暂无分享,去创建一个
Jia Liu | Minqing Zhang | Tingting Su | Yan Ke | Jia Liu | Minqing Zhang | Tingting Su | Yan Ke
[1] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[2] Jing Dong,et al. Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[3] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[4] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[5] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[6] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[7] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[8] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[9] Pieter Abbeel,et al. InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets , 2016, NIPS.
[10] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[11] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[12] Martín Abadi,et al. Learning to Protect Communications with Adversarial Neural Cryptography , 2016, ArXiv.
[13] Peter P. Swire. A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.