Nenghai Yu
University of Science and Technology of China
H-index: 70
Asia-China
Top articles of Nenghai Yu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Delving Deeper Into Vulnerable Samples in Adversarial Training | Pengfei Zhao Haojie Yuan Qi Chu Shubin Xu Nenghai Yu | 2024/4/14 | |
Efficient secure aggregation for privacy-preserving federated learning based on secret sharing | arXiv preprint arXiv:2304.03841 | Rouzbeh Behnia Mohammadreza Ebrahimi Arman Riasi Sherman SM Chow Balaji Padmanabhan | 2023/4/7 |
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography | IEEE Transactions on Information Forensics and Security | Xin Zhang Kejiang Chen Jinyang Ding Yuqi Yang Weiming Zhang | 2024/2/1 |
TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection | arXiv preprint arXiv:2402.02046 | Tianxiang Chen Zhentao Tan Qi Chu Yue Wu Bin Liu | 2024/2/3 |
PointCAT: Contrastive adversarial training for robust point cloud recognition | IEEE Transactions on Image Processing | Qidong Huang Xiaoyi Dong Dongdong Chen Hang Zhou Weiming Zhang | 2024 |
MuST: Robust Image Watermarking for Multi-Source Tracing | Proceedings of the AAAI Conference on Artificial Intelligence | Guanjie Wang Zehua Ma Chang Liu Xi Yang Han Fang | 2024/3/24 |
Provably Secure Disambiguating Neural Linguistic Steganography | arXiv preprint arXiv:2403.17524 | Yuang Qi Kejiang Chen Kai Zeng Weiming Zhang Nenghai Yu | 2024/3/26 |
Exploiting Modality-Specific Features for Multi-Modal Manipulation Detection and Grounding | Jiazhen Wang Bin Liu Changtao Miao Zhiwei Zhao Wanyi Zhuang | 2024/4/14 | |
How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models | arXiv preprint arXiv:2404.09836 | Xiuwei Shang Shaoyin Cheng Guoqiang Chen Yanming Zhang Li Hu | 2024/4/15 |
Target-aware Molecule Generation for Drug Design Using a Chemical Language Model | bioRxiv | Yingce Xia Kehan Wu Pan Deng Renhe Liu Yuan Zhang | 2024/1/8 |
A Construction of Evolving -threshold Secret Sharing Scheme over A Polynomial Ring | arXiv preprint arXiv:2402.01144 | Qi Cheng Hongru Cao Sian-Jheng Lin Nenghai Yu | 2024/2/2 |
Mim-istd: Mamba-in-mamba for efficient infrared small target detection | arXiv preprint arXiv:2403.02148 | Tianxiang Chen Zhentao Tan Tao Gong Qi Chu Yue Wu | 2024/3/4 |
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models | arXiv preprint arXiv:2404.04956 | Zijin Yang Kai Zeng Kejiang Chen Han Fang Weiming Zhang | 2024/4/7 |
DSIS: A Novel (K, N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery | Zikai Xu Bin Liu Fei Hu Weihai Li Nenghai Yu | 2024/4/14 | |
Towards Generalist Prompting for Large Language Models by Mental Models | arXiv preprint arXiv:2402.18252 | Haoxiang Guan Jiyan He Shuxin Zheng En-Hong Chen Weiming Zhang | 2024/2/28 |
Data-Free Hard-Label Robustness Stealing Attack | Proceedings of the AAAI Conference on Artificial Intelligence | Xiaojian Yuan Kejiang Chen Wen Huang Jie Zhang Weiming Zhang | 2024/3/24 |
Transformer based Pluralistic Image Completion with Reduced Information Loss | IEEE Transactions on Pattern Analysis and Machine Intelligence | Qiankun Liu Yuqi Jiang Zhentao Tan Dongdong Chen Ying Fu | 2024/4/2 |
Attribute-Aware Head Swapping Guided by 3d Modeling | Wenbo Zhou Dongdong Chen Jing Liao Jie Zhang Kejiang Chen | 2024/4/14 | |
Audio-Visual Contrastive Pre-train for Face Forgery Detection | ACM Transactions on Multimedia Computing, Communications and Applications | Hanqing Zhao Wenbo Zhou Dongdong Chen Weiming Zhang Ying Guo | 2024 |
Towards Secure and Robust Steganography for Black-box Generated Images | IEEE Transactions on Information Forensics and Security | Kai Zeng Kejiang Chen Jiansong Zhang Weiming Zhang Nenghai Yu | 2024/2/1 |