- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Adversarial Robustness in Machine Learning
- Stochastic Gradient Optimization Techniques
- Chaos-based Image/Signal Encryption
- Multimodal Machine Learning Applications
- Brain Tumor Detection and Classification
- Advanced Neural Network Applications
- Internet Traffic Analysis and Secure E-voting
- Advanced Data Storage Technologies
- Advanced Memory and Neural Computing
- Advanced Data Compression Techniques
- Digital Rights Management and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Data Quality and Management
- Cloud Data Security Solutions
Huazhong University of Science and Technology
2024-2025
Guangxi Normal University
2020
Deep learning is considered a promising technology for empowering the Industrial Internet of Things (IIoT) with intelligence. However, application deep in industrial IoT accompanied by significant security challenges. Therefore, it has become crucial to investigate effective measures provide secure services applications. In particular, issue intellectual property rights (IPR) protection great concern due illegal copying, redistribution, or misuse neural network (DNN) models, which one common...
Reversible data hiding (RDH) in color image is an important topic of hiding. This paper presents efficient RDH algorithm for via double-layer embedding. The key contribution the proposed embedding technique based on histogram shifting (HS). exploits interpolation to generate prediction error matrices HS first-layer and uses local pixel similarity calculate difference second-layer It inherits reversibility from makes high capacity due use double layers In addition, inter-channel correlation...