- Advanced Steganography and Watermarking Techniques
- Internet Traffic Analysis and Secure E-voting
- Digital Media Forensic Detection
- Hate Speech and Cyberbullying Detection
- Human Pose and Action Recognition
- Anomaly Detection Techniques and Applications
- Handwritten Text Recognition Techniques
- Gait Recognition and Analysis
- Authorship Attribution and Profiling
- Chaos-based Image/Signal Encryption
- Spam and Phishing Detection
- Low-power high-performance VLSI design
- Infrared Target Detection Methodologies
- Legal Language and Interpretation
- Atmospheric Ozone and Climate
- Vehicle License Plate Recognition
- Advanced Multi-Objective Optimization Algorithms
- Music and Audio Processing
- Evolutionary Algorithms and Applications
- Remote Sensing and Land Use
- Rough Sets and Fuzzy Logic
- Multimodal Machine Learning Applications
- Metaheuristic Optimization Algorithms Research
- Speech Recognition and Synthesis
- Video Surveillance and Tracking Methods
Beijing University of Posts and Telecommunications
2023-2025
University of Chinese Academy of Sciences
2022
Xi'an Institute of Optics and Precision Mechanics
2022
Hong Kong Polytechnic University
2021
Shanghai Maritime University
2021
Henan Normal University
2020-2021
With the widespread use of social media, user-generated content has surged on online platforms. When such includes hateful, abusive, offensive, or cyberbullying behavior, it is classified as toxic speech, posing a significant threat to ecosystem's integrity and safety. While manual moderation still prevalent, overwhelming volume psychological strain human moderators underscore need for automated speech detection. Previously proposed detection methods often rely large annotated datasets;...
Intelligent transportation systems (ITS) use advanced technologies such as artificial intelligence to significantly improve traffic flow management efficiency, and promote the intelligent development of industry. However, if data in ITS is attacked, tampering or forgery, it will endanger public safety cause social losses. Therefore, this paper proposes a watermarking that can verify integrity copyright response needs ITS, termed ITSmark. ITSmark focuses on functions extracting watermarks,...
When the data undergo a distribution change, existing linguistic steganalysis often struggles to effectively capture statistical characteristics of transformed cover or stego, resulting in drop performances. To address this issue and fully use information from original before letter proposes reinforcement learning-based method for steganalysis. This employs an agent (steganalyzer) interact within observation space, enabling adaptation capturing features. Specifically, we map texts GloVe...
Redundant steganalysis feature components in high-dimensional of images increase the spatio-temporal complexity and even reduce detection accuracy stego images. In order to image dimension, improve achieve fast selection, this paper proposes a general method for selection. Firstly, metric algorithm based on difference function is given, measures between cover class class, which provides basis selecting contributing greatly detect Secondly, Pearson correlation coefficient improved used...
Linguistic Steganography (LS) tasks aim to generate steganographic texts (stego) based on secret information. Only authorized recipients can perceive the existence of information in and accurately extract it, thereby preserving privacy. However, controllability stego generated by existing schemes is poor, difficult contain specific discourse characteristics such as style, genre, theme. As a result, are often easily detectable, compromising covert communication. To address these problems,...
Linguistic steganalysis (LS) tasks aim to effectively detect stegos generated by linguistic steganography. Existing LS methods overlook the distinctive user characteristics, leading weak performance in social networks. The limited occurrence of further complicates detection. In this paper, we propose UP4LS, a novel framework with User Profile for enhancing performance. Specifically, delving into post content, explore attributes like writing habits, psychological states, and focal areas,...
To realize the long-period and automated data collection of lunar radiation eliminate geometric errors hyperspectral image during observation process, this paper proposes a slit-type spectrometer method based on rotating table equatorial mount. This uses wide field finder-scope to automatic moon tracking positioning; at same time, it corrects drift angle oversampling collected raw data. The results show that full situation is as non-full situation. can effectively find track position moon's...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
To detect stego (steganographic text) in complex scenarios, linguistic steganalysis (LS) with various motivations has been proposed and achieved excellent performance. However, the development of generative steganography, some stegos have strong concealment, especially after emergence LLMs-based existing LS low detection or even cannot them. We designed a novel two modes called LSGC. In generation mode, we created an LS-task "description" used ability LLM to explain whether texts be detected...
With the evolution of generative linguistic steganography techniques, conventional steganalysis falls short in robustly quantifying alterations induced by steganography, thereby complicating detection. Consequently, research paradigm has pivoted towards deep-learning-based steganalysis. This study offers a comprehensive review existing contributions and evaluates prevailing developmental trajectories. Specifically, we first provided formalized exposition general formulas for steganalysis,...
Existing temporal action detection algorithms cannot distinguish complete and incomplete actions while this property is essential in many applications. To tackle challenge, we proposed the progression networks (APN), a novel model that predicts of video frames with continuous numbers. Using sequence test video, on top APN, searching algorithm (CAS) was designed to detect only. With usage frame-level fine-grained structure modeling detecting according their whole context, our framework can...
Fewer contribution feature components in the image high-dimensional steganalysis are able to increase spatio-temporal complexity of detecting stego images, and even reduce detection accuracy. In order maintain or improve accuracy while effectively reducing dimension DCTR feature, this paper proposes a new selection approach for feature. First, asymmetric distortion factor information gain ratio each component improved measure difference between symmetric cover features, which provides...