Name
Affiliation
Papers
HANG ZHOU
CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, China
38
Collaborators
Citations 
PageRank 
53
72
14.04
Referers 
Referees 
References 
205
677
327
Search Limit
100677
Title
Citations
PageRank
Year
Perceptual Hash of Neural Networks00.342022
Shape-invariant 3D Adversarial Point Clouds.00.342022
TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability00.342022
JPEG Robust Invertible Grayscale00.342022
Three-Dimensional Mesh Steganography and Steganalysis: A Review00.342022
ADVERSARIAL EXAMPLES DETECTION BEYOND IMAGE SPACE00.342021
CDAE: Color decomposition-based adversarial examples for screen devices00.342021
Deep Template-Based Watermarking.20.362021
3D Print-Scan Resilient Localized Mesh Watermarking00.342021
3D Print-Scan Resilient Localized Mesh Watermarking00.342021
Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry20.362021
Feature-Preserving Tensor Voting Model for Mesh Steganalysis10.342021
Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric00.342021
Adversarial defense via self-orthogonal randomization super-network00.342021
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication00.342020
Derivative-based Steganographic Distortion and Its Non-additive Extensions for Audio20.362020
Self-supervised Adversarial Training00.342020
A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents40.442020
A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents40.442020
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks20.362020
Self-Robust 3D Point Recognition via Gather-Vector Guidance10.352020
JPEG Steganography with Estimated Side-information50.402020
Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes60.432020
Controversial 'pixel' prior rule for JPEG adaptive steganography.20.392019
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization00.342019
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization00.342019
Distortion Design for Secure Adaptive 3D Mesh Steganography20.362019
Dup-Net: Denoiser And Upsampler Network For 3d Adversarial Point Clouds Defense50.422019
Screen-Shooting Resilient Watermarking40.442019
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.30.382019
JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds.00.342019
Content-adaptive reversible visible watermarking in encrypted images.30.392019
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams.120.512018
Targeted attack and security enhancement on texture synthesis based steganography.00.342018
Provably Secure Steganography on Generative Media.00.342018
Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.00.342018
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models.60.432018
Comments on "Steganography Using Reversible Texture Synthesis".60.452017