Showing 21–40 of 56 results
/ Date/ Name
Jul 8, 2020Reversible Data Hiding in Encrypted Images Based on Bit-plane Compression of Prediction ErrorDec 16, 2022Adversarial Example Defense via Perturbation Grading StrategyFeb 22, 2022Universal adversarial perturbation for remote sensing imagesMay 14, 2019High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC MappingMay 9, 2019Reversible Data Hiding in JPEG Images with Multi-objective OptimizationFeb 25, 2021High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive EncodingApr 26, 2023Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correctionOct 3, 2021High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-MSB PredictionMay 30, 2024AutoBreach: Universal and Adaptive Jailbreaking with Efficient Wordplay-Guided OptimizationJun 7, 2024A Survey of Fragile Model WatermarkingFeb 1, 2026DTAMS: High-Capacity Generative Steganography via Dynamic Multi-Timestep Selection and Adaptive Deviation Mapping in Latent DiffusionOct 13, 2025CLASP: Training-Free LLM-Assisted Source Code Watermarking via Semantic-Preserving TransformationsJun 14, 2025Exploring the Secondary Risks of Large Language ModelsMay 13, 2023Decision-based iterative fragile watermarking for model integrity verificationMay 30, 2024Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied ModelsJan 30, 2026VocBulwark: Towards Practical Generative Speech Watermarking via Additional-Parameter InjectionMay 7, 2025RFNNS: Robust Fixed Neural Network Steganography with Universal Text-to-Image ModelsFeb 3, 2026TAME: A Trustworthy Test-Time Evolution of Agent Memory with Systematic BenchmarkingMay 28, 2025FGAS: Fixed Decoder Network-Based Audio Steganography with Adversarial Perturbation GenerationJan 11, 2026Adversarial Attacks on Medical Hyperspectral Imaging Exploiting Spectral-Spatial Dependencies and Multiscale Features