Search Results for author: Jian Weng

Found 9 papers, 2 papers with code

Deniable Steganography

no code implementations25 May 2022 Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng

With a stego media discovered, the adversary could find out the sender or receiver and coerce them to disclose the secret message, which we name as coercive attack in this paper.

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network

no code implementations10 Mar 2022 Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu

By applying this scheme, when the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the captured photographs.

A Robust Document Image Watermarking Scheme using Deep Neural Network

no code implementations26 Feb 2022 Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng

Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks.

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing

no code implementations23 Jan 2022 Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu

First, a CNN model to be tested is strategically partitioned into a private part kept locally by the model developer, and a public part outsourced to an outside server.

US-Rule: Discovering Utility-driven Sequential Rules

no code implementations29 Nov 2021 Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu

High utility sequential pattern mining (HUSPM) is one kind of utility-driven mining.

Sequential Pattern Mining

UNIT: Unifying Tensorized Instruction Compilation

no code implementations21 Jan 2021 Jian Weng, Animesh Jain, Jie Wang, Leyuan Wang, Yida Wang, Tony Nowatzki

However, it is hard to leverage mixed precision without hardware support because of the overhead of data casting.

RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network

1 code implementation4 Jul 2020 Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor

Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.

DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks

no code implementations16 May 2020 Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang

However, the DL models may be prone to the membership inference attack, where an attacker determines whether a given sample is from the training dataset.

Domain Adaptation Inference Attack +1

Blind quantum computation for QFT on multi-qubit states

1 code implementation30 Dec 2017 Xiaoqian Zhang, Jian Weng, Weiqi Luo, Xiaoqing Tan

If a client wants to perform quantum computing but she does not have quantum computers with relevant quantum technologies.

Quantum Physics

Cannot find the paper you are looking for? You can Submit a new open access paper.