What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Weiming Zhang
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
IPMN: Invertible privacy-preserving mask network with intellectual property protection.
Yang Yang
Xiangjie Huang
Han Fang
Weiming Zhang
2025
journals/tifs
Provably Secure Public-Key Steganography Based on Admissible Encoding.
Xin Zhang
Kejiang Chen
Na Zhao
Weiming Zhang
Nenghai Yu
2025
journals/tifs
CoAS: Composite Audio Steganography Based on Text and Speech Synthesis.
Yiming Li
Kejiang Chen
Yaofei Wang
Xin Zhang
Guanjie Wang
Weiming Zhang
Nenghai Yu
2025
journals/tifs
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security.
Xiangkun Wang
Kejiang Chen
Yuang Qi
Ruiheng Liu
Weiming Zhang
Nenghai Yu
2025
journals/tifs
AutoPT: How Far Are We From the Fully Automated Web Penetration Testing?
Benlong Wu
Guoqiang Chen
Kejiang Chen
Xiuwei Shang
Jiapeng Han
Yanru He
Weiming Zhang
Nenghai Yu
2025
conf/esorics
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.
Hao Huang
Xiuwei Shang
Junqi Zhang
Shaoyin Cheng
Weiming Zhang
Nenghai Yu
2025
conf/uss
The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous Driving.
Junqi Zhang
Shaoyin Cheng
Linqing Hu
Jie Zhang
Chengyu Shi
Xingshuo Han
Tianwei Zhang
Yueqiang Cheng
Weiming Zhang
2025
conf/uss
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling.
Yaofei Wang
Gang Pei
Kejiang Chen
Jinyang Ding
Chao Pan
Weilong Pang
Donghui Hu
Weiming Zhang
2024
journals/tifs
Toward Secure and Robust Steganography for Black-Box Generated Images.
Kai Zeng
Kejiang Chen
Jiansong Zhang
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography.
Zexin Fan
Kejiang Chen
Kai Zeng
Jiansong Zhang
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models.
Jiawei Zhao
Kejiang Chen
Xiaojian Yuan
Yuang Qi
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography.
Xin Zhang
Kejiang Chen
Jinyang Ding
Yuqi Yang
Weiming Zhang
Nenghai Yu
2024
conf/ccs
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Kunsheng Tang
Wenbo Zhou
Jie Zhang
Aishan Liu
Gelei Deng
Shuai Li
Peigui Qi
Weiming Zhang
Tianwei Zhang
Nenghai Yu
2024
conf/ndss
Detecting Voice Cloning Attacks via Timbre Watermarking.
Chang Liu
Jie Zhang
Tianwei Zhang
Xi Yang
Weiming Zhang
Nenghai Yu
2023
journals/tifs
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
Weixiang Li
Bin Li
Weiming Zhang
Shengli Zhang
2023
journals/tifs
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography.
Qingxiao Guan
Peng Liu
Weiming Zhang
Wei Lu
Xinpeng Zhang
2023
conf/sp
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies".
Jinyang Ding
Kejiang Chen
Yaofei Wang
Na Zhao
Weiming Zhang
Nenghai Yu
2023
conf/ih
Calibration-based Steganalysis for Neural Network Steganography.
Na Zhao
Kejiang Chen
Chuan Qin
Yi Yin
Weiming Zhang
Nenghai Yu
2022
journals/istr
Reversible data hiding with enhancing contrast and preserving brightness in medical image.
Ming Shi
Yang Yang
Jian Meng
Weiming Zhang
2022
journals/istr
A motional but temporally consistent physical video examples.
Zhenyu Du
Xingxing Wei
Weiming Zhang
Fangzheng Liu
Huanyu Bian
Jiayang Liu
2021
journals/compsec
GDroid: Android malware detection and classification with graph convolutional network.
Han Gao
Shaoyin Cheng
Weiming Zhang
2021
journals/tifs
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
Yaofei Wang
Weiming Zhang
Weixiang Li
Nenghai Yu
2020
journals/tifs
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
Yaofei Wang
Weiming Zhang
Weixiang Li
Xinzhi Yu
Nenghai Yu
2019
journals/tifs
Screen-Shooting Resilient Watermarking.
Han Fang
Weiming Zhang
Hang Zhou
Hao Cui
Nenghai Yu
2019
journals/tifs
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
Kejiang Chen
Hang Zhou
Wenbo Zhou
Weiming Zhang
Nenghai Yu
2018
conf/ih
Defining Joint Distortion for JPEG Steganography.
Weixiang Li
Weiming Zhang
Kejiang Chen
Wenbo Zhou
Nenghai Yu
2018
conf/ih
Adversarial Examples Against Deep Neural Network based Steganalysis.
Yiwei Zhang
Weiming Zhang
Kejiang Chen
Jiayang Liu
Yujia Liu
Nenghai Yu
2017
journals/tifs
A New Rule for Cost Reassignment in Adaptive Steganography.
Wenbo Zhou
Weiming Zhang
Nenghai Yu
2015
journals/tifs
Efficient Reversible Data Hiding Based on Multiple Histograms Modification.
Xiaolong Li
Weiming Zhang
Xinlu Gui
Bin Yang
2015
journals/tifs
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xiaolong Li
Nenghai Yu
2015
journals/tifs
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
Ke Li
Weiming Zhang
Ce Yang
Nenghai Yu
2014
journals/compsec
Towards optimal noise distribution for privacy preserving in data aggregation.
Hao Zhang
Nenghai Yu
Yonggang Wen
Weiming Zhang
2014
conf/ih
Video steganography with perturbed macroblock partition.
Hong Zhang
Yun Cao
Xianfeng Zhao
Weiming Zhang
Nenghai Yu
2013
journals/tifs
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification.
Xiaolong Li
Weiming Zhang
Xinlu Gui
Bin Yang
2013
journals/tifs
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xuexian Hu
Nenghai Yu
Xianfeng Zhao
Fenghua Li
2013
journals/tifs
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
Kede Ma
Weiming Zhang
Xianfeng Zhao
Nenghai Yu
Fenghua Li
2012
journals/tifs
Fast Matrix Embedding by Matrix Extending.
Chao Wang
Weiming Zhang
Jiufen Liu
Nenghai Yu
2011
conf/ih
Capacity-Approaching Codes for Reversible Data Hiding.
Weiming Zhang
Biao Chen
Nenghai Yu
2010
journals/tifs
Generalization and Analysis of the Paper Folding Method for Steganography.
Weiming Zhang
Jiufen Liu
Xin Wang
Nenghai Yu
2008
conf/ih
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Weiming Zhang
Xinpeng Zhang
Shuozhong Wang
Coauthors
Aishan Liu
(1)
Benlong Wu
(1)
Biao Chen
(1)
Bin Li
(1)
Bin Yang
(2)
Ce Yang
(1)
Chang Liu
(1)
Chao Pan
(1)
Chao Wang
(1)
Chengyu Shi
(1)
Chuan Qin
(1)
Donghui Hu
(1)
Fangzheng Liu
(1)
Fenghua Li
(2)
Gang Pei
(1)
Gelei Deng
(1)
Guanjie Wang
(1)
Guoqiang Chen
(1)
Han Fang
(2)
Han Gao
(1)
Hang Zhou
(2)
Hao Cui
(1)
Hao Huang
(1)
Hao Zhang
(1)
Hong Zhang
(1)
Huanyu Bian
(1)
Jian Meng
(1)
Jiansong Zhang
(2)
Jiapeng Han
(1)
Jiawei Zhao
(1)
Jiayang Liu
(2)
Jie Zhang
(3)
Jinyang Ding
(3)
Jiufen Liu
(2)
Junqi Zhang
(2)
Kai Zeng
(2)
Ke Li
(1)
Kede Ma
(1)
Kejiang Chen
(14)
Kunsheng Tang
(1)
Linqing Hu
(1)
Ming Shi
(1)
Na Zhao
(3)
Nenghai Yu
(29)
Peigui Qi
(1)
Peng Liu
(1)
Qingxiao Guan
(1)
Ruiheng Liu
(1)
Shaoyin Cheng
(3)
Shengli Zhang
(1)
Shuai Li
(1)
Shuozhong Wang
(1)
Tianwei Zhang
(3)
Wei Lu
(1)
Weilong Pang
(1)
Weiming Zhang
(40)
Weixiang Li
(4)
Wenbo Zhou
(4)
Xi Yang
(1)
Xianfeng Zhao
(3)
Xiangjie Huang
(1)
Xiangkun Wang
(1)
Xiaocheng Hu
(2)
Xiaojian Yuan
(1)
Xiaolong Li
(3)
Xin Wang
(1)
Xin Zhang
(3)
Xingshuo Han
(1)
Xingxing Wei
(1)
Xinlu Gui
(2)
Xinpeng Zhang
(2)
Xinzhi Yu
(1)
Xiuwei Shang
(2)
Xuexian Hu
(1)
Yang Yang
(2)
Yanru He
(1)
Yaofei Wang
(5)
Yi Yin
(1)
Yiming Li
(1)
Yiwei Zhang
(1)
Yonggang Wen
(1)
Yuang Qi
(2)
Yueqiang Cheng
(1)
Yujia Liu
(1)
Yun Cao
(1)
Yuqi Yang
(1)
Zexin Fan
(1)
Zhenyu Du
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to