques for Laser Printer Attribution.
Anselmo Ferreira
Luca Bondi
Luca Baroffio
Paolo Bestagini
Jiwu Huang
Jefersson A. dos Santos
Stefano Tubaro
Anderson Rocha
2017
journals/tifs
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
Shunquan Tan
Haojie Zhang
Bin Li
Jiwu Huang
2017
journals/tifs
Image Forgery Localization via Integrating Tampering Possibility Maps.
Haodong Li
Weiqi Luo
Xiaoqing Qiu
Jiwu Huang
2017
journals/tifs
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization.
Pawel Korus
Jiwu Huang
2017
journals/tifs
Detection of Double Compressed AMR Audio Using Stacked Autoencoder.
Da Luo
Rui Yang
Bin Li
Jiwu Huang
2016
journals/tifs
New Framework for Reversible Data Hiding in Encrypted Domain.
Fangjun Huang
Jiwu Huang
Yun-Qing Shi
2016
journals/tifs
Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
Weixuan Tang
Haodong Li
Weiqi Luo
Jiwu Huang
2015
journals/tifs
A Strategy of Clustering Modification Directions in Spatial Image Steganography.
Bin Li
Ming Wang
Xiaolong Li
Shunquan Tan
Jiwu Huang
2015
journals/tifs
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
Bin Li
Tian-Tsong Ng
Xiaolong Li
Shunquan Tan
Jiwu Huang
2014
journals/tifs
Identification of Electronic Disguised Voices.
Haojun Wu
Yong Wang
Jiwu Huang
2014
journals/tifs
Investigation on Cost Assignment in Spatial Image Steganography.
Bin Li
Shunquan Tan
Ming Wang
Jiwu Huang
2014
conf/ih
A universal image forensic strategy based on steganalytic model.
Xiaoqing Qiu
Haodong Li
Weiqi Luo
Jiwu Huang
2014
conf/ih
Adaptive steganalysis against WOW embedding algorithm.
Weixuan Tang
Haodong Li
Weiqi Luo
Jiwu Huang
2013
conf/ih
Distortion function designing for JPEG steganography with uncompressed side-image.
Fangjun Huang
Weiqi Luo
Jiwu Huang
Yun-Qing Shi
2012
journals/tifs
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise.
Xiangui Kang
Yinxiang Li
Zhenhua Qu
Jiwu Huang
2012
journals/tifs
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain.
Chuntao Wang
Jiangqun Ni
Jiwu Huang
2012
journals/tifs
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security.
Jian Cao
Jiwu Huang
2012
journals/tifs
New Channel Selection Rule for JPEG Steganography.
Fangjun Huang
Jiwu Huang
Yun-Qing Shi
2012
journals/tifs
Near-Duplicate Image Detection in a Visually Salient Riemannian Space.
Ligang Zheng
Yanqiang Lei
Guoping Qiu
Jiwu Huang
2012
conf/ih
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking.
Peijia Zheng
Jiwu Huang
2012
conf/ih
Blind Median Filtering Detection Using Statistics in Difference Domain.
Chenglong Chen
Jiangqun Ni
Rongbin Huang
Jiwu Huang
2010
journals/tifs
Edge adaptive image steganography based on LSB matching revisited.
Weiqi Luo
Fangjun Huang
Jiwu Huang
2010
journals/tifs
Fragility analysis of adaptive quantization-based image hashing.
Guopu Zhu
Jiwu Huang
Sam Kwong
Jianquan Yang
2010
journals/tifs
Detecting Double JPEG Compression With the Same Quantization Matrix.
Fangjun Huang
Jiwu Huang
Yun-Qing Shi
2010
journals/tifs
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
Weiqi Luo
Yuan-Gen Wang
Jiwu Huang
2010
journals/tifs
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping.
Xiangui Kang
Jiwu Huang
Wenjun Zeng
2010
journals/tifs
JPEG error analysis and its applications to digital image forensics.
Weiqi Luo
Jiwu Huang
Guoping Qiu
2010
journals/tifs
An experimental study on the security performance of YASS.
Fangjun Huang
Jiwu Huang
Yun-Qing Shi
2010
conf/ih
Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework.
Jian Cao
Jiwu Huang
2010
conf/ih
Security Analysis of ISS Watermarking Using Natural Scene Statistics.
Dong Zhang
Jiangqun Ni
Qiping Zeng
Dah-Jye Lee
Jiwu Huang
2010
conf/ih
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Jian Cao
Jiwu Huang
Jiangqun Ni
2009
journals/tifs
Steganalysis of YASS.
Bin Li
Jiwu Huang
Yun-Qing Shi
2009
journals/tifs
A study on the randomness measure of image hashing.
Guopu Zhu
Jiwu Huang
Sam Kwong
Jianquan Yang
2009
conf/ih
Detect Digital Image Splicing with Visual Cues.
Zhenhua Qu
Guoping Qiu
Jiwu Huang
2008
conf/ih
Watermarking Security Incorporating Natural Scene Statistics.
Jiangqun Ni
Rongyue Zhang
Chen Fang
Jiwu Huang
Chuntao Wang
Hyoung-Joong Kim
2007
conf/ih
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.
Chuntao Wang
Jiangqun Ni
Jiwu Huang
Rongyue Zhang
Meiying Huang
2006
conf/ih
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Shijun Xiang
Jiwu Huang
Rui Yang
2005
conf/cans
Revaluation of Error Correcting Coding in Watermarking Channel.
Limin Gu
Yanmei Fang
Jiwu Huang
2003
conf/icisc
Analysis of the Bounds for Linear Block Codes in Watermark Channel.
Limin Gu
Jiwu Huang
Zewen Chen
2003
conf/icisc
An Efficient Revocation Algorithm in Group Signatures.
Zewen Chen
Jilin Wang
Yumin Wang
Jiwu Huang
Daren Huang
Coauthors
Alex C. Kot
(2)
Anderson Rocha
(1)
Anselmo Ferreira
(2)
Anwei Luo
(1)
Bin Li
(21)
Bokang Li
(1)
Bolin Chen
(1)
Changsheng Chen
(5)
Chen Fang
(1)
Chenglong Chen
(1)
Chenqi Kong
(1)
Chuntao Wang
(3)
Da Luo
(3)
Dah-Jye Lee
(1)
Danyang Ruan
(1)
Daren Huang
(1)
Dechen Zhan
(1)
Dong Zhang
(1)
Dongxia Huang
(1)
Fangjun Huang
(6)
Fengbo Lan
(1)
Guangqing Liu
(1)
Guoping Qiu
(3)
Guopu Zhu
(5)
Guoyuan Lin
(1)
Haodong Li
(7)
Haojie Zhang
(1)
Haojun Wu
(1)
Hyoung-Joong Kim
(1)
Jefersson A. dos Santos
(1)
Jian Cao
(3)
Jiangqun Ni
(7)
Jianhua Yang
(1)
Jianquan Yang
(2)
Jilin Wang
(1)
Jin Li
(1)
Jishen Zeng
(3)
Jiwu Huang
(83)
Junjiang He
(1)
Junyan Wu
(1)
Kangkang Wei
(2)
Kim-Kwang Raymond Choo
(1)
Ligang Zheng
(1)
Limin Gu
(2)
Linlin Zhang
(1)
Long Zhuo
(1)
Luca Baroffio
(1)
Luca Bondi
(1)
Mauro Barni
(3)
Meiying Huang
(1)
Ming Wang
(2)
Minglin Liu
(2)
Mulin Li
(1)
Paolo Bestagini
(1)
Pawel Korus
(2)
Peijia Zheng
(5)
Peiyu Zhuang
(2)
Qi Yan
(2)
Qilin Yin
(2)
Qiping Zeng
(1)
Qiushi Li
(1)
Rizhao Cai
(2)
Rongbin Huang
(1)
Rongxuan Peng
(1)
Rongyue Zhang
(2)
Rui Yang
(5)
Sam Kwong
(2)
Shen Wang
(3)
Shijun Xiang
(1)
Shunquan Tan
(16)
Shuzheng Zhang
(1)
Stefano Tubaro
(1)
Tao Li
(1)
Tian-Tsong Ng
(1)
Wai Ho Mow
(1)
Wei Lu
(2)
Weilong Wu
(1)
Weiqi Luo
(16)
Weixuan Tang
(7)
Weizhe Zhang
(1)
Wenbo Fang
(1)
Wenjun Zeng
(1)
Wenshan Li
(1)
Wenyun Sun
(1)
Xianbo Mo
(4)
Xianglei Hu
(1)
Xiangui Kang
(4)
Xianhao Tian
(1)
Xiaochun Cao
(2)
Xiaolong Lan
(1)
Xiaolong Li
(2)
Xiaoqing Qiu
(2)
Xinpeng Zhang
(1)
Yang Chen
(1)
Yang Su
(1)
Yanmei Fang
(1)
Yanqiang Lei
(1)
Ye Lu
(1)
Yicong Zhou
(1)
Yinxiang Li
(1)
Yong Wang
(1)
Yongjian Hu
(1)
Yu Song
(1)
Yuan-Gen Wang
(1)
Yuanhang Huang
(1)
Yuankun Huang
(2)
Yufei Zhou
(1)
Yumin Wang
(1)
Yun-Qing Shi
(7)
Zewen Chen
(2)
Zhaoxu Hu
(1)
Zhaoyang Zhang
(3)
Zhenghui Liu
(1)
Zhenhua Qu
(2)
Zhili Zhou
(1)
Zilong Shao
(1)
Ziqi Sheng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to