代表性论文或专著 1. X. Fu, G. Zhu, H. Zhang, X. Zhang, Athanasios V. Vasilakos, Multi-level Feature Fusion Network for Shadow Removal Detection. IEEE Transactions on Circuits and Systems for Video Technology (2025). 2. J. Jiang, Z. Wang, X. Zhang, Image-to-Image Steganography based on multimodal generative model. Signal Processing 238 (2026): 110106. 3. J. Jiang, Z. Wang, Z. Yuan, X. Zhang, Generative Image Steganography Based on Text-to-Image Multimodal Generative Model. IEEE Transactions on Circuits and Systems for Video Technology (2025). 4. L. Huang, C. Qin, G. Feng, X. Zhang, Neural Network Watermarking with Hierarchical Recoverability. IEEE Transactions on Dependable and Secure Computing (2025). 5. H. Tian, Y. Qiu, H. Li, X. Zhang, Athanasios V. Vasilakos, Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge. IEEE Transactions on Dependable and Secure Computing (2025). 6. C. Yu, X. Zhang, G. Li, P. Liu, X. Zhang, Z. Tang Reversible data hiding in encrypted images with secret sharing and multivariate linear equation. IEEE Transactions on Dependable and Secure Computing (2025). 7. Y. Ren, Z. Yang, G. Feng, X. Zhang, PurifyFL: Non-Interactive Privacy-Preserving Federated Learning Against Poisoning Attacks Based on Single Server. IEEE Transactions on Emerging Topics in Computational Intelligence (2025). 8. Y. Xu, H. Cheng, J. Li, X. Liu, X. Zhang, M. Wang, Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. IEEE Transactions on Information Forensics and Security (2025). 9. Y. Xu, H. Cheng, X. Liu, C. Jiang, X. Zhang and M. Wang, PCSE: Privacy-preserving collaborative searchable encryption for group data sharing in cloud computing. IEEE Transactions on Mobile Computing (2025). 10. P. Kong, A. Li, D. Guo, L. Zhou, C. Qin, X. Zhang, Privacy-preserving Image Inpainting Using Markov Random Field Modeling. IEEE Transactions on Multimedia (2025). 11. F. Li, Q. Wang, H. Cheng, X. Zhang, C.Qin, JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification. IEEE Transactions on Multimedia (2025). 12. H. Luo, L. Li, and X. Zhang. Secure Neural Network Watermarking Protocol Against Evidence Exposure Attack, IEEE Transactions on Multimedia (2025). 13. F. Li, H. Liu, X. Zhang, C. Qin, StegFlow: Flow-Based High-Frequency Distribution Mapping Network for Multi-Image Steganography. IEEE Transactions on Multimedia (2025). 14. G. He, Y. Ren, J. Zhao, G. Feng, X. Zhang, EPCNN: Efficient and Practical Privacy-Preserving Convolutional Neural Network Inference. IEEE Transactions on Network Science and Engineering (2025). 15. L. Huang, C. Qin, G. Feng, X. Luo, X. Zhang, New Framework of Robust Image Encryption. ACM Transactions on Multimedia Computing, Communications and Applications 21.3 (2025): 1-22. 16. Z. Yuan, L. Li, Z. Wang, X. Zhang, Integrity Protection of Generative Adversarial Networks Using Fragile Watermarking. ACM Transactions on Multimedia Computing, Communications and Applications (2025). 17. S. Xie, T. Qiao, S. Li, X. Zhang, J. Zhou, G. Feng, DeepFake detection in the AIGC era: A survey, benchmarks, and future perspectives. Information Fusion (2025): 103740. 18. Q. Jiang, S. Fan, Z. Zhu, Z. Hou, W. Zhong, L. Tan, Z. Qian and X. Zhang, Adversarial attacks on industrial soft sensors: Multi-target attacks based on diffusion models. Information Sciences (2025): 122732. 19. Jiang, Q., Zu, Y., Zhu, Z., Zhong, W., Xu, Y., Qian, Z. and Zhang, X, Dynamic stealthy backdoor attack against anomaly detectors in industrial control systems. Information Sciences (2025): 123066. 20. J. Hu, L. Li, H. Wu, H. Luo, X. Zhang, Dormant key: Unlocking universal adversarial control in text-to-image models. Neural Networks (2025): 108065. 21. G. He, Y. Ren, G. He, G. Feng, X. Zhang, Privacy-preserving federated graph neural network against poisoning attack. Signal Processing (2025): 110214. 22. G. Liu, X. Liang, X. Hu, Y. Si, X. Zhang and Z. Qian, ScreenGuard: A Screen-targeted Watermarking Scheme Against Arbitrary Screenshot, IEEE Trans. on Multimedia, vol. 27, pp. 8381-8392, 2025. 23. Q. Zhou, P. Wei, Z. Qian, X. Zhang, S. Li and C. Qin, Conditional Flow-Based Generative Steganography, IEEE Trans. on Dependable and Secure Computing, vol. 22, no. 5, pp. 5632-5647, 2025. 24. L. Ying, C. Xiong, C. Qin, X. Luo, Z. Qian and X. Zhang, Generative Collision Attack on Deep Image Hashing, IEEE Trans. on Information Forensics and Security, vol. 20, pp. 2748-2762, 2025. 25. Q. Zhou, P. Wei, Z. Qian, X. Zhang and S. Li, Improved Generative Steganography Based on Diffusion Model, IEEE Trans. on Circuits and Systems for Video Technology, vol. 35, no. 7, pp. 6494-6507, 2025. 26. Y. Wang, G. Liu, Z. Zhu, X. Zhang and Z. Qian, VivID: A Visually Improved GIF Encoding Network Design, IEEE Trans. on Circuits and Systems for Video Technology, vol. 35, no. 6, pp. 6101-6113, 2025. 27. M. Wang, S. Li, X. Zhang, G. Feng, Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions. Computer Science Review 58 (2025): 100785. 28. L. Huang, F. Li, H. Yao, C. Qin, X. Zhang, Soft integrity authentication for neural network models. Expert Systems with Applications 267 (2025): 126172. 29. Y. Zhang, C. Huang, S. Liu, L. Huang, T. Yang, X. Zhang, H. Zhou, Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain. International Journal of Network Management 35.1 (2025): e2278. 30. Y. Hao, Z. Wang, J. Cao and X. Zhang, General Steganography for Neural Network Models Based on Graph Convolutional Network, in IEEE Internet of Things Journal, vol. 12, no. 9, pp. 12512-12526, 1 May1, 2025. 31. L. Li, X. Zhang, H. Wu, G. Feng and W. Zhang, FareMark: Model-Watermark-Driven Free-Rider Detection in Federated Learning Model, in IEEE Internet of Things Journal, vol. 12, no. 18, pp. 38965-38977, 15 Sept.15, 2025. 32. L. Li, X. Zhang, G. Feng, Z. Wang, D. Wu, H. Wu, Robust watermarking for diffusion models based on STDM and latent space fine-tuning. Journal of Information Security and Applications 93 (2025): 104167. 33. Z. Tu, Z. Wang, and X. Zhang. Feature augmentation-based few-shot image steganalysis. Journal of Electronic Imaging 34.3 (2025): 033028-033028. 34. Y. Qin, X. Zhang, S. Yu, G. Feng, A survey on representation learning for multi-view data." Neural Networks 181 (2025): 106842. 35. G. He, Y. Ren, G. Li, G. Feng, X. Zhang, Private image synthesis of latent diffusion model with the ciphertext of prompt. Neural Networks (2025): 107678. 36. Y. Zeng, X. Zhang, G. Feng, "Secure reversible privacy protection for face multiple attribute editing." Pattern Recognition 166 (2025): 111662. 37. Z. Yuan, L. Li, Z. Wang, X. Zhang, Protecting copyright of stable diffusion models from ambiguity attacks. Signal Processing 227 (2025): 109722. 38. F. Li, Q. Wang, X. Zhang, C. Qin, Adaptive three-dimensional histogram modification for JPEG reversible data hiding. Signal Processing 229 (2025): 109786. 39. S. Li, X. Zhang, X. Zhang and G. Feng, Blind Embedding Rate Steganalysis Using Refocusing Learning, IEEE Signal Processing Letters, vol. 32, pp. 666-670, 2025. 40. Z. Wang, X. Zhang and X. Li, Untraceable Steganography: Towards the Anonymity of Steganographer, IEEE Signal Processing Letters, vol. 32, pp. 956-960, 2025. 41. J. Jiang, Z. Wang, G. He and X. Zhang, A Burn After Reading Data Hiding Framework, IEEE Signal Processing Letters, vol. 32, pp. 1131-1135, 2025. 42. Z. Yuan, L. Li, Z. Wang, J. Jiang and X. Zhang, Watermark Removal Attack Against Text-to-Image Generative Model Watermarking, IEEE Signal Processing Letters, vol. 32, pp. 1470-1474, 2025. 43. H. Song, Z. Wang and X. Zhang, Defending Against Adversarial Attack Through Generative Adversarial Networks, IEEE Signal Processing Letters, vol. 32, pp. 1730-1734, 2025. 44. H. Luo, L. Li and X. Zhang, A Watermark Forgery Attack Against Stable Diffusion Model Watermarking, IEEE Signal Processing Letters, vol. 32, pp. 3580-3584, 2025. 45. R. Zhao, Y. Zhang, W. Wen, X. Zhang, X. Cao, Y. Xiang, "PR3: Reversible and usability-enhanced visual privacy protection via thumbnail preservation and data hiding." IEEE Transactions on Big Data 11.1 (2024): 59-73. 46. Y. Huo, S. Xiang, X. Luo, X. Zhang, Image semantic steganography: A way to hide information in semantic communication. IEEE Transactions on Circuits and Systems for Video Technology (2024). 47. Y. Ren, Y. Li, G. Feng, X. Zhang, VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server. IEEE Transactions on Services Computing (2024). 48. Z. Yuan, X. Zhang, Z. Wang, Z. Yin, Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Systems with Applications 236 (2024): 121315. 49. M. Mo, C. Wang, Q. Guo, S. Bian, Q. Huang, X. Zhang, A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Systems with Applications 252 (2024): 124201. 50. Y. Luo, S. Li, X. Zhang, G. Feng, Controlling the performance of deep neural networks using a single parameter. Evolutionary Intelligence 17.5 (2024): 4303-4313. 51. M. Yu, Z. Tang, X. Liang, X. Zhang and X. Zhang, Perceptual Hashing With Deep and Texture Features, IEEE MultiMedia, vol. 31, no. 1, pp. 65-75, Jan.-March 2024. 52. X. Zhao, H. Wu and X. Zhang. Effective backdoor attack on graph neural networks in spectral domain. IEEE Internet of Things Journal 11.7 (2023): 12102-12114. 53. Y. Liu, L. Zhang, H. Wu, Z. Wang, X. Zhang, Reducing high-frequency artifacts for generative model watermarking via wavelet transform. IEEE Internet of Things Journal 11.10 (2024): 18503-18515. 54. Z. Yuan, L. Li, Z. Wang, X. Zhang, Watermarking for stable diffusion models. IEEE Internet of Things Journal (2024). 55. N. Zhong, Z. Qian and X. Zhang. Backdoor attack detection via prediction trustworthiness assessment. Information Sciences 662 (2024): 120283. 56. Y. Ren, M. Hu, Z. Yang, G. Feng, X. Zhang, BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Information sciences 665 (2024): 120377. 57. M. Bian, Y. Ren, G. He, G. Feng, X. Zhang, VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Information Sciences 669 (2024): 120547. 58. Y. Liu, C. Li, Z. Wang, H. Wu, X. Zhang, Transferable adversarial attack based on sensitive perturbation analysis in frequency domain. Information Sciences 678 (2024): 120971. 59. Z. Yang, Y. Zhang, X. Zhang, H. Wu, Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing, Journal of Electronic Imaging 33.2 (2024): 023006-023006. 60. H. Song, Z. Wang, and X. Zhang. Identification of the Original Images. Journal of Visual Communication and Image Representation 98 (2024): 104017. 61. Z. Ye, X. Zhang, and G. Feng. Deep neural networks watermark via universal deep hiding and metric learning. Neural Computing and Applications 36.13 (2024): 7421-7438. 62. Y. Wang, M. Liu, Y. Ren, X. Zhang, G. Feng, Traffic sign attack via pinpoint region probability estimation network, Pattern Recognition, Volume 146, 2024. 63. Z. Yuan, L. Li, Z. Wang, X. Zhang, Ambiguity attack against text-to-image diffusion model watermarking, Signal Processing, Volume 221, 2024. 64. L. Huang, Y. Tao, C. Qin and X. Zhang, Robust Hashing for Neural Network Models via Heterogeneous Graph Representation, IEEE Signal Processing Letters, vol. 31, pp. 2640-2644, 2024. 65. H. Cheng, X. Li, H. Wang, X. Zhang, X. Liu, M. Wang, DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 1, pp. 97-109, Jan. 2024. 66. F. Li, Z. Qi, X. Zhang and C. Qin, Progressive Histogram Modification for JPEG Reversible Data Hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 2, pp. 1241-1254, Feb. 2024. 67. W. Li, S. Wu, B. Li, W. Tang and X. Zhang, Payload-Independent Direct Cost Learning for Image Steganography, in IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 3, pp. 1970-1975, March 2024. 68. X. Li, G. Zhu, S. Wang, Y. Zhou and X. Zhang, Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 7, pp. 6391-6402, July 2024. 69. J. Yu, F. Li, Z. Wang, W. Si and X. Zhang, Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 8, pp. 7785-7800, Aug. 2024. 70. D. Wu, X. Zhang, J. Wang, L. Li and G. Feng, Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 10, pp. 10281-10298, Oct. 2024. 71. H. Wang, H. Yao, C. Qin and X. Zhang, When Robust Reversible Watermarking Meets Cropping Attacks, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13282-13296, Dec. 2024. 72. L. Lin, D. Wu, J. Wang, Y. Chen, X. Zhang and H. Wu, Automatic, Robust, and Blind Video Watermarking Resisting Camera Recording, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13413-13426, Dec. 2024. 73. J. Yu, J. Zhang, Z. Wang, F. Li and X. Zhang, Cover Selection in Encrypted Images, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13626-13641, Dec. 2024. 74. T. Yang, H. Wu, B. Yi, G. Feng and X. Zhang, Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 1, pp. 139-152, Jan.-Feb. 2024. 75. F. Li, Z. Yu, K. Wu, C. Qin and X. Zhang, Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 1557-1571, July-Aug. 2024. 76. X. Liang, Z. Tang, X. Zhang, M. Yu and X. Zhang, Robust Hashing With Local Tangent Space Alignment for Image Copy Detection, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2448-2460, July-Aug. 2024. 77. Y. Liu, H. Wu and X. Zhang, Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 6, pp. 5766-5780, Nov.-Dec. 2024. 78. Z. Yuan, X. Zhang, Z. Wang and Z. Yin, Semi-Fragile Neural Network Watermarking Based on Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 8, no. 4, pp. 2775-2790, Aug. 2024. 79. F. Li, Y. Sheng, K. Wu, C. Qin and X. Zhang, LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography, IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8817-8831, 2024. 80. F. Li, H. Zhai, X. Zhang and C. Qin, Image Manipulation Localization Using Spatial–Channel Fusion Excitation and Fine-Grained Feature Enhancement, IEEE Transactions on Instrumentation and Measurement, vol. 73, pp. 1-14, 2024. 81. Y. Qin, C. Qin, X. Zhang and G. Feng, Dual Consensus Anchor Learning for Fast Multi-View Clustering, IEEE Transactions on Image Processing, vol. 33, pp. 5298-5311, 2024. 82. C. Qin, X. Li, Z. Zhang, F. Li, X. Zhang and G. Feng, Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning, IEEE Transactions on Multimedia, vol. 26, pp. 2164-2177, 2024. 83. F. Li, Y. Sheng, X. Zhang and C. Qin, iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography, IEEE Transactions on Multimedia, vol. 26, pp. 3137-3152, 2024. 84. Q. Wang, Z. Wang, X. Zhang and G. Feng, Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network, IEEE Transactions on Multimedia, vol. 26, pp. 8026-8037, 2024. 85. X. Li, Z. Wang, G. Feng, X. Zhang and C. Qin, Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments, IEEE Transactions on Multimedia, vol. 26, pp. 10041-10054, 2024. 86. F. Li, H. Zhai, T. Liu, X. Zhang and C. Qin. 2024. Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network. ACM Trans. Multimedia Comput. Commun. Appl. 20, 10, Article 315 (October 2024), 23 pages. 87. C. Yu, S. Cheng, X. Zhang, X. Zhang and Z. Tang. 2024. Reversible Data Hiding in Shared JPEG Images. ACM Trans. Multimedia Comput. Commun. Appl. 20, 12, Article 372 (December 2024), 24 pages. 88. M. Yu, Z. Tang, X. Liang, X. Zhang, Z. Li and X. Zhang. 2024. Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection. ACM Trans. Multimedia Comput. Commun. Appl. 20, 12, Article 384 (December 2024), 23 pages. 89. Z. Zhu, H. Zhou, H. Hu, Q. Jiang, Z. Qian and X. Zhang, Hide and Recognize Your Privacy Image, IEEE Trans. on Network Science and Engineering, vol. 11, no. 6, pp. 6130-6142, 2024. 90. G. He, Y. Ren, G. He, G. Feng and X. Zhang, PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack, IEEE Transactions on Services Computing, vol. 17, no. 6, pp. 4083-4096, 2024. 91. Y. Zhang, J. Zhu, M. Xue, X. Zhang and X. Cao, Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion, IEEE Trans. on Visualization and Computer Graphics, vol. 30, no. 8, pp. 5299-5312, 2024. 92. X. Hu, S. Li, Q. Ying, W. Peng, X. Zhang and Z. Qian, Establishing Robust Generative Image Steganography via Popular Stable Diffusion, IEEE Trans. on Information Forensics and Security, vol. 19, pp. 8094-8108, 2024. 93. N. Zhong, Z. Qian, X. Zhang. Backdoor attack detection via prediction trustworthiness assessment, Information Sciences, vol. 662, 120283, 2024. 94. Y. Xue, Y. Zhu, Z. Zhu, S. Li, Z. Qian and X. Zhang, Removing Watermarks for Image Processing Networks Via Referenced Subspace Attention, The Computer Journal, vol. 67, issue 2, pp. 498–507, 2024. 95. Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Trans. on Multimedia, vol. 26, pp. 1373-1383, 2024. 96. S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Trans. on Dependable and Secure Computing, 21(1), pp. 340-352, 2024. |