共 61 条
[1]
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:121-140
[2]
Adelani David Ifeoluwa, 2020, Advanced Information Networking and Applications. Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020). Advances in Intelligent Systems and Computing (AISC 1151), P1341, DOI 10.1007/978-3-030-44041-1_114
[4]
Arjovsky M, 2017, PR MACH LEARN RES, V70
[5]
Baluja S, 2017, ADV NEUR IN, V30
[6]
Boehm B., 2014, ARXIV
[7]
Chang C.-C., 2021, SECUR COMMUN NETW, P1
[9]
High-Capacity Robust Image Steganography via Adversarial Network
[J].
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,
2020, 14 (01)
:366-381
[10]
Darvish Rouhani B., 2018, ARXIV