Dengpan Ye

ORCID: 0000-0003-2510-9523
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Adversarial Robustness in Machine Learning
  • Chaos-based Image/Signal Encryption
  • Advanced Image and Video Retrieval Techniques
  • Network Security and Intrusion Detection
  • Generative Adversarial Networks and Image Synthesis
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Face recognition and analysis
  • Music and Audio Processing
  • Video Analysis and Summarization
  • Video Coding and Compression Technologies
  • Advanced Neural Network Applications
  • Biometric Identification and Security
  • Privacy-Preserving Technologies in Data
  • Software-Defined Networks and 5G
  • Advanced Image Processing Techniques
  • Handwritten Text Recognition Techniques
  • Image Processing Techniques and Applications
  • Cybercrime and Law Enforcement Studies
  • Advanced Electrical Measurement Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Video Surveillance and Tracking Methods

Wuhan University
2016-2025

South Central Minzu University
2012

Singapore Management University
2011-2012

Ministry of Education of the People's Republic of China
2009-2011

Nanjing University of Science and Technology
2005-2006

Huazhong University of Science and Technology
2006

The development of smart network infrastructure the Internet Things (IoT) faces immense threat sophisticated Distributed Denial-of-Services (DDoS) security attacks. existing solutions enterprise networks are significantly expensive and unscalable for IoT. integration recently developed Software Defined Networking (SDN) reduces a significant amount computational overhead IoT devices enables additional measurements. At prelude stage SDN-enabled infrastructure, sampling based approach currently...

10.3390/s22072697 article EN cc-by Sensors 2022-03-31

In this paper, we consider the face swapping detection from perspective of identity. Face aims to replace target with source and generate fake that human cannot distinguish between real fake. We argue contains explicit identity implicit identity, which respectively corresponds during swapping. Note identities faces can be extracted by regular recognizers. Particularly, is consistent its Thus difference facilitates detection. Following idea, propose a novel driven framework for Specifically,...

10.1109/cvpr52729.2023.00436 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

With the proliferation of smart Internet Things (IoT) devices based on Android system, malicious applications targeting for IoT have received more and attention due to concern privacy leakage property loss. However, existing malware detection approaches static or dynamic analysis are not scalable evolvement cannot extract enough valid semantics in application programming interface (API) level, failing detect new malware. In this paper, we propose EveDroid, a event-aware which exploits...

10.1109/jiot.2019.2909745 article EN IEEE Internet of Things Journal 2019-08-01

This paper proposes a framework to improve the existing distortion functions designed for JPEG steganography, which results in better capability of countering steganalysis. Different from steganography approach that minimizes image distortion, we minimize feature caused by data embedding. Given image, construct reference close before compression. Guided both and minimization, state-of-the-art syndrome trellis coding embedding are improved distinguishing costs +1 versus -1 has three...

10.1109/access.2018.2884198 article EN cc-by-nc-nd IEEE Access 2018-01-01

Abstract Current typical adaptive steganography algorithms take the detection resistant capability into account adequately but usually cannot extract embedded secret messages correctly when stego images suffer from compression attack. In order to solve this problem, a framework of resisting JPEG and is proposed. Utilizing relationship between Discrete Cosine Transformation (DCT) coefficients, domain embedding determined; for maximum ability, modifying magnitude different DCT coefficients...

10.1002/sec.1502 article EN Security and Communication Networks 2016-07-07

Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant steganography algorithm is proposed. Utilizing relationship between DCT coefficients, domain of embedding determined. The modifying magnitude different coefficients can be determined according quality factors JPEG To ensure completely correct extraction compression, RS codes used encode embedded. Besides, based...

10.1109/ares.2015.53 article EN 2015-08-01

Traditional reversible data hiding (RDH) focuses on enlarging the embedding payloads while minimizing distortion with a criterion of mean square error (MSE). Since imperceptibility can also be achieved via image processing, we propose novel method RDH contrast enhancement (RDH-CE) using histogram shifting. Instead MSE, proposed generates marked images good quality sense structural similarity. The contains two parts: baseline and extensive embedding. In part, first merge least significant...

10.1109/access.2019.2909560 article EN cc-by-nc-nd IEEE Access 2019-01-01

Recently, it has been discovered that the electric network frequency (ENF) could be captured by digital audio, video, or even image files, and further exploited in forensic investigations. However, existence of ENF multimedia content is not a sure thing, if present, ENF-based analysis would become useless misleading. In this paper, we address problem detection audio recordings, which modeled as weak signal contaminated unknown colored wide-sense stationary (WSS) Gaussian noise, while also...

10.1109/tifs.2020.3009579 article EN IEEE Transactions on Information Forensics and Security 2020-07-17

Deep neural networks are proven to be vulnerable backdoor attacks. Detecting the trigger samples during inference stage, i.e., test-time sample detection, can prevent from being triggered. However, existing detection methods often require defenders have high accessibility victim models, extra clean data, or knowledge about appearance of triggers, limiting their practicality. In this paper, we propose corruption robustness consistency evaluation (TeCo) <sup...

10.1109/cvpr52729.2023.01570 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

10.1109/icassp49660.2025.10889399 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

10.1109/icassp49660.2025.10890293 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Existing work finds it challenging for adversarial examples to transfer among different synthetic speech detectors because of cross-feature and cross-model. To enhance the transferability examples, we propose a spectral saliency analysis method gain insight into underlying detection mechanisms existing first time. These insights offer an interpretable basis why are between models. Then further two-stage attack framework. Specifically, stage leverages model mechanism design random...

10.1145/3727341 article EN ACM Transactions on Multimedia Computing Communications and Applications 2025-04-01

It is well established that neural networks are vulnerable to adversarial examples, which almost imperceptible on human vision and can cause the deep models misbehave. Such phenomenon may lead severely inestimable consequences in safety security critical applications. Existing defenses trend harden robustness of against attacks, for example, training technology. However, these usually intractable implement due high cost retraining cumbersome operations altering model architecture or...

10.1002/int.22458 article EN International Journal of Intelligent Systems 2021-05-08

Malicious applications of deep face swapping technology pose security threats such as misinformation dissemination and identity fraud. Some research propose the utilization robust watermarking methods to track copyright facial images, facilitating post-forgery attribution. However, these cannot fundamentally prevent or eliminate adverse impacts swapping. To address this issue, we present Dual Defense, an innovative framework based on adversarial watermarking. It simultaneously tracks image...

10.1109/tifs.2024.3383648 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Searchable symmetric encryption (SSE) allows the data owner to outsource an encrypted database a remote server in private manner while maintaining ability for selectively search. So far, most existing solutions focus on honest-but-curious server, security designs against malicious have not drawn enough attention. A few recent works attempted construct verifiable SSE that enables verify integrity of search results. Nevertheless, these verification mechanisms are highly dependent specific...

10.1109/tdsc.2019.2957091 article EN IEEE Transactions on Dependable and Secure Computing 2019-01-01
Coming Soon ...