no code implementations • 25 May 2022 • Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng
With a stego media discovered, the adversary could find out the sender or receiver and coerce them to disclose the secret message, which we name as coercive attack in this paper.
no code implementations • 10 Mar 2022 • Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu
By applying this scheme, when the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the captured photographs.
no code implementations • 26 Feb 2022 • Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng
Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks.
no code implementations • 23 Jan 2022 • Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu
First, a CNN model to be tested is strategically partitioned into a private part kept locally by the model developer, and a public part outsourced to an outside server.
no code implementations • 29 Nov 2021 • Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu
High utility sequential pattern mining (HUSPM) is one kind of utility-driven mining.
no code implementations • 21 Jan 2021 • Jian Weng, Animesh Jain, Jie Wang, Leyuan Wang, Yida Wang, Tony Nowatzki
However, it is hard to leverage mixed precision without hardware support because of the overhead of data casting.
1 code implementation • 4 Jul 2020 • Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor
Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.
no code implementations • 16 May 2020 • Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang
However, the DL models may be prone to the membership inference attack, where an attacker determines whether a given sample is from the training dataset.
1 code implementation • 30 Dec 2017 • Xiaoqian Zhang, Jian Weng, Weiqi Luo, Xiaoqing Tan
If a client wants to perform quantum computing but she does not have quantum computers with relevant quantum technologies.
Quantum Physics