To circumvent the costly pixel-wise annotations of real-world images in ...
Voice conversion (VC), as a voice style transfer technology, is becoming...
We introduce and analyze an hp-version C^1-continuous Petrov-Galerkin
(C...
Deep image steganography is a data hiding technology that conceal data i...
The vulnerability of deep neural networks to adversarial examples, which...
To improve the detection accuracy and generalization of steganalysis, th...
In recent years, DeepFake is becoming a common threat to our society, du...
The vulnerability of deep neural networks (DNNs) to adversarial attack, ...
Deep neural networks (DNNs) have shown an inherent vulnerability to
adve...
The widespread application of audio and video communication technology m...