Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid
暂无分享,去创建一个
Sheng Liu | Hao Yang | Yongfeng Huang | Zhongliang Yang | YongJian Bao | Saimei Jiao | Yongfeng Huang | Hao Yang | YongJian Bao | Zhongliang Yang | Sheng Liu | Saimei Jiao
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Xin Li,et al. Transparent and robust audio data hiding in subband domain , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[3] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[4] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[5] Edward J. Delp,et al. Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.
[6] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[7] Alec Go,et al. Twitter Sentiment Classification using Distant Supervision , 2009 .
[8] Stephen Clark,et al. Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.
[9] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[10] Nathan Schneider,et al. Association for Computational Linguistics: Human Language Technologies , 2011 .
[11] Alex Graves,et al. Long Short-Term Memory , 2020, Computer Vision.
[12] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[13] Hanafizah Yaacob,et al. Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach , 2015 .
[14] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Wei Liu,et al. SSD: Single Shot MultiBox Detector , 2015, ECCV.
[16] Goutam Sanyal,et al. A real time text steganalysis by using statistical method , 2016, 2016 IEEE International Conference on Engineering and Technology (ICETECH).
[17] Lin Huo,et al. Synonym substitution-based steganographic algorithm with vector distance of two-gram dependency collocations , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[18] Katerina J. Argyraki,et al. Generating Steganographic Text with LSTMs , 2017, ACL.
[19] Kaiming He,et al. Feature Pyramid Networks for Object Detection , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Weiming Zhang,et al. Text Semantic Steganalysis Based on Word Embedding , 2018, ICCCS.
[21] Yongfeng Huang,et al. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.
[22] Ali Farhadi,et al. YOLOv3: An Incremental Improvement , 2018, ArXiv.
[23] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[24] Hao Yang,et al. Steganalysis of VoIP Streams with CNN-LSTM Network , 2019, IH&MMSec.
[25] Yongfeng Huang,et al. Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals , 2019, ICICS.
[26] Ping Zhong,et al. Convolutional Neural Network Based Text Steganalysis , 2019, IEEE Signal Processing Letters.
[27] Alexander M. Rush,et al. Neural Linguistic Steganography , 2019, EMNLP.
[28] Yong-Feng Huang,et al. RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.
[29] Yongfeng Huang,et al. A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.
[30] Fast Steganalysis Method for VoIP Streams , 2019, IEEE Signal Processing Letters.
[31] Yongfeng Huang,et al. FCEM: A Novel Fast Correlation Extract Model For Real Time Steganalysis Of VoIP Stream Via Multi-Head Attention , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).