- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Semantic Web and Ontologies
- Chaos-based Image/Signal Encryption
- Software Testing and Debugging Techniques
- Software Engineering Research
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Advanced Malware Detection Techniques
- Peer-to-Peer Network Technologies
- Web Data Mining and Analysis
- Generative Adversarial Networks and Image Synthesis
- Recommender Systems and Techniques
- Cosmology and Gravitation Theories
- Software Reliability and Analysis Research
- Cognitive Computing and Networks
- Face recognition and analysis
- Video Coding and Compression Technologies
- Advanced Image and Video Retrieval Techniques
- Software-Defined Networks and 5G
- Music and Audio Processing
- Time Series Analysis and Forecasting
- Parallel Computing and Optimization Techniques
- Dark Matter and Cosmic Phenomena
- Multimodal Machine Learning Applications
Chinese Academy of Sciences
2015-2025
University of Science and Technology of China
2025
Hefei Institutes of Physical Science
2025
Shanghai University
2022
Beijing Jiaotong University
2021-2022
Institute of Information Engineering
2014-2021
University of Chinese Academy of Sciences
2020
Shanghai Jiao Tong University
2012-2018
Singapore Management University
2017
Kyushu University
2004-2009
Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive Huffman code mapping (AHCM) framework for obtaining higher secure payload. To avoid the frame-offset effect of codec, we first establish distortion-limited suppressible space, realizes data by using equal-length entropy codes. Furthermore, stego key is used to dynamically build each frame improving acoustic imperceptibility...
Background: Sparse angular projection is an important way to reduce CT dose. It consists of two processes, sparse sampling, and image reconstruction based on projection. Under the traditional framework, sparseness angle may cause a degradation effect in reconstructed image. A series machine learning methods for developed recent years, especially deep methods, can effectively improve quality, however, these only reconstruct images certain sampling scheme. Objective: On other words, they...
This letter deals with information hiding in compressed video; its goal is to improve the security of motion vector-based steganography respect current best steganalytic method. Our research suggests that perfect (undetectability) can be approached if uncertain information, which exists process estimation, fully exploited and establishes a connection between single vector's embedding distortion associated uncertainty. Based on this, novel video proposed. Under given payload, syndrome-trellis...
In this paper, a novel motion vector-based video steganographic scheme is proposed, which capable of withstanding the current best statistical detection method. With scheme, secret message bits are embedded into vector (MV) values by slightly perturbing their estimation (ME) processes. general, two measures taken for security (statistical undetectability) enhancement. First, ME perturbations optimized ensuring modified MVs still local optimal, essentially makes targeted detectors...
The proliferation of diverse kinds programming languages and platforms makes it a common need to have the same functionality implemented in different for platforms, such as Java Android applications C# Windows phone applications.Although versions code written appear syntactically quite from each other, they are intended implement software typically contain many snippets that similar functionalities, which we call cross-language clones.When version one language evolves according changing...
To attract more users on different platforms, many projects release their versions in multiple programming languages (e.g., Java and C#). They typically have code snippets that implement similar functionalities, i.e., cross-language clones. Programmers often need to track modify clones consistently maintain functionalities across language implementations. In literature, researchers proposed approaches detect cross- clones, mostly for share a common intermediate (such as the .NET family) so...
Theoretical investigations into the evolution of early universe are an essential part particle physics that allow us to identify viable extensions Standard Model as well motivated parameter space can be probed by various experiments and observations. In this white paper, we review models universe. First, outline explain two ingredients (dark matter baryon asymmetry) those seek address current observational anomalies. We then discuss dynamics in neutrino masses, axions, several solutions...
Software libraries have become more and complex in recent years. Developers usually to rely on search engines find API documents then select suitable APIs do relevant development when working unfamiliar functions. However, the traditional not focus searching that make this process inconvenient time consuming. Although a lot of efforts been made understanding code industry academia, work tools can recommend methods users based their description API's functionality are still very limited.
Multivariate Time series data play important roles in our daily life. How to use these the process of prediction is a highly attractive study for many researchers. To achieve this goal, paper, we present novel multivariate time method based on multi-attention generative adversarial network. This includes three phases explore prediction. Firstly, encoder stage consists two modules, from which input-attention and self-attention can encode exogenous sequence into latent space. Secondly, decoder...
In the past decades, various approaches have been proposed to address time series prediction problem, among which nonlinear autoregressive exogenous (NARX) models achieve great progresses in one-step prediction. Although NARX are capable of capturing long-term dependence data, impact associated attributes lacks enough attention. To cope with this issue, paper we propose a Multi-Attention algorithm based Recurrent Neural Network (RNN) perform multivariate forecasting. first stage, given raw...
In this letter, we devise an adaptive double-layered embedding scheme that is suitable for MP3 steganography. According to the encoding characteristics of MP3, linbits are used as domain. The proposed divided into two layers and messages embedded each layer with binary STCs. cost function in first designed by employing masking effect achieve optimal imperceptibility. order reduce modification coefficients, second revised according results layer. Experiments demonstrate our able better...
The semantic Web and services technologies have provided both new possibilities challenges to automatic information processing. There are a lot of researches on applying these current personal retrieval systems, but no research addresses the issues from whole life cycle architecture point view. provide way for accessing resources, until now, they been managed separately conventional contents resources. In this paper, we out system requirements propose conceptual system. It incorporates Web,...
The semantic Web and service technologies have provided both new possibilities challenges to automatic information processing. There are a lot of researches on applying these into current personal retrieval systems, but no research addresses the issues from whole life cycle architecture point view. services provide way for accessing resources, until now, they been managed separately traditional contents resources. In this poster, we propose conceptual system. It incorporates Web, multi-agent...
The goal of this paper is to improve the performance current video steganalysis in detecting motion vector (MV)-based steganography. It noticed that many MV-based approaches embed secret bits content adaptive manners. Typically, modifications are applied only qualified MVs, which implies number modified MVs varies among frames after embedding. On other hand, nearly all steganalytic methods ignore such uneven distribution. They divide into frame groups equally and calculate every single...
More and more mobile applications run on multiple operating systems to attract users of different platforms. Although versions platforms are implemented in programming languages (e.g., Java Objective-C), there must be many code snippets that implement the similar business logic Such called cross-platform clones. It is challenging but essential detect such clones for software maintenance. Due practice developers usually use some common identifiers when implementing same platforms, this paper,...
Up to now, most researches on steganalysis concentrate one extreme case. Typically, the a priori knowledge of embedding way and cover-media is assumed known in classifier training even feature design stage. However, real world done with different levels such so that there can be various paradigms for doing it. Although some researchers have addressed situations, still lack systematic approach defining paradigms. In this paper, authors give an by first four paradigms, then rest among them....