default search action
Shunquan Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Israr Hussain, Shunquan Tan, Jiwu Huang:
A semi-supervised deep learning approach for cropped image detection. Expert Syst. Appl. 243: 122832 (2024) - [j40]Israr Hussain, Shunquan Tan, Jiwu Huang:
A knowledge distillation based deep learning framework for cropped images detection in spatial domain. Signal Process. Image Commun. 124: 117117 (2024) - [j39]Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang:
Enhanced Dynamic Analysis for Malware Detection With Gradient Attack. IEEE Signal Process. Lett. 31: 2825-2829 (2024) - [j38]Rongxuan Peng, Shunquan Tan, Xianbo Mo, Bin Li, Jiwu Huang:
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization. IEEE Trans. Inf. Forensics Secur. 19: 4820-4834 (2024) - [j37]Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
Hiding Face Into Background: A Proactive Countermeasure Against Malicious Face Swapping. IEEE Trans. Ind. Informatics 20(8): 10613-10623 (2024) - [c22]Zhuofan Yang, Qiushi Li, Shenghai Luo, Shunquan Tan, Bin Li:
Improving VGG-Style Convnet for JPEG Steganalysis. ICASSP 2024: 4450-4454 - [c21]Rongxuan Peng, Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models. ICASSP 2024: 12846-12850 - [c20]Yang Su, Shunquan Tan, Jiwu Huang:
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model. IH&MMSec 2024: 149-158 - [c19]Miaoxin Ye, Saixing Zhou, Weiqi Luo, Shunquan Tan, Jiwu Huang:
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security. ACM Multimedia 2024: 7046-7054 - 2023
- [j36]Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. J. Inf. Secur. Appl. 75: 103515 (2023) - [j35]Yucheng Guan, Shunquan Tan, Qifen Li:
Binary steganography based on generative adversarial nets. Multim. Tools Appl. 82(5): 6687-6706 (2023) - [j34]Han Chen, Yuzhen Lin, Bin Li, Shunquan Tan:
Learning Features of Intra-Consistency and Inter-Diversity: Keys Toward Generalizable Deepfake Detection. IEEE Trans. Circuits Syst. Video Technol. 33(3): 1468-1480 (2023) - [j33]Guanglin Li, Bin Li, Shunquan Tan, Guoping Qiu:
Learning Deep Co-Occurrence Features. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1610-1623 (2023) - [j32]Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang:
STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition. IEEE Trans. Dependable Secur. Comput. 20(3): 2657-2673 (2023) - [j31]Xianbo Mo, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. IEEE Trans. Inf. Forensics Secur. 18: 1524-1538 (2023) - [c18]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning. CCS 2023: 3552-3554 - [i14]Long Zhuo, Shenghai Luo, Shunquan Tan, Han Chen, Bin Li, Jiwu Huang:
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization. CoRR abs/2310.10036 (2023) - [i13]Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang:
Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4. CoRR abs/2312.08317 (2023) - 2022
- [j30]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
ISP-GAN: inception sub-pixel deconvolution-based lightweight GANs for colorization. Multim. Tools Appl. 81(17): 24977-24994 (2022) - [j29]Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang:
Hybrid deep-learning framework for object-based forgery detection in video. Signal Process. Image Commun. 105: 116695 (2022) - [j28]Qiushi Li, Shengda Chen, Shunquan Tan, Bin Li, Jiwu Huang:
One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model. IEEE Trans. Circuits Syst. Video Technol. 32(4): 2496-2500 (2022) - [j27]Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang:
Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5110-5123 (2022) - [j26]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. IEEE Trans. Inf. Forensics Secur. 17: 819-834 (2022) - [j25]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. IEEE Trans. Inf. Forensics Secur. 17: 3022-3036 (2022) - [c17]Guanglin Li, Bin Li, Changsheng Chen, Shunquan Tan, Guoping Qiu:
Learning General Gaussian Mixture Model with Integral Cosine Similarity. IJCAI 2022: 3201-3207 - [d1]Shunquan Tan:
CALPA-NET. IEEE DataPort, 2022 - [i12]Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang:
STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition. CoRR abs/2206.05651 (2022) - 2021
- [j24]Israr Hussain, Shunquan Tan, Bin Li, Xinghong Qin, Dostdar Hussain, Jiwu Huang:
A novel deep learning framework for double JPEG compression detection of small size blocks. J. Vis. Commun. Image Represent. 80: 103269 (2021) - [j23]Baoying Chen, Shunquan Tan:
FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection. Secur. Commun. Networks 2021: 9942754:1-9942754:8 (2021) - [j22]Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang:
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images. IEEE Trans. Inf. Forensics Secur. 16: 131-146 (2021) - [j21]Peiyu Zhuang, Haodong Li, Shunquan Tan, Bin Li, Jiwu Huang:
Image Tampering Localization Using a Dense Fully Convolutional Network. IEEE Trans. Inf. Forensics Secur. 16: 2986-2999 (2021) - [j20]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography. IEEE Trans. Inf. Forensics Secur. 16: 4306-4320 (2021) - [c16]Xinghong Qin, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image. ICASSP 2021: 2705-2709 - [i11]Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang:
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image. CoRR abs/2101.05209 (2021) - [i10]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography. CoRR abs/2103.13689 (2021) - [i9]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization. CoRR abs/2107.02434 (2021) - [i8]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image based on Channel Representation. CoRR abs/2111.12231 (2021) - 2020
- [j19]Israr Hussain, Jishen Zeng, Xinhong, Shunquan Tan:
A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis. KSII Trans. Internet Inf. Syst. 14(3): 1228-1248 (2020) - [j18]Ziling Zhou, Shunquan Tan, Jishen Zeng, Han Chen, Shaobin Hong:
Ensemble Deep Learning Features for Real-World Image Steganalysis. KSII Trans. Internet Inf. Syst. 14(11): 4557-4572 (2020) - [j17]Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang:
Identification of deep network generated images using disparities in color components. Signal Process. 174: 107616 (2020)
2010 – 2019
- 2019
- [j16]Xinghong Qin, Bin Li, Shunquan Tan, Jishen Zeng:
A Novel Steganography for Spatial Color Images Based on Pixel Vector Cost. IEEE Access 7: 8834-8846 (2019) - [j15]Bin Li, Haoxin Zhang, Hu Luo, Shunquan Tan:
Detecting double JPEG compression and its related anti-forensic operations with CNN. Multim. Tools Appl. 78(7): 8577-8601 (2019) - [j14]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN-Based Adversarial Embedding for Image Steganography. IEEE Trans. Inf. Forensics Secur. 14(8): 2074-2087 (2019) - [j13]Jishen Zeng, Shunquan Tan, Guangqing Liu, Bin Li, Jiwu Huang:
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images. IEEE Trans. Inf. Forensics Secur. 14(10): 2735-2748 (2019) - [c15]Qiushi Li, Zilong Shao, Shunquan Tan, Jishen Zeng, Bin Li:
Non-structured Pruning for Deep-learning based Steganalytic Frameworks. APSIPA 2019: 1735-1739 - [i7]Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang:
CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images. CoRR abs/1911.04657 (2019) - 2018
- [j12]Bo Wang, Jianfeng Yin, Shunquan Tan, Yabin Li, Ming Li:
Source camera model identification based on convolutional neural networks with local binary patterns coding. Signal Process. Image Commun. 68: 162-168 (2018) - [j11]Bin Li, Weihang Wei, Anselmo Ferreira, Shunquan Tan:
ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis. IEEE Signal Process. Lett. 25(5): 650-654 (2018) - [j10]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. IEEE Trans. Inf. Forensics Secur. 13(5): 1200-1214 (2018) - [j9]Bin Li, Zhongpeng Li, Shijun Zhou, Shunquan Tan, Xiaoling Zhang:
New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator. IEEE Trans. Inf. Forensics Secur. 13(5): 1242-1257 (2018) - [c14]Haodong Li, Han Chen, Bin Li, Shunquan Tan:
Can Forensic Detectors Identify GAN Generated Images? APSIPA 2018: 722-727 - [c13]Long Zhuo, Shunquan Tan, Jishen Zeng, Bin Li:
Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework. APSIPA 2018: 733-736 - [c12]Hongrun Zhang, Bin Li, Shunquan Tan:
A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions. ICCCS (2) 2018: 460-471 - [c11]Shijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li:
Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information. IWDW 2018: 261-274 - [c10]Yuankun Huang, Shunquan Tan, Bin Li, Jiwu Huang:
VPCID - A VoIP Phone Call Identification Database. IWDW 2018: 307-321 - [c9]Xiancheng Wu, Shunquan Tan:
An Optimization Strategy for Improving Security in Steganography. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1461-1466 - [i6]Jishen Zeng, Shunquan Tan, Guangqing Liu, Bin Li, Jiwu Huang:
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images. CoRR abs/1803.04805 (2018) - [i5]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography. CoRR abs/1803.09043 (2018) - [i4]Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang:
Detection of Deep Network Generated Images Using Disparities in Color Components. CoRR abs/1808.07276 (2018) - 2017
- [j8]Weixuan Tang, Shunquan Tan, Bin Li, Jiwu Huang:
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Process. Lett. 24(10): 1547-1551 (2017) - [j7]Shunquan Tan, Haojie Zhang, Bin Li, Jiwu Huang:
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography. IEEE Trans. Inf. Forensics Secur. 12(7): 1658-1670 (2017) - [c8]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis. Media Watermarking, Security, and Forensics 2017: 44-49 - [i3]Bin Li, Hu Luo, Haoxin Zhang, Shunquan Tan, Zhongzhou Ji:
A multi-branch convolutional neural network for detecting double JPEG compression. CoRR abs/1710.05477 (2017) - 2016
- [j6]Shengda Chen, Shunquan Tan, Bin Li, Jiwu Huang:
Automatic Detection of Object-Based Forgery in Advanced Video. IEEE Trans. Circuits Syst. Video Technol. 26(11): 2138-2151 (2016) - [i2]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Large-scale JPEG steganalysis using hybrid deep-learning framework. CoRR abs/1611.03233 (2016) - 2015
- [j5]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis. IEEE Trans. Inf. Forensics Secur. 10(3): 558-573 (2015) - [j4]Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang:
A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 10(9): 1905-1917 (2015) - [j3]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation. IEEE Trans. Image Process. 24(5): 1471-1484 (2015) - [c7]Shunquan Tan, Shengda Chen, Bin Li:
GOP based automatic detection of object-based forgery in advanced video. APSIPA 2015: 719-722 - 2014
- [j2]Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang:
Investigation on Cost Assignment in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 9(8): 1264-1277 (2014) - [c6]Shunquan Tan, Bin Li:
Stacked convolutional auto-encoders for steganalysis of digital images. APSIPA 2014: 1-4 - [i1]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
JPEG Noises beyond the First Compression Cycle. CoRR abs/1405.7571 (2014) - 2012
- [j1]Shunquan Tan, Bin Li:
Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting. IEEE Signal Process. Lett. 19(6): 336-339 (2012) - [c5]Shunquan Tan, Bin Li:
Targeted steganalysis of adaptive pixel-value differencing steganography. ICIP 2012: 1129-1132 - 2011
- [c4]Shunquan Tan:
Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions. IWDW 2011: 16-29
2000 – 2009
- 2007
- [c3]Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. IWDW 2007: 112-126 - [c2]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157 - 2006
- [c1]Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi:
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP 2006: 101-104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint