共 50 条
- [1] Backdoor Attack Defense Method for Federated Learning Based on Model Watermarking [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 662 - 676
- [3] WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing [J]. 2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2022, : 10 - 18
- [4] A Novel Method to Reduce Collusion Attack Possibility on Watermarking [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1066 - 1071
- [5] The imperceptible video watermarking based on the model of entropy [J]. 2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 480 - 484
- [7] PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking [J]. Multimedia Tools and Applications, 2021, 80 : 7515 - 7527
- [8] A novel image watermarking scheme based on amplitude attack [J]. PATTERN RECOGNITION, 2007, 40 (04) : 1342 - 1354
- [9] A DCT based imperceptible color image watermarking scheme [J]. Abraham, Jobin (jnabpc@gmail.com), 1600, Science and Engineering Research Support Society (09):