Author

Weiming Zhang

University of Science and Technology of China - Cited by 9,509 - information hiding - AI Security - steganography

Biography

Weiming Zhang is currently working in the Department of Nephrology at Renji Hospital in China.Weiming international experience includes various programs, contributions and participation in different countries for diverse fields of study.  Weiming   research interests reflect wide range of publications  
Title
Cited by
Year
Peco: Perceptual codebook for bert pre-training of vision transformers
X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N Yu, ...Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 552-560, 2023202
50
2023
Maskclip: Masked self-distillation advances contrastive language-image pretraining
X Dong, J Bao, Y Zheng, T Zhang, D Chen, H Yang, M Zeng, W Zhang, ...Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023202
29
2023
Bootstrapped masked autoencoders for vision BERT pretraining
X Dong, J Bao, T Zhang, D Chen, W Zhang, L Yuan, D Chen, F Wen, N YuEuropean Conference on Computer Vision, 247-264, 2022202
21
2022
Poison ink: Robust and invisible backdoor attack
J Zhang, C Dongdong, Q Huang, J Liao, W Zhang, H Feng, G Hua, N YuIEEE Transactions on Image Processing 31, 5691-5705, 222
20
2022
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network
H Fang, Z Jia, Z Ma, EC Chang, W ZhangProceedings of the 30th ACM International Conference on Multimedia, 226-225, 2022202
7
2022
CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet
CLIP Itself is a Strong Fine-tuner: Achieving 8.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNetX Dong, J Bao, T Zhang, D Chen, S Gu, W Zhang, L Yuan, D Chen, F Wen, ...arXiv preprint arXiv:2212.06138, 2022202
5
2022
Deep 3D mesh watermarking with self-adaptive robustness
F Wang, H Zhou, H Fang, W Zhang, N YuCybersecurity 5 (1), 1-1, 2022202
4
2022
Unauthorized AI cannot recognize me: Reversible adversarial example
J Liu, W Zhang, K Fukuchi, Y Akimoto, J SakumaPattern Recognition 134, 109048, 20233202
3
2023
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
H Chen, H Zhou, J Zhang, D Chen, W Zhang, K Chen, G Hua, N YuACM Transactions on Multimedia Computing, Communications and Applications 19 …, 20220
3
2023
Diversity-Aware Meta Visual Prompting
Q Huang, X Dong, D Chen, W Zhang, F Wang, G Hua, N YuProceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 030
2
2023
DeAR: A deep-learning-based audio re-recording resilient watermarking
C Liu, J Zhang, H Fang, Z Ma, W Zhang, N YuProceedings of the AAAI Conference on Artificial Intelligence 37 (11), 1301 …, 030
2
2023
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code
K Chen, Q Guan, W Zhang, N YuIEEE Transactions on Dependable and Secure Computing, 0
2
2022
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography
Q Guan, P Liu, W Zhang, W Lu, X ZhangIEEE Transactions on Information Forensics and Security 18, 501-516, 0
2
2022
Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion
K Zhang, H Zhou, J Zhang, Q Huang, W Zhang, N YuarXiv preprint arXiv:11.1647, 0
2
2022
No-reference Quality Assessment for Contrast-distorted Images Based on Gray and Color-gray-difference Space
Y Yang, Y Ding, M Cheng, W ZhangACM Transactions on Multimedia Computing, Communications and Applications 9 …, 2023202
1
2023
Language universal font watermarking with multiple cross-media robustness
X Yang, W Zhang, H Fang, Z Ma, N YuSignal Processing 203, 0879, 2023202
1
2023
Triangle Mesh Watermarking and Steganography
H Zhou, K Chen, Z Ma, F Wang, W ZhangSpringer Nature, 2023202
1
2023
Watermarking Text Generated by Black-Box Language Models
X Yang, K Chen, W Zhang, C Liu, Y Qi, J Zhang, H Fang, N YuarXiv preprint arXiv:2305.08883, 2023202
1
2023
空域频域相结合的唇型篡改检测方法
林佳滢, 周文柏, 张卫明, 俞能海网络与信息安全学报 8 (6), 46-55, 2022202
1
2022
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
X Yuan, K Chen, J Zhang, W Zhang, N Yu, Y ZhangarXiv preprint arXiv:2302.0984, 2023202
1
2023