default search action
Wei Zhou 0011
- > Home > Persons > Wei Zhou 0011
Publications
- 2026
- [j85]Jiabao Zhou
, Jinhong Zhang
, Wei Zhou
, Chao Yi
, Bingbing Song
:
CRFD: A novel face privacy preservation via fine-grained controllable and reversible de-identification. Expert Syst. Appl. 302: 130386 (2026) - [j83]Zongxin Liu, Jinhong Zhang, Yunyun Dong
, Bingbing Song, Wei Zhou
:
RWP: a robust watermarking plugin for attribution and protection in stable diffusion models. Neural Networks 198: 108626 (2026) - [c53]Fanxiao Li, Jiaying Wu, Tingchao Fu, Yunyun Dong, Bingbing Song, Wei Zhou:
Drifting Away from Truth: GenAI-Driven News Diversity Challenges LVLM-Based Misinformation Detection. AAAI 2026: 588-596 - 2025
- [c44]Dayang Li, Fanxiao Li
, Bingbing Song, Li Tang, Wei Zhou:
IMRRF: Integrating Multi-Source Retrieval and Redundancy Filtering for LLM-based Fake News Detection. NAACL (Long Papers) 2025: 9127-9142 - [i18]Fanxiao Li, Jiaying Wu, Tingchao Fu, Yunyun Dong, Bingbing Song, Wei Zhou:
Drifting Away from Truth: GenAI-Driven News Diversity Challenges LVLM-Based Misinformation Detection. CoRR abs/2508.12711 (2025) - 2024
- [j64]Bingbing Song
, Ping Wei, Sixing Wu
, Yu Lin, Wei Zhou
:
A survey on Deep-Learning-based image steganography. Expert Syst. Appl. 254: 124390 (2024) - [j61]Yunyun Dong
, Ping Wei, Ruxin Wang
, Bingbing Song, Tingchu Wei, Wei Zhou
:
Hiding image with inception transformer. IET Image Process. 18(13): 3961-3975 (2024) - [j56]Song Gao
, Xiaoxuan Wang
, Bingbing Song
, Renyang Liu
, Shaowen Yao
, Wei Zhou
, Shui Yu
:
Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2518-2528 (2024) - [c39]Ke Cheng, Bingbing Song, Ping Wei, Wei Zhou, Chao Yi, Yunyun Dong:
Generative Steganography Based on Dual-Branch Flow. PRCV (2) 2024: 160-173 - 2023
- [j31]Bingbing Song
, Ruxin Wang
, Song Gao
, Yunyun Dong
, Ling Liu
, Wei Zhou
:
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT. IEEE Trans. Serv. Comput. 16(5): 3723-3735 (2023) - [c36]Fanxiao Li
, Sixing Wu
, Jiong Yu, Shuoxin Wang, Bingbing Song, Renyang Liu
, Haoseng Lai, Wei Zhou:
Rewriting-Stego: Generating Natural and Controllable Steganographic Text with Pre-trained Language Model. DASFAA (1) 2023: 617-626 - [i8]Bingbing Song, Derui Wang, Tianwei Zhang, Renyang Liu, Yu Lin, Wei Zhou:
Double-Flow-based Steganography without Embedding for Image-to-Image Hiding. CoRR abs/2311.15027 (2023) - 2022
- [c21]Bingbing Song, Haiyang Chen, Jiashun Suo
, Wei Zhou:
Low-power Robustness Learning Framework for Adversarial Attack on Edges. MSN 2022: 821-828
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-07 02:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint