What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bin Li
Google Scholar
ORCID:
0000-0002-2613-5451
29
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks.
Bin Li
Jincheng Chen
Yuxiong Xu
Weixiang Li
Zhenghui Liu
2024
journals/tifs
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces.
Jiucui Lu
Jiaran Zhou
Junyu Dong
Bin Li
Siwei Lyu
Yuezun Li
2024
journals/tifs
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
Kaiqing Lin
Bin Li
Weixiang Li
Mauro Barni
Benedetta Tondi
Xulong Liu
2024
journals/tifs
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
Weixuan Tang
Zhili Zhou
Bin Li
Kim-Kwang Raymond Choo
Jiwu Huang
2024
journals/tifs
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization.
Rongxuan Peng
Shunquan Tan
Xianbo Mo
Bin Li
Jiwu Huang
2024
journals/tifs
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations.
Junyan Wu
Qilin Yin
Ziqi Sheng
Wei Lu
Jiwu Huang
Bin Li
2024
journals/tifs
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression.
Wenkang Su
Jiangqun Ni
Xianglei Hu
Bin Li
2024
journals/tifs
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
Zuomin Qu
Zuping Xi
Wei Lu
Xiangyang Luo
Qian Wang
Bin Li
2023
journals/tifs
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
Weixiang Li
Bin Li
Weiming Zhang
Shengli Zhang
2023
journals/tifs
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection.
Qilin Yin
Wei Lu
Bin Li
Jiwu Huang
2023
journals/tifs
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
Xianbo Mo
Shunquan Tan
Weixuan Tang
Bin Li
Jiwu Huang
2023
conf/ccs
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Xianbo Mo
Shunquan Tan
Bin Li
Jiwu Huang
2022
journals/tifs
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.
Long Zhuo
Shunquan Tan
Bin Li
Jiwu Huang
2021
journals/tifs
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images.
Shunquan Tan
Weilong Wu
Zilong Shao
Qiushi Li
Bin Li
Jiwu Huang
2021
journals/tifs
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
Weixuan Tang
Bin Li
Mauro Barni
Jin Li
Jiwu Huang
2021
journals/tifs
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography.
Xianbo Mo
Shunquan Tan
Bin Li
Jiwu Huang
2021
journals/tifs
Image Tampering Localization Using a Dense Fully Convolutional Network.
Peiyu Zhuang
Haodong Li
Shunquan Tan
Bin Li
Jiwu Huang
2020
journals/tifs
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process.
Xinghao Jiang
Qiang Xu
Tanfeng Sun
Bin Li
Peisong He
2020
journals/tifs
Identification of VoIP Speech With Multiple Domain Deep Features.
Yuankun Huang
Bin Li
Mauro Barni
Jiwu Huang
2019
journals/tifs
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images.
Jishen Zeng
Shunquan Tan
Guangqing Liu
Bin Li
Jiwu Huang
2019
journals/tifs
CNN-Based Adversarial Embedding for Image Steganography.
Weixuan Tang
Bin Li
Shunquan Tan
Mauro Barni
Jiwu Huang
2018
journals/tifs
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator.
Bin Li
Zhongpeng Li
Shijun Zhou
Shunquan Tan
Xiaoling Zhang
2018
journals/tifs
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework.
Jishen Zeng
Shunquan Tan
Bin Li
Jiwu Huang
2017
journals/tifs
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
Shunquan Tan
Haojie Zhang
Bin Li
Jiwu Huang
2017
journals/tifs
Detection of Double Compressed AMR Audio Using Stacked Autoencoder.
Da Luo
Rui Yang
Bin Li
Jiwu Huang
2015
journals/tifs
A Strategy of Clustering Modification Directions in Spatial Image Steganography.
Bin Li
Ming Wang
Xiaolong Li
Shunquan Tan
Jiwu Huang
2015
journals/tifs
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
Bin Li
Tian-Tsong Ng
Xiaolong Li
Shunquan Tan
Jiwu Huang
2014
journals/tifs
Investigation on Cost Assignment in Spatial Image Steganography.
Bin Li
Shunquan Tan
Ming Wang
Jiwu Huang
2009
journals/tifs
Steganalysis of YASS.
Bin Li
Jiwu Huang
Yun-Qing Shi
Coauthors
Benedetta Tondi
(1)
Bin Li
(29)
Da Luo
(1)
Guangqing Liu
(1)
Haodong Li
(1)
Haojie Zhang
(1)
Jiangqun Ni
(1)
Jiaran Zhou
(1)
Jin Li
(1)
Jincheng Chen
(1)
Jishen Zeng
(2)
Jiucui Lu
(1)
Jiwu Huang
(21)
Junyan Wu
(1)
Junyu Dong
(1)
Kaiqing Lin
(1)
Kim-Kwang Raymond Choo
(1)
Long Zhuo
(1)
Mauro Barni
(4)
Ming Wang
(2)
Peisong He
(1)
Peiyu Zhuang
(1)
Qian Wang
(1)
Qiang Xu
(1)
Qilin Yin
(2)
Qiushi Li
(1)
Rongxuan Peng
(1)
Rui Yang
(1)
Shengli Zhang
(1)
Shijun Zhou
(1)
Shunquan Tan
(15)
Siwei Lyu
(1)
Tanfeng Sun
(1)
Tian-Tsong Ng
(1)
Wei Lu
(3)
Weilong Wu
(1)
Weiming Zhang
(1)
Weixiang Li
(3)
Weixuan Tang
(4)
Wenkang Su
(1)
Xianbo Mo
(4)
Xianglei Hu
(1)
Xiangyang Luo
(1)
Xiaoling Zhang
(1)
Xiaolong Li
(2)
Xinghao Jiang
(1)
Xulong Liu
(1)
Yuankun Huang
(1)
Yuezun Li
(1)
Yun-Qing Shi
(1)
Yuxiong Xu
(1)
Zhenghui Liu
(1)
Zhili Zhou
(1)
Zhongpeng Li
(1)
Zilong Shao
(1)
Ziqi Sheng
(1)
Zuomin Qu
(1)
Zuping Xi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to