Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs
暂无分享,去创建一个
Jun Zhang | Zhongliang Yang | Yamin Li | Ru Zhang | Zhongliang Yang | Ru Zhang | Yamin Li | Jun Zhang
[1] Mirella Lapata,et al. Text Generation from Knowledge Graphs with Graph Transformers , 2019, NAACL.
[2] Bin Deng,et al. Text Steganography System Using Markov Chain Source Model and DES Algorithm , 2010, J. Softw..
[3] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[4] N. Chotikakamthorn,et al. Electronic document data hiding technique using inter-character space , 1998, IEEE. APCCAS 1998. 1998 IEEE Asia-Pacific Conference on Circuits and Systems. Microelectronics and Integrating Systems. Proceedings (Cat. No.98EX242).
[5] Hang Li,et al. “ Tony ” DNN Embedding for “ Tony ” Selective Read for “ Tony ” ( a ) Attention-based Encoder-Decoder ( RNNSearch ) ( c ) State Update s 4 SourceVocabulary Softmax Prob , 2016 .
[6] Yongfeng Huang,et al. A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.
[7] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[8] Alon Lavie,et al. Meteor Universal: Language Specific Translation Evaluation for Any Target Language , 2014, WMT@ACL.
[9] Yongfeng Huang,et al. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.
[10] Khalil Sima'an,et al. Graph Convolutional Encoders for Syntax-aware Neural Machine Translation , 2017, EMNLP.
[11] Yongfeng Huang,et al. Text Steganography Based on Ci-poetry Generation Using Markov Chain Model , 2016, KSII Trans. Internet Inf. Syst..
[12] Ning Qian,et al. On the momentum term in gradient descent learning algorithms , 1999, Neural Networks.
[13] Dilip Kumar Yadav,et al. A modified approach to data hiding in Microsoft Word documents by change-tracking technique , 2017, J. King Saud Univ. Comput. Inf. Sci..
[14] Abdelrahman Desoky,et al. Comprehensive linguistic steganography survey , 2010, Int. J. Inf. Comput. Secur..
[15] Suvamoy Changder,et al. A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry☆ , 2013 .
[16] Doug Downey,et al. Construction of the Literature Graph in Semantic Scholar , 2018, NAACL.
[17] Alexander M. Rush,et al. Neural Linguistic Steganography , 2019, EMNLP.
[18] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[19] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[20] Salim Roukos,et al. Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.
[21] Katerina J. Argyraki,et al. Generating Steganographic Text with LSTMs , 2017, ACL.
[22] Jianjun Zhang,et al. Coverless Text Information Hiding Method Using the Frequent Words Distance , 2017, ICCCS.
[23] Alec Radford,et al. Improving Language Understanding by Generative Pre-Training , 2018 .
[24] A. N. Shniperov,et al. A text steganography method based on Markov chains , 2016, Automatic Control and Computer Sciences.
[25] Jun Shen,et al. Coverless Text Information Hiding Method Based on the Word Rank Map , 2016, ICCCS.
[26] Yongfeng Huang,et al. Behavioral Security in Covert Communication Systems , 2019, IWDW.
[27] Xingming Sun,et al. Coverless Image Steganography Without Embedding , 2015, ICCCS.
[28] Carl Vogel,et al. The syntax of concealment: reliable methods for plain text information hiding , 2007, Electronic Imaging.
[29] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[30] Xingming Sun,et al. Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.
[31] H. Hernan Moraldo,et al. An Approach for Text Steganography Based on Markov Chains , 2014, ArXiv.
[32] Yong-Feng Huang,et al. RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.
[33] Yongfeng Huang,et al. A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.
[34] Ilya Sutskever,et al. Language Models are Unsupervised Multitask Learners , 2019 .
[35] Raphaël Couturier,et al. STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost , 2015, Ann. des Télécommunications.
[36] Ilya Sutskever,et al. Generating Long Sequences with Sparse Transformers , 2019, ArXiv.
[37] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[38] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[39] Peng Liu,et al. A Novel Linguistic Steganography Based on Synonym Run-Length Encoding , 2017, IEICE Trans. Inf. Syst..