default search action
Pengpeng Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Xin Li, Rongrong Ni, Pengpeng Yang, Zhiqiang Fu, Yao Zhao:
Artifacts-Disentangled Adversarial Learning for Deepfake Detection. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1658-1670 (2023) - 2022
- [j10]Sani M. Abdullahi, Shuifa Sun, Yifei Wang, Pengpeng Yang, HuaZheng Wang, Beng Wang:
A hybrid BTP approach with filtered BCH codes for improved performance and security. J. Inf. Secur. Appl. 71: 103355 (2022) - 2021
- [j9]Pengpeng Yang:
Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics. Entropy 23(10): 1318 (2021) - [j8]Hao Zou, Pengpeng Yang, Rongrong Ni, Yao Zhao:
Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network. Secur. Commun. Networks 2021: 6663486:1-6663486:8 (2021) - [i6]Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva:
Efficient video integrity analysis through container characterization. CoRR abs/2101.10795 (2021) - 2020
- [j7]Pengpeng Yang, Jing Wang, Hongling Zhao, Runzhi Li:
MLP With Riemannian Covariance for Motor Imagery Based EEG Analysis. IEEE Access 8: 139974-139982 (2020) - [j6]Pengpeng Yang, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, Alessandro Piva:
A Survey of Deep Learning-Based Source Image Forensics. J. Imaging 6(3): 9 (2020) - [j5]Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva:
Efficient Video Integrity Analysis Through Container Characterization. IEEE J. Sel. Top. Signal Process. 14(5): 947-954 (2020)
2010 – 2019
- 2019
- [j4]Pengpeng Yang, Rongrong Ni, Yao Zhao, Wei Zhao:
Source camera identification based on content-adaptive fusion residual networks. Pattern Recognit. Lett. 119: 195-204 (2019) - [i5]Pengpeng Yang, Rongrong Ni, Yao Zhao, Gang Cao, Wei Zhao:
Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics. CoRR abs/1910.07992 (2019) - 2018
- [j3]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu:
Security Consideration for Deep Learning-Based Image Forensics. IEICE Trans. Inf. Syst. 101-D(12): 3263-3266 (2018) - [j2]Omar Al Shaya, Pengpeng Yang, Rongrong Ni, Yao Zhao, Alessandro Piva:
A New Dataset for Source Identification of High Dynamic Range Images. Sensors 18(11): 3801 (2018) - [c7]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain. APSIPA 2018: 728-732 - [c6]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li:
Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine. IWDW 2018: 83-92 - [i4]Pengpeng Yang, Rongrong Ni, Yao Zhao, Gang Cao, Haorui Wu, Wei Zhao:
Robust Contrast Enhancement Forensics Using Convolutional Neural Networks. CoRR abs/1803.04749 (2018) - [i3]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu:
Security Consideration For Deep Learning-Based Image Forensics. CoRR abs/1803.11157 (2018) - [i2]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain. CoRR abs/1806.01571 (2018) - 2017
- [j1]Jun Yang, Pengpeng Yang, Ziyue Wang, Jianbin Li:
Enhanced secure low-level reader protocol based on session key update mechanism for RFID in IoT. Int. J. Web Grid Serv. 13(2): 207-227 (2017) - [c5]Jun Yang, Pengpeng Yang, Xiaohui Jin, Qian Ma:
Multi-Classification for Malicious URL Based on Improved Semi-Supervised Algorithm. CSE/EUC (1) 2017: 143-150 - [c4]Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao:
Recaptured Image Forensics Based on Quality Aware and Histogram Feature. IWDW 2017: 31-41 - [i1]Pengpeng Yang, Wei Zhao, Rongrong Ni, Yao Zhao:
Source Camera Identification Based On Content-Adaptive Fusion Network. CoRR abs/1703.04856 (2017) - 2016
- [c3]Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui:
An Attack Detection System for Multiple Web Applications Based on Big Data Platform. BWCCA 2016: 371-376 - [c2]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Recapture Image Forensics Based on Laplacian Convolutional Neural Networks. IWDW 2016: 119-128 - 2015
- [c1]Pengpeng Yang, Baojiang Cui, Ziyue Wang, Xiaobing Liang, Yilun Fu:
Study on Security Protocol Analysis and Design Technology for RFID System. 3PGCIC 2015: 416-419
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint