


default search action
Nenghai Yu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2026
[j249]Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng
, Guoqiang Chen, Gangyang Li, Li Hu, Wei Ming Zhang, Nenghai Yu:
An empirical study on the effectiveness of large language models for binary code understanding. Empir. Softw. Eng. 31(1): 14 (2026)
[j248]Jiesheng Tan
, Zhonghui Li
, Jian Li
, Bin Liu
, Nenghai Yu
:
Distributed Entanglement Routing Scheme With Fidelity Guarantee in Quantum Networks. IEEE Trans. Netw. Sci. Eng. 13: 3320-3334 (2026)- 2025
[j247]Xumin Gao, Kaiping Xue, Jian Li, Zhonghui Li, Jiaqi Wu, Nenghai Yu, Qibin Sun, Jun Lu:
IPSeQ: A Security-Enhanced IPSec Protocol Integrated with Quantum Key Distribution. IEEE Commun. Mag. 63(9): 148-155 (2025)
[j246]Linqing Hu
, Junqi Zhang
, Jie Zhang, Shaoyin Cheng
, Yuyi Wang
, Weiming Zhang, Nenghai Yu:
Security analysis and adaptive false data injection against multi-sensor fusion localization for autonomous driving. Inf. Fusion 117: 102822 (2025)
[j245]Jian Li
, Peng Zheng, Zhonghui Li
, Yuqi Yang, Nenghai Yu, Qibin Sun, Jun Lu:
Decentralized Key Management and Service in Quantum Key Distribution Networks: An Experimental Implementation. IEEE J. Sel. Areas Commun. 43(8): 2782-2797 (2025)
[j244]Jian Li
, Peng Zheng
, Zhonghui Li
, Kaiping Xue
, Zhilin Xie, Nenghai Yu
, Qibin Sun
, Jun Lu
:
Integration of Quantum Key Distribution Networks and Classical Networks: An Evolution Perspective. IEEE Netw. 39(3): 180-187 (2025)
[j243]Xinyi Jin, Zhuoyue Zhang, Bowen Gao
, Shuqing Gao, Wenbo Zhou, Nenghai Yu, Guoyan Wang
:
Assessing the perceived credibility of deepfakes: The impact of system-generated cues and video characteristics. New Media Soc. 27(3): 1651-1672 (2025)
[j242]Zhongyi Zhang
, Jie Zhang
, Wenbo Zhou
, Xinghui Zhou, Qing Guo
, Weiming Zhang
, Tianwei Zhang
, Nenghai Yu
:
FaceTracer: Unveiling Source Identities From Swapped Face Images and Videos for Fraud Prevention. IEEE Trans. Pattern Anal. Mach. Intell. 47(12): 12021-12037 (2025)
[j241]Xue Xie, Jun Jiang, Jiansong Zhang, Kejiang Chen, Weiming Zhang
, Nenghai Yu:
Reversible adversarial visible image watermarking. Signal Process. 234: 109999 (2025)
[j240]Xinghao Wang
, Tao Gong
, Qi Chu
, Bin Liu
, Nenghai Yu
:
Context-Aware Weakly Supervised Image Manipulation Localization With SAM Refinement. IEEE Signal Process. Lett. 32: 3047-3051 (2025)
[j239]Zhaoying Wang
, Jian Li
, Kaiping Xue
, Zhonghui Li
, Ruidong Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
Fair-EAS: Entanglement Allocation and Selection for Process-Oriented Fairness in Quantum Communication Networks. IEEE Trans. Commun. 73(7): 4841-4854 (2025)
[j238]Linfeng Ma
, Han Fang
, Zehua Ma, Zhaoyang Jia
, Weiming Zhang
, Nenghai Yu
:
C³shartMark: A Chart Watermarking Scheme With Consecutive-Encoding and Concurrent-Decoding. IEEE Trans. Circuits Syst. Video Technol. 35(1): 492-507 (2025)
[j237]Tianxiang Chen
, Zhentao Tan
, Tao Gong
, Qi Chu
, Yue Wu, Bin Liu
, Nenghai Yu
, Le Lu
, Jieping Ye
:
Bootstrapping Audio-Visual Video Segmentation by Strengthening Audio Cues. IEEE Trans. Circuits Syst. Video Technol. 35(3): 2398-2409 (2025)
[j236]Yuang Qi
, Kejiang Chen
, Kai Zeng
, Weiming Zhang
, Nenghai Yu
:
Provably Secure Disambiguating Neural Linguistic Steganography. IEEE Trans. Dependable Secur. Comput. 22(3): 2430-2442 (2025)
[j235]Meng Tong
, Kejiang Chen
, Jie Zhang
, Yuang Qi
, Weiming Zhang
, Nenghai Yu
, Tianwei Zhang
, Zhikun Zhang
:
InferDPT: Privacy-Preserving Inference for Closed-Box Large Language Models. IEEE Trans. Dependable Secur. Comput. 22(5): 4625-4640 (2025)
[j234]Xi Yang
, Jie Zhang
, Chang Liu
, Han Fang, Zehua Ma
, Kejiang Chen
, Weiming Zhang
, Nenghai Yu
:
Synthesizing Glyph Vectors for Practical Information Hiding in Documents. IEEE Trans. Dependable Secur. Comput. 22(6): 6074-6087 (2025)
[j233]Kaimeng Chen
, Qingxiao Guan
, Weiming Zhang
, Nenghai Yu
, Wei Lu
:
Separable Reversible Data Hiding in Encrypted Images Based on Systematic Polar Code and Flag Bit Transmission Channel Model. IEEE Trans. Dependable Secur. Comput. 22(6): 6844-6861 (2025)
[j232]Xin Zhang, Kejiang Chen
, Na Zhao, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Admissible Encoding. IEEE Trans. Inf. Forensics Secur. 20: 3161-3175 (2025)
[j231]Xiangkun Wang, Kejiang Chen
, Yuang Qi
, Ruiheng Liu, Weiming Zhang
, Nenghai Yu
:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. IEEE Trans. Inf. Forensics Secur. 20: 4581-4594 (2025)
[j230]Yiming Li
, Kejiang Chen
, Yaofei Wang
, Xin Zhang, Guanjie Wang, Weiming Zhang
, Nenghai Yu
:
CoAS: Composite Audio Steganography Based on Text and Speech Synthesis. IEEE Trans. Inf. Forensics Secur. 20: 5978-5991 (2025)
[j229]Benlong Wu
, Guoqiang Chen, Kejiang Chen
, Xiuwei Shang
, Jiapeng Han, Yanru He
, Weiming Zhang
, Nenghai Yu
:
AutoPT: How Far Are We From the Fully Automated Web Penetration Testing? IEEE Trans. Inf. Forensics Secur. 20: 9657-9672 (2025)
[j228]Yiling Chen
, Tianyi Wei
, Nenghai Yu
:
Antiano: A Series of Attacks Exploiting Vulnerabilities in Deep Face Anonymization Algorithms. IEEE Trans. Inf. Forensics Secur. 20: 13055-13070 (2025)
[j227]Tianxiang Chen
, Xudong Zhou, Zhentao Tan
, Yue Wu, Ziyang Wang
, Zi Ye
, Tao Gong
, Qi Chu
, Nenghai Yu
, Le Lu
:
Zig-RiR: Zigzag RWKV-in-RWKV for Efficient Medical Image Segmentation. IEEE Trans. Medical Imaging 44(8): 3245-3257 (2025)
[j226]Chao Zhou, Huishuai Zhang, Jiang Bian, Weiming Zhang, Nenghai Yu:
©Plug-in Authorization for Human Copyright Protection in Text-to-Image Model. Trans. Mach. Learn. Res. 2025 (2025)
[j225]Shuai Li, Jie Zhang
, Yuang Qi
, Kejiang Chen
, Tianwei Zhang
, Weiming Zhang
, Nenghai Yu
:
Clean Image May Be Dangerous: Data Poisoning Attacks Against Deep Hashing. IEEE Trans. Multim. 27: 8541-8554 (2025)
[j224]Peng Zheng
, Jian Li
, Zhonghui Li
, Kaiping Xue
, Nenghai Yu
, Ruidong Li
, Qibin Sun
, Jun Lu
:
An Efficient and Robust Resource Allocation Method for Quantum Key Distribution Networks. IEEE Trans. Netw. Serv. Manag. 22(5): 4083-4095 (2025)
[j223]Hanqing Zhao
, Wenbo Zhou
, Dongdong Chen
, Weiming Zhang
, Ying Guo
, Zhen Cheng
, Pengfei Yan
, Nenghai Yu
:
Audio-Visual Contrastive Pre-train for Face Forgery Detection. ACM Trans. Multim. Comput. Commun. Appl. 21(2): 45:1-45:16 (2025)
[j222]Changtao Miao
, Qi Chu
, Zhentao Tan
, Zhenchao Jin
, Tao Gong
, Wanyi Zhuang
, Yue Wu
, Bin Liu
, Honggang Hu
, Nenghai Yu
:
Multi-spectral Class Center Network for Face Manipulation Localization. ACM Trans. Multim. Comput. Commun. Appl. 21(8): 231:1-231:24 (2025)
[j221]Zhonghui Li
, Jian Li
, Kaiping Xue
, Lutong Chen
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
NarrowGap: Reducing Bottlenecks for End-to-End Entanglement Distribution in Quantum Networks. IEEE Trans. Netw. 33(1): 162-177 (2025)
[j220]Jian Li
, Zhaoying Wang
, Kaiping Xue
, Zhonghui Li
, Ruidong Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
DRM-ETP: A Dynamic Rate Matching-Based Entanglement Transport Protocol in Quantum Networks. IEEE Trans. Netw. 33(2): 835-848 (2025)
[j219]Yuxin Chen
, Jian Li
, Zhonghui Li
, Kaiping Xue
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
An Asynchronous Key Relay Protocol Design for Large-Scale Quantum Key Distribution Networks. IEEE Trans. Netw. 33(6): 3024-3039 (2025)
[c364]Tao Gong, Qi Chu, Bin Liu, Nenghai Yu:
Rethinking Masked Data Reconstruction Pretraining for Strong 3D Action Representation Learning. AAAI 2025: 3149-3157
[c363]Xuanpu Zhao, Dianmo Sheng, Zhentao Tan, Zhiwei Zhao, Tao Gong, Qi Chu, Bin Liu, Nenghai Yu:
Training-free Open-Vocabulary Semantic Segmentation via Diverse Prototype Construction and Sub-region Matching. AAAI 2025: 10474-10482
[c362]Li Hu, Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng, Benlong Wu, LiGangyang LiGangyang, Xu Zhu, Weiming Zhang, Nenghai Yu:
CompileAgent: Automated Real-World Repo-Level Compilation with Tool-Integrated LLM-based Agent System. ACL (1) 2025: 2078-2091
[c361]Jiawei Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu:
SQL Injection Jailbreak: A Structural Disaster of Large Language Models. ACL (Findings) 2025: 6871-6891
[c360]Xiao Yu, Yi Yu, Dongrui Liu, Kejiang Chen, Weiming Zhang, Nenghai Yu, Jing Shao:
EvoBench: Towards Real-world LLM-Generated Text Detection Benchmarking for Evolving Large Language Models. ACL (Findings) 2025: 14605-14620
[c359]Qi Cheng, Hongru Cao, Sian-Jheng Lin, Nenghai Yu, Yunghsiang S. Han, Xianhong Xie:
A Construction of Evolving k-Threshold Secret Sharing Scheme over A Polynomial Ring. ASIACRYPT (8) 2025: 3-33
[c358]Peigui Qi
, Kunsheng Tang
, Wenbo Zhou
, Weiming Zhang
, Nenghai Yu
, Tianwei Zhang
, Qing Guo
, Jie Zhang
:
SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models. CCS 2025: 2818-2832
[c357]Dianmo Sheng, Dongdong Chen, Zhentao Tan, Qiankun Liu, Qi Chu, Tao Gong, Bin Liu, Jing Han, Wenbin Tu, Shengwei Xu, Nenghai Yu:
UNICL-SAM: Uncertainty-Driven In-Context Segmentation with Part Prototype Discovery. CVPR 2025: 20201-20211
[c356]Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang, Nenghai Yu:
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. ESORICS (3) 2025: 243-262
[c355]Xuan Jin, Yuanzhi Yao, Caihong Kai, Rui Wang, Nenghai Yu:
Semi-VFL: Communication-efficient Few-label Vertical Federated Learning with Stacked Generalization and Model-level Consistency. ICASSP 2025: 1-5
[c354]Zheming Liang, Qi Chu, Tao Gong, Bin Liu, Quanchen Zou, Deyue Zhang, Nenghai Yu:
Training an Anti-KD Model that Cannot Teach Students via Similarity Disruption. ICASSP 2025: 1-5
[c353]Jing Qiu, Xi Yang, Shuai Li, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Watermarking Datasets for LLM Fine-tuning. ICASSP 2025: 1-5
[c352]Yubo Wang, Bin Liu, Zhiwei Zhao, Jixiang Niu, Qi Chu, Nenghai Yu:
CMGait: Enhancing Cross-Modality Gait Recognition between LiDAR and RGB through Contrastive Identity-consistent Feature Aggregation. ICASSP 2025: 1-5
[c351]Zhiling Zhang, Jie Zhang, Kui Zhang, Wenbo Zhou, Ting Xu, Daiheng Gao, Zixian Guo, Qinglang Guo, Weiming Zhang, Nenghai Yu:
Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World. ICASSP 2025: 1-5
[c350]Rensong Wang, Jie Zhang, Zhiwen Ren, Weiming Zhang, Nenghai Yu:
SignaShield: Guarding Your Signature via Font Style Watermarking. ICCAI 2025: 393-400
[c349]Jiazhen Wang, Bin Liu, Tao Gong, Zhiwei Zhao, Changtao Miao, Yangyang Wang, Qi Chu, Nenghai Yu:
Exploiting Feature Gating and Injection For Multi-modal Manipulation Detection and Grounding. ICIG (3) 2025: 289-300
[c348]Li Zhang, Bin Liu, Qi Chu, Nenghai Yu:
Multimodal Consistency-Driven Deepfake Detection. ICIG (2) 2025: 293-303
[c347]Jiazhen Wang, Bin Liu, Changtao Miao, Yangyang Wang, Tao Gong, Qi Chu, Quanchen Zou, Deyue Zhang, Nenghai Yu:
Exploring Generalized Features For LLM-Generated Text Detection. ICIG (3) 2025: 301-312
[c346]Zhe Lei, Jie Zhang, Jingtao Li, Tianwei Zhang, Haibin Kan, Weiming Zhang, Nenghai Yu:
Aparecium: Revealing Secrets from Physical Photographs. ICME 2025: 1-6
[c345]Yanyan Liu, Bin Liu, Jie Zhang, Xiang Zhang, Zehua Ma, Nenghai Yu:
A Watermark Updating Framework for Multi-stage Image Content Distribution. ICME 2025: 1-6
[c344]Cong Ming, Haojie Yuan, Xiangwen Wang, Qi Chu, Tao Gong, Bin Liu, Nenghai Yu:
Adversarial Examples Detection Based on Adversarial Attack Sensitivity. ICME 2025: 1-6
[c343]Wei Fan, Kejiang Chen, Chang Liu, Weiming Zhang, Nenghai Yu:
De-AntiFake: Rethinking the Protective Perturbations Against Voice Cloning Attacks. ICML 2025
[c342]Xulin Li, Yan Lu, Bin Liu, Jiaze Li, Qinhong Yang, Tao Gong, Qi Chu, Mang Ye, Nenghai Yu:
Towards Anytime Retrieval: A Benchmark for Anytime Person Re-Identification. IJCAI 2025: 1467-1475
[c341]Xiuwei Shang, Guoqiang Chen, Shaoyin Cheng, Benlong Wu, Li Hu, Gangyang Li, Weiming Zhang, Nenghai Yu:
BinMetric: A Comprehensive Binary Code Analysis Benchmark for Large Language Models. IJCAI 2025: 7715-7723
[c340]Changtao Miao, Qi Chu, Tao Gong, Zhentao Tan, Zhenchao Jin, Wanyi Zhuang, Man Luo, Honggang Hu, Nenghai Yu:
Mixture-of-Noises Enhanced Forgery-Aware Predictor for Multi-Face Manipulation Detection and Localization. ACM Multimedia 2025: 3903-3912
[c339]Benlong Wu, Yuang Qi, Xiuwei Shang, Weiming Zhang, Nenghai Yu, Kejiang Chen:
MMPro: A Decoupled Perception-Thinking-Execution Framework for Secure GUI Agent. ACM Multimedia 2025: 4679-4687
[c338]Wanyi Zhuang, Qi Chu, Tao Gong, Changtao Miao, Nenghai Yu:
Towards Good Generalizations for Diffusion Generated Image Detection Using Multiple Reconstruction Contrastive Learning. ACM Multimedia 2025: 5431-5440
[c337]Pingyu Wu, Daiheng Gao, Jin Tang, Huimin Chen, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
MES-RAG: Bringing Multi-modal, Entity-Storage, and Secure Enhancements to RAG. NAACL (Findings) 2025: 4287-4298
[c336]Meng Tong, Kejiang Chen, Xiaojian Yuan, Jiayang Liu, Weiming Zhang, Nenghai Yu, Jie Zhang:
On the Vulnerability of Text Sanitization. NAACL (Long Papers) 2025: 5150-5164
[c335]Xiang Zhang
, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan, Peng Zhao, Zijian Zhang
, Bin Liu, Qing Guo, Tianwei Zhang, Nenghai Yu:
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis. SP 2025: 3653-3671
[i192]Mang Ye, Xuankun Rong, Wenke Huang, Bo Du, Nenghai Yu, Dacheng Tao
:
A Survey of Safety on Large Vision-Language Models: Attacks, Defenses and Evaluations. CoRR abs/2502.14881 (2025)
[i191]Chuan Cui, Kejiang Chen, Zhihua Wei, Wen Shen, Weiming Zhang, Nenghai Yu:
M3-AGIQA: Multimodal, Multi-Round, Multi-Aspect AI-Generated Image Quality Assessment. CoRR abs/2502.15167 (2025)
[i190]Chang Liu, Haolin Wu, Xi Yang, Kui Zhang, Cong Wu, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang:
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks. CoRR abs/2503.00957 (2025)
[i189]Gangyang Li, Xiuwei Shang, Shaoyin Cheng, Junqi Zhang, Li Hu, Xu Zhu, Weiming Zhang, Nenghai Yu:
Beyond the Edge of Function: Unraveling the Patterns of Type Recovery in Binary Code. CoRR abs/2503.07243 (2025)
[i188]Pingyu Wu, Daiheng Gao, Jin Tang, Huimin Chen, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
MES-RAG: Bringing Multi-modal, Entity-Storage, and Secure Enhancements to RAG. CoRR abs/2503.13563 (2025)
[i187]Xinghao Wang, Tao Gong, Qi Chu, Bin Liu, Nenghai Yu:
Context-Aware Weakly Supervised Image Manipulation Localization with SAM Refinement. CoRR abs/2503.20294 (2025)
[i186]Shuai Li, Jie Zhang, Yuang Qi, Kejiang Chen, Tianwei Zhang, Weiming Zhang, Nenghai Yu:
Clean Image May be Dangerous: Data Poisoning Attacks Against Deep Hashing. CoRR abs/2503.21236 (2025)
[i185]Zijin Yang, Xin Zhang, Kejiang Chen, Kai Zeng, Qiyi Yao, Han Fang, Weiming Zhang, Nenghai Yu:
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of Performance-Lossless Image Watermark for Diffusion Models. CoRR abs/2504.15026 (2025)
[i184]Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. CoRR abs/2504.15139 (2025)
[i183]Xin Zhang, Kejiang Chen, Na Zhao, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Admissible Encoding. CoRR abs/2504.19454 (2025)
[i182]Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu:
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding. CoRR abs/2504.21803 (2025)
[i181]Li Hu, Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng, Benlong Wu, Gangyang Li, Xu Zhu, Weiming Zhang, Nenghai Yu:
CompileAgent: Automated Real-World Repo-Level Compilation with Tool-Integrated LLM-based Agent System. CoRR abs/2505.04254 (2025)
[i180]Xiuwei Shang, Guoqiang Chen, Shaoyin Cheng, Benlong Wu, Li Hu, Gangyang Li, Weiming Zhang, Nenghai Yu:
BinMetric: A Comprehensive Binary Analysis Benchmark for Large Language Models. CoRR abs/2505.07360 (2025)
[i179]Chenghao Yang, Yinbo Luo, Zhoufutu Wen, Qi Chu, Tao Gong, Longxiang Liu, Kaiyuan Zhang, Jianpeng Jiao, Ge Zhang, Wenhao Huang, Nenghai Yu:
MARS-Bench: A Multi-turn Athletic Real-world Scenario Benchmark for Dialogue Evaluation. CoRR abs/2505.23810 (2025)
[i178]Long Xing, Qidong Huang, Xiaoyi Dong, Pan Zhang, Yuhang Zang, Yuhang Cao, Jinsong Li, Shuangrui Ding, Weiming Zhang, Nenghai Yu, Jiaqi Wang, Feng Wu, Dahua Lin:
ScaleCap: Inference-Time Scalable Image Captioning via Dual-Modality Debiasing. CoRR abs/2506.19848 (2025)
[i177]Yuzhuo Chen, Zehua Ma, Han Fang, Weiming Zhang, Nenghai Yu:
TAG-WM: Tamper-Aware Generative Image Watermarking via Diffusion Inversion Sensitivity. CoRR abs/2506.23484 (2025)
[i176]Wei Fan, Kejiang Chen, Chang Liu, Weiming Zhang, Nenghai Yu:
De-AntiFake: Rethinking the Protective Perturbations Against Voice Cloning Attacks. CoRR abs/2507.02606 (2025)
[i175]Yanghao Su, Jie Zhang, Yiming Li, Tianwei Zhang, Qing Guo, Weiming Zhang, Nenghai Yu, Nils Lukas, Wenbo Zhou:
BURN: Backdoor Unlearning via Adversarial Boundary Analysis. CoRR abs/2507.10491 (2025)
[i174]Chao Zhou, Tianyi Wei, Nenghai Yu:
Scale Your Instructions: Enhance the Instruction-Following Fidelity of Unified Image Generation Model by Self-Adaptive Attention Scaling. CoRR abs/2507.16240 (2025)
[i173]Tianxiang Chen, Zhentao Tan, Xiaofan Bo, Yue Wu, Tao Gong, Qi Chu, Jieping Ye, Nenghai Yu:
Flora: Effortless Context Construction to Arbitrary Length and Scale. CoRR abs/2507.19786 (2025)
[i172]Xulin Li, Yan Lu, Bin Liu, Jiaze Li, Qinhong Yang, Tao Gong, Qi Chu, Mang Ye, Nenghai Yu:
Towards Anytime Retrieval: A Benchmark for Anytime Person Re-Identification. CoRR abs/2509.16635 (2025)
[i171]Xingkai Peng, Jun Jiang, Meng Tong, Shuai Li, Weiming Zhang, Nenghai Yu, Kejiang Chen:
Multimodal Prompt Decoupling Attack on the Safety Filters in Text-to-Image Models. CoRR abs/2509.21360 (2025)
[i170]Jiawei Zhao, Yuang Qi, Weiming Zhang, Nenghai Yu, Kejiang Chen:
PSRT: Accelerating LRM-based Guard Models via Prefilled Safe Reasoning Traces. CoRR abs/2509.21768 (2025)
[i169]Jiayao Jiang, Siran Peng, Bin Liu, Qi Chu, Nenghai Yu:
LAKAN: Landmark-assisted Adaptive Kolmogorov-Arnold Network for Face Forgery Detection. CoRR abs/2510.00634 (2025)
[i168]Wei Fan, Kejiang Chen, Xiangkun Wang, Weiming Zhang, Nenghai Yu:
WavInWav: Time-domain Speech Hiding via Invertible Neural Network. CoRR abs/2510.02915 (2025)
[i167]Peigui Qi, Kunsheng Tang, Wenbo Zhou, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang:
SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models. CoRR abs/2510.05173 (2025)
[i166]Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu:
Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization. CoRR abs/2510.10111 (2025)
[i165]Shuai Li, Kejiang Chen, Jun Jiang, Jie Zhang, Qiyi Yao, Kai Zeng, Weiming Zhang, Nenghai Yu:
EditMark: Watermarking Large Language Models based on Model Editing. CoRR abs/2510.16367 (2025)
[i164]Jindong Yang, Han Fang, Weiming Zhang, Nenghai Yu, Kejiang Chen:
T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models. CoRR abs/2510.22366 (2025)
[i163]Jun Jiang, Weiming Zhang, Nenghai Yu, Kejiang Chen:
A high-capacity linguistic steganography based on entropy-driven rank-token mapping. CoRR abs/2510.23035 (2025)
[i162]Jiajie Lu, Zhenkan Fu, Na Zhao, Long Xing, Kejiang Chen, Weiming Zhang, Nenghai Yu:
LiteUpdate: A Lightweight Framework for Updating AI-Generated Image Detectors. CoRR abs/2511.07192 (2025)
[i161]Yuxiao Xiang, Junchi Chen, Zhenchao Jin, Changtao Miao, Haojie Yuan, Qi Chu, Tao Gong, Nenghai Yu:
GuardTrace-VL: Detecting Unsafe Multimodel Reasoning via Iterative Safety Supervision. CoRR abs/2511.20994 (2025)
[i160]Guoqiang Chen, Lingyun Ying, Ziyang Song, Daguang Liu, Qiang Wang, Zhiqi Wang, Li Hu, Shaoyin Cheng, Weiming Zhang, Nenghai Yu:
Cross-modal Retrieval Models for Stripped Binary Analysis. CoRR abs/2512.10393 (2025)
[i159]Qi Cheng, Hongru Cao, Sian-Jheng Lin, Nenghai Yu, Yunghsiang S. Han, Xianhong Xie:
A Construction of Evolving k-threshold Secret Sharing Scheme over A Polynomial Ring. IACR Cryptol. ePrint Arch. 2025: 1499 (2025)- 2024
[j218]Boyao Zhao
, Haozhe Chen
, Jie Zhang, Weiming Zhang, Nenghai Yu:
Dual-verification-based model fingerprints against ambiguity attacks. Cybersecur. 7(1): 78 (2024)
[j217]Xuehai Zhang
, Wenbo Zhou, Kunlin Liu, Hao Tang, Zhenyu Zhang, Weiming Zhang, Nenghai Yu:
ControlFace: Feature Disentangling for Controllable Face Swapping. J. Imaging 10(1): 21 (2024)
[j216]Lutong Chen
, Kaiping Xue
, Jian Li
, Zhonghui Li
, Ruidong Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
REDP: Reliable Entanglement Distribution Protocol Design for Large-Scale Quantum Networks. IEEE J. Sel. Areas Commun. 42(7): 1723-1737 (2024)
[j215]Fei Hu, Weihai Li
, Nenghai Yu:
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability. Multim. Tools Appl. 83(14): 40713-40732 (2024)
[j214]Zirui Xiao, Jian Li
, Kaiping Xue
, Zhonghui Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
A Connectionless Entanglement Distribution Protocol Design in Quantum Networks. IEEE Netw. 38(1): 131-139 (2024)
[j213]Lutong Chen
, Kaiping Xue
, Jian Li
, Zhonghui Li
, Nenghai Yu
:
Q-CSKDF: A Continuous and Security Key Derivation Function for Quantum Key Distribution. IEEE Netw. 38(5): 123-130 (2024)
[j212]Tianyi Wei
, Dongdong Chen
, Wenbo Zhou
, Jing Liao
, Hanqing Zhao
, Weiming Zhang
, Gang Hua
, Nenghai Yu
:
Deep Image Matting With Sparse User Interactions. IEEE Trans. Pattern Anal. Mach. Intell. 46(2): 881-895 (2024)
[j211]Qiankun Liu
, Yuqi Jiang
, Zhentao Tan
, Dongdong Chen
, Ying Fu
, Qi Chu
, Gang Hua
, Nenghai Yu
:
Transformer Based Pluralistic Image Completion With Reduced Information Loss. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6652-6668 (2024)
[j210]Jie Zhang
, Dongdong Chen
, Jing Liao
, Zehua Ma
, Han Fang
, Weiming Zhang
, Huamin Feng
, Gang Hua
, Nenghai Yu
:
Robust Model Watermarking for Image Processing Networks via Structure Consistency. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6985-6992 (2024)
[j209]Haozhe Chen
, Jie Zhang
, Kejiang Chen
, Weiming Zhang
, Nenghai Yu
:
Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition. IEEE Trans. Artif. Intell. 5(3): 1302-1315 (2024)
[j208]Qiyi Yao
, Weiming Zhang
, Kejiang Chen
, Nenghai Yu
:
LDGM Codes-Based Near-Optimal Coding for Adaptive Steganography. IEEE Trans. Commun. 72(4): 2138-2151 (2024)
[j207]Jiansong Zhang
, Kejiang Chen
, Chuan Qin
, Weiming Zhang
, Nenghai Yu
:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. IEEE Trans. Dependable Secur. Comput. 21(4): 3515-3527 (2024)
[j206]Jiansong Zhang
, Kejiang Chen
, Weixiang Li
, Weiming Zhang
, Nenghai Yu
:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3994-4005 (2024)
[j205]Tianxiang Chen
, Zhentao Tan
, Tao Gong, Qi Chu
, Bin Liu
, Nenghai Yu
:
Feature Preservation and Shape Cues Assist Infrared Small Target Detection. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024)
[j204]Tianxiang Chen
, Zi Ye
, Zhentao Tan
, Tao Gong
, Yue Wu, Qi Chu
, Bin Liu
, Nenghai Yu
, Jieping Ye
:
MiM-ISTD: Mamba-in-Mamba for Efficient Infrared Small-Target Detection. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024)
[j203]Xin Zhang, Kejiang Chen
, Jinyang Ding
, Yuqi Yang, Weiming Zhang
, Nenghai Yu
:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. IEEE Trans. Inf. Forensics Secur. 19: 3148-3163 (2024)
[j202]Kai Zeng
, Kejiang Chen
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Toward Secure and Robust Steganography for Black-Box Generated Images. IEEE Trans. Inf. Forensics Secur. 19: 3237-3250 (2024)
[j201]Zexin Fan
, Kejiang Chen
, Kai Zeng
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. IEEE Trans. Inf. Forensics Secur. 19: 6636-6649 (2024)
[j200]Jiawei Zhao
, Kejiang Chen
, Xiaojian Yuan, Yuang Qi, Weiming Zhang
, Nenghai Yu
:
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models. IEEE Trans. Inf. Forensics Secur. 19: 8600-8615 (2024)
[j199]Zhentao Tan
, Yue Wu, Qiankun Liu
, Qi Chu
, Le Lu, Jieping Ye, Nenghai Yu
:
Exploring the Application of Large-Scale Pre-Trained Models on Adverse Weather Removal. IEEE Trans. Image Process. 33: 1683-1698 (2024)
[j198]Qidong Huang
, Xiaoyi Dong
, Dongdong Chen
, Hang Zhou
, Weiming Zhang
, Kui Zhang, Gang Hua
, Yueqiang Cheng, Nenghai Yu
:
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition. IEEE Trans. Image Process. 33: 2183-2196 (2024)
[j197]Zhiwen Ren
, Han Fang
, Jie Zhang
, Zehua Ma
, Ronghao Lin
, Weiming Zhang
, Nenghai Yu
:
A Robust Database Watermarking Scheme That Preserves Statistical Characteristics. IEEE Trans. Knowl. Data Eng. 36(6): 2329-2342 (2024)
[j196]Zhiwei Zhao
, Bin Liu
, Yan Lu
, Qi Chu
, Nenghai Yu
, Chang Wen Chen
:
Joint Identity-Aware Mixstyle and Graph-Enhanced Prototype for Clothes-Changing Person Re-Identification. IEEE Trans. Multim. 26: 3457-3468 (2024)
[j195]Zijin Yang
, Kejiang Chen
, Kai Zeng
, Weiming Zhang
, Nenghai Yu
:
Provably Secure Robust Image Steganography. IEEE Trans. Multim. 26: 5040-5053 (2024)
[j194]Zhaoying Wang
, Jian Li
, Kaiping Xue
, David S. L. Wei
, Ruidong Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks. IEEE Trans. Netw. Sci. Eng. 11(1): 380-391 (2024)
[j193]Zhonghui Li
, Jian Li
, Kaiping Xue
, David S. L. Wei
, Nenghai Yu
, Qibin Sun
, Jun Lu:
Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method. IEEE Trans. Netw. Serv. Manag. 21(1): 249-265 (2024)
[j192]Lutong Chen
, Kaiping Xue
, Jian Li, Ruidong Li
, Nenghai Yu
, Qibin Sun
, Jun Lu
:
Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks. IEEE/ACM Trans. Netw. 32(1): 368-381 (2024)
[c334]Tianxiang Chen, Zhentao Tan, Qi Chu, Yue Wu, Bin Liu, Nenghai Yu:
TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection. AAAI 2024: 1201-1209
[c333]Guanjie Wang, Zehua Ma, Chang Liu
, Xi Yang, Han Fang, Weiming Zhang, Nenghai Yu:
MuST: Robust Image Watermarking for Multi-Source Tracing. AAAI 2024: 5364-5371
[c332]Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu:
Data-Free Hard-Label Robustness Stealing Attack. AAAI 2024: 6853-6861
[c331]Yaqi Zhang, Di Huang, Bin Liu, Shixiang Tang, Yan Lu
, Lu Chen, Lei Bai, Qi Chu, Nenghai Yu, Wanli Ouyang
:
MotionGPT: Finetuned LLMs Are General-Purpose Motion Generators. AAAI 2024: 7368-7376
[c330]Zhongyi Zhang
, Tianyi Wei, Wenbo Zhou, Hanqing Zhao, Weiming Zhang, Nenghai Yu:
FaceRSA: RSA-Aware Facial Identity Cryptography Framework. AAAI 2024: 7423-7431
[c329]Zhiwei Zhao, Bin Liu, Yan Lu
, Qi Chu, Nenghai Yu:
Unifying Multi-Modal Uncertainty Modeling and Semantic Alignment for Text-to-Image Person Re-identification. AAAI 2024: 7534-7542
[c328]Benlong Wu
, Kejiang Chen
, Yanru He
, Guoqiang Chen
, Weiming Zhang
, Nenghai Yu
:
CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation. ACM TUR-C 2024
[c327]Chi Zhang
, Wenbo Zhou
, Kui Zhang
, Jie Zhang
, Weiming Zhang
, Nenghai Yu
:
Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency. ACM TUR-C 2024
[c326]Deng Zhijian
, Wenbo Zhou
, Kunlin Liu
, Weiming Zhang
, Nenghai Yu
:
Temporal Optimization for Face Swapping Video based on Consistency Inheritance. ACM TUR-C 2024
[c325]Kunsheng Tang
, Wenbo Zhou
, Jie Zhang
, Aishan Liu
, Gelei Deng
, Shuai Li
, Peigui Qi
, Weiming Zhang
, Tianwei Zhang
, Nenghai Yu
:
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. CCS 2024: 1196-1210
[c324]Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Weiming Zhang, Nenghai Yu:
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models. CVPR 2024: 12162-12171
[c323]Dianmo Sheng
, Dongdong Chen, Zhentao Tan, Qiankun Liu, Qi Chu, Jianmin Bao, Tao Gong, Bin Liu, Shengwei Xu, Nenghai Yu:
Towards More Unified In-Context Visual Understanding. CVPR 2024: 13362-13372
[c322]Qidong Huang, Xiaoyi Dong, Pan Zhang, Bin Wang, Conghui He, Jiaqi Wang
, Dahua Lin, Weiming Zhang, Nenghai Yu:
OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation. CVPR 2024: 13418-13427
[c321]Linfeng Ma
, Han Fang
, Tianyi Wei
, Zijin Yang
, Zehua Ma
, Weiming Zhang
, Nenghai Yu
:
A Geometric Distortion Immunized Deep Watermarking Framework with Robustness Generalizability. ECCV (67) 2024: 268-285
[c320]Ruihang Li, Yixuan Wei, Miaosen Zhang, Nenghai Yu, Han Hu, Houwen Peng:
ScalingFilter: Assessing Data Quality through Inverse Utilization of Scaling Laws. EMNLP 2024: 3209-3222
[c319]


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID