Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Generative Steganography Method Based on WGAN-GP

    With the development of Generative Adversarial Networks (GAN), GAN-based steganography and steganalysis techniques have attracted much attention from researchers. In this paper, we propose a novel image stegan...

    Jun Li, Ke Niu, Liwei Liao, Lijie Wang, Jia Liu in Artificial Intelligence and Security (2020)

  2. No Access

    Chapter and Conference Paper

    A Framework for Trust Enabled Software Asset Retrieval

    With the development of Internet technology, a lot of software assets emerge on the Internet, but it is difficult to predict or control the quality of these software assets. Therefore, an effective asset retri...

    YanZhen Zou, SiBo Cai, Meng Li, Lijie Wang, Bing **e in Autonomic and Trusted Computing (2010)