default search action
Chuan Qin 0003
Person information
- affiliation: Huawei Technologies, Shenzhen, China
- affiliation (2016 - 2022): University of Science and Technology of China, School of Cyber Science and Technology & Chinese Academy of Sciences, Key Laboratory of Electromagnetic Space Information, Hefei, China
- affiliation (2012 - 2016): Northwest University, Xi'an, China
Other persons with the same name
- Chuan Qin — disambiguation page
- Chuan Qin 0001 — University of Shanghai for Science and Technology, School of Optical-Electrical and Computer Engineering, Shanghai, China (and 1 more)
- Chuan Qin 0002 — Baidu Talent Intelligence Center, Beijing, China (and 1 more)
- Chuan Qin 0004 — Washington State University, School of Electrical Engineering and Computer Science, Pullman, WA, USA
- Chuan Qin 0005 — Hohai University, College of Energy and Electrical Engineering, Nanjing, China (and 1 more)
- Chuan Qin 0006 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Chuan Qin 0007 — University of Technology Sydney, Global Big Data Technologies Centre, Sydney, Australia
- Chuan Qin 0008 — Tsinghua University, Institute of Microelectronics, Beijing, China
- Chuan Qin 0009 — Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong
- Chuan Qin 0010 — University of California, Department of Electrical and Computer Engineering, Davis, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3515-3527 (2024) - 2023
- [j8]Chuan Qin, Yuefeng Chen, Kejiang Chen, Xiaoyi Dong, Weiming Zhang, Xiaofeng Mao, Yuan He, Nenghai Yu:
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks. IEEE Trans. Artif. Intell. 4(5): 1029-1040 (2023) - [c7]Zexin Fan, Kejiang Chen, Chuan Qin, Kai Zeng, Weiming Zhang, Nenghai Yu:
Image Adversarial Steganography Based on Joint Distortion. ICASSP 2023: 1-5 - [c6]Na Zhao, Kejiang Chen, Chuan Qin, Yi Yin, Weiming Zhang, Nenghai Yu:
Calibration-based Steganalysis for Neural Network Steganography. IH&MMSec 2023: 91-96 - 2022
- [j7]Chuan Qin, Wei Ming Zhang, Hang Zhou, Jiayang Liu, Yuan He, Nenghai Yu:
Robustness enhancement against adversarial steganography via steganalyzer outputs. J. Inf. Secur. Appl. 68: 103252 (2022) - [j6]Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Nenghai Yu:
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis. IEEE Trans. Multim. 24: 4538-4550 (2022) - [c5]Chuan Qin, Na Zhao, Weiming Zhang, Nenghai Yu:
Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography. ICASSP 2022: 3079-3083 - 2021
- [j5]Chuan Qin, Weiming Zhang, Xiaoyi Dong, Hongyue Zha, Nenghai Yu:
Adversarial steganography based on sparse cover enhancement. J. Vis. Commun. Image Represent. 80: 103325 (2021) - [j4]Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181: 107920 (2021) - [j3]Hang Zhou, Kejiang Chen, Weiming Zhang, Chuan Qin, Nenghai Yu:
Feature-Preserving Tensor Voting Model for Mesh Steganalysis. IEEE Trans. Vis. Comput. Graph. 27(1): 57-67 (2021) - [c4]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection Beyond Image Space. ICASSP 2021: 3850-3854 - [i2]Kejiang Chen, Yuefeng Chen, Hang Zhou, Chuan Qin, Xiaofeng Mao, Weiming Zhang, Nenghai Yu:
Adversarial Examples Detection beyond Image Space. CoRR abs/2102.11586 (2021) - 2020
- [j2]Weixiang Li, Wenbo Zhou, Weiming Zhang, Chuan Qin, Huanhuan Hu, Nenghai Yu:
Shortening the Cover for Fast JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(6): 1745-1757 (2020) - [c3]Xiaoyi Dong, Dongdong Chen, Jianmin Bao, Chuan Qin, Lu Yuan, Weiming Zhang, Nenghai Yu, Dong Chen:
GreedyFool: Distortion-Aware Sparse Adversarial Attack. NeurIPS 2020 - [i1]Xiaoyi Dong, Dongdong Chen, Jianmin Bao, Chuan Qin, Lu Yuan, Weiming Zhang, Nenghai Yu, Dong Chen:
GreedyFool: Distortion-Aware Sparse Adversarial Attack. CoRR abs/2010.13773 (2020)
2010 – 2019
- 2019
- [c2]Hongyue Zha, Weiming Zhang, Chuan Qin, Nenghai Yu:
Direct Adversarial Attack on Stego Sandwiched Between Black Boxes. ICIP 2019: 2284-2288 - 2018
- [j1]Dongdong Hou, Chuan Qin, Nenghai Yu, Weiming Zhang:
Reversible visual transformation via exploring the correlations within color images. J. Vis. Commun. Image Represent. 53: 134-145 (2018) - [c1]Chuan Qin, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Ensemble Steganography. DSC 2018: 582-587
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint