Follow
Diqun Yan
Diqun Yan
Verified email at nbu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Reversible data hiding for audio based on prediction error expansion
D Yan, R Wang
2008 International Conference on Intelligent Information Hiding and …, 2008
482008
Steganography for MP3 audio by exploiting the rule of window switching
D Yan, R Wang, X Yu, J Zhu
Computers & Security 31 (5), 704-716, 2012
432012
Steganalysis of MP3Stego with low embedding-rate using Markov feature
C Jin, R Wang, D Yan
Multimedia Tools and Applications 76, 6143-6158, 2017
352017
Targeted speech adversarial example generation with generative adversarial network
D Wang, L Dong, R Wang, D Yan, J Wang
IEEE Access 8, 124503-124513, 2020
312020
Steganalysis for MP3Stego using differential statistics of quantization step
D Yan, R Wang, X Yu, J Zhu
Digital Signal Processing 23 (4), 1181-1185, 2013
312013
Quantization step parity-based steganography for MP3 audio
Y Diqun, W Rangding, Z Liguang
Fundamenta Informaticae 97 (1-2), 1-14, 2009
292009
Audio steganalysis with improved convolutional neural network
Y Lin, R Wang, D Yan, L Dong, X Zhang
Proceedings of the ACM workshop on information hiding and multimedia …, 2019
282019
Huffman table swapping-based steganograpy for MP3 audio
D Yan, R Wang
Multimedia Tools and Applications 52, 291-305, 2011
272011
Source cell-phone identification in the presence of additive noise from CQT domain
T Qin, R Wang, D Yan, L Lin
Information 9 (8), 205, 2018
262018
Identification of fake stereo audio using SVM and CNN
T Liu, D Yan, R Wang, N Yan, G Chen
Information 12 (7), 263, 2021
252021
Detection of MP3Stego exploiting recompression calibration-based feature
D Yan, R Wang
Multimedia tools and applications 72, 865-878, 2014
222014
A high capacity MP3 steganography based on Huffman coding
D Yan, R Wang, LG Zhang
Journal of Sichuan University (Natural Science Edition) 6, 013, 2011
222011
Adversarial examples attack and countermeasure for speech recognition system: A survey
D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong
International Conference on Security and Privacy in Digital Economy, 443-468, 2020
192020
Learning to generate steganographic cover for audio steganography using gan
L Chen, R Wang, D Yan, J Wang
IEEE Access 9, 88098-88107, 2021
172021
Adaptive audio steganography based on improved syndrome-trellis codes
K Ying, R Wang, Y Lin, D Yan
IEEE Access 9, 11705-11715, 2021
162021
Source smartphone identification by exploiting encoding characteristics of recorded speech
C Jin, R Wang, D Yan
Digital Investigation 29, 129-146, 2019
152019
The sign bits of huffman codeword-based steganography for aac audio
J Zhu, R Wang, D Yan
2010 International conference on multimedia technology, 1-4, 2010
152010
Semi-supervised semantic segmentation with cross teacher training
H Xiao, D Li, H Xu, S Fu, D Yan, K Song, C Peng
Neurocomputing 508, 36-46, 2022
132022
Anti-forensics of audio source identification using generative adversarial network
X Li, D Yan, L Dong, R Wang
IEEE Access 7, 184332-184339, 2019
132019
Compression history detection for MP3 audio.
D Yan, R Wang, J Zhou, C Jin, Z Wang
KSII Transactions on Internet & Information Systems 12 (2), 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20