default search action
Ching-Chun Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. Cryptogr. 8(3): 41 (2024) - [j62]Shuying Xu, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Reversible anonymization for privacy of facial biometrics via cyclic learning. EURASIP J. Inf. Secur. 2024(1): 24 (2024) - [j61]Hao Fang, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction. Expert Syst. Appl. 247: 122550 (2024) - [j60]Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering. Future Internet 16(1): 34 (2024) - [j59]Xu Wang, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction. Future Internet 16(6): 210 (2024) - [j58]Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Recompression Scheme for VQ Index Tables. Future Internet 16(8): 297 (2024) - [j57]Canyang Guo, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Multi-view spatiotemporal learning for traffic forecasting. Inf. Sci. 657: 119868 (2024) - [j56]Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang:
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry 16(2): 147 (2024) - [j55]Canyang Guo, Feng-Jang Hwang, Chi-Hua Chen, Ching-Chun Chang, Chin-Chen Chang:
Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic. IEEE Trans. Intell. Transp. Syst. 25(11): 18899-18912 (2024) - [j54]Guo-Dong Su, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation. Vis. Comput. 40(9): 6421-6447 (2024) - [c10]Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis. AINA (4) 2024: 266-277 - [i10]Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis. CoRR abs/2401.08046 (2024) - [i9]Fatma Shalabi, Huy H. Nguyen, Hichem Felouat, Ching-Chun Chang, Isao Echizen:
Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation. CoRR abs/2403.08783 (2024) - [i8]Hanrui Wang, Ching-Chun Chang, Chun-Shien Lu, Isao Echizen:
Towards Efficient Transferable Preemptive Adversarial Defense. CoRR abs/2407.15524 (2024) - [i7]Erjin Bao, Ching-Chun Chang, Hanrui Wang, Isao Echizen:
Purification-Agnostic Proxy Learning for Agentic Copyright Watermarking against Adversarial Evidence Forgery. CoRR abs/2409.01541 (2024) - [i6]Ching-Chun Chang, Kai Gao, Shuying Xu, Anastasia Kordoni, Christopher Leckie, Isao Echizen:
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery. CoRR abs/2410.05284 (2024) - 2023
- [j53]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li:
Deep Learning for Predictive Analytics in Reversible Steganography. IEEE Access 11: 3494-3510 (2023) - [j52]Ching-Chun Chang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Cyber Vaccine for Deepfake Immunity. IEEE Access 11: 105027-105039 (2023) - [j51]Wei Gu, Ching-Chun Chang, Yu Bai, Yunyuan Fan, Liang Tao, Li Li:
Anti-Screenshot Watermarking Algorithm for Archival Image Based on Deep Learning Model. Entropy 25(2): 288 (2023) - [j50]Canyang Guo, Chi-Hua Chen, Ching-Chun Chang, Feng-Jang Hwang, Chin-Chen Chang:
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy. IEEE Commun. Lett. 27(1): 165-169 (2023) - [j49]Li Li, Yu Bai, Ching-Chun Chang, Yunyuan Fan, Wei Gu, Mahmoud Emam:
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders. J. Inf. Secur. Appl. 76: 103548 (2023) - [j48]Shanqing Zhang, Hui Li, Li Li, Jianfeng Lu, Ching-Chun Chang:
A video watermarking algorithm based on time factor matrix. Multim. Tools Appl. 82(5): 7509-7527 (2023) - [j47]Ching-Chun Chang:
Reversible Linguistic Steganography With Bayesian Masked Language Modeling. IEEE Trans. Comput. Soc. Syst. 10(2): 714-723 (2023) - [j46]Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. IEEE Trans. Dependable Secur. Comput. 20(5): 4199-4213 (2023) - [j45]Ching-Chun Chang, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen:
On the predictability in reversible steganography. Telecommun. Syst. 82(2): 301-313 (2023) - [j44]Canyang Guo, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting. IEEE Trans. Intell. Transp. Syst. 24(8): 8606-8616 (2023) - [j43]Guo-Dong Su, Ching-Chun Chang:
Toward high-capacity crypto-domain reversible data hiding with huffman-based lossless image coding. Vis. Comput. 39(10): 4623-4638 (2023) - [c9]Fatma Shalabi, Huy H. Nguyen, Hichem Felouat, Ching-Chun Chang, Isao Echizen:
Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation. APSIPA ASC 2023: 605-612 - [c8]Erjin Bao, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples. IWDW 2023: 48-62 - [i5]Ching-Chun Chang, Huy Hong Nguyen, Junichi Yamagishi, Isao Echizen:
Cyber Vaccine for Deepfake Immunity. CoRR abs/2303.02659 (2023) - 2022
- [j42]Ching-Chun Chang:
Bayesian Neural Networks for Reversible Steganography. IEEE Access 10: 36327-36334 (2022) - [j41]Jianfeng Lu, Mengtao Shi, Yuhang Lu, Ching-Chun Chang, Li Li, Rui Bai:
Multi-Stage Generation of Tile Images Based on Generative Adversarial Network. IEEE Access 10: 127502-127513 (2022) - [j40]Ching-Chun Chang:
Automation of reversible steganographic coding with nonlinear discrete optimisation. Connect. Sci. 34(1): 1719-1735 (2022) - [j39]Yung-Hui Li, Ching-Chun Chang, Guo-Dong Su, Kai-Lin Yang, Muhammad Saqlain Aslam, Yanjun Liu:
Coverless image steganography using morphed face recognition based on convolutional neural network. EURASIP J. Wirel. Commun. Netw. 2022(1): 28 (2022) - [j38]Kai Gao, Ching-Chun Chang, Ji-Hwei Horng, Isao Echizen:
Steganographic secret sharing via AI-generated photorealistic images. EURASIP J. Wirel. Commun. Netw. 2022(1): 119 (2022) - [j37]Xu Wang, Liyao Li, Ching-Chun Chang, Yongfeng Huang:
Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher. J. Inf. Secur. Appl. 64: 103067 (2022) - [j36]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. J. Vis. Commun. Image Represent. 82: 103421 (2022) - [j35]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
On the multi-level embedding of crypto-image reversible data hiding. J. Vis. Commun. Image Represent. 87: 103556 (2022) - [j34]Zhongliang Yang, Hao Yang, Ching-Chun Chang, Yongfeng Huang, Chin-Chen Chang:
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows. Knowl. Based Syst. 237: 107561 (2022) - [j33]Iuon-Chang Lin, Ching-Chun Chang, Chih-Hsiang Peng:
An Anomaly-Based IDS Framework Using Centroid-Based Classification. Symmetry 14(1): 105 (2022) - [c7]Wei Gu, Ching-Chun Chang, Yu Bai, Yunyuan Fan, Liang Tao, Li Li:
Anti-screenshot Watermarking Algorithm About Archives Image Based on Deep Learning Model. ICS 2022: 349-361 - [i4]Ching-Chun Chang:
Bayesian Neural Networks for Reversible Steganography. CoRR abs/2201.02478 (2022) - [i3]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen:
Less is More: Reversible Steganography with Uncertainty-Aware Predictive Analytics. CoRR abs/2202.02518 (2022) - [i2]Ching-Chun Chang:
Nonlinear Discrete Optimisation of Reversible Steganographic Coding. CoRR abs/2202.13133 (2022) - 2021
- [j32]Sisheng Chen, Ching-Chun Chang, Isao Echizen:
Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT. IEEE Access 9: 116427-116439 (2021) - [j31]Li Li, Chen Cui, Jianfeng Lu, Shanqing Zhang, Ching-Chun Chang:
A Holographic Diffraction Label Recognition Algorithm Based on Fusion Double Tensor Features. Comput. Syst. Sci. Eng. 38(3): 291-303 (2021) - [j30]Yung-Hui Li, Muhammad Saqlain Aslam, Latifa Nabila Harfiya, Ching-Chun Chang:
Conditional Wasserstein Generative Adversarial Networks for Rebalancing Iris Image Datasets. IEICE Trans. Inf. Syst. 104-D(9): 1450-1458 (2021) - [j29]Fang Cao, Jiayi Sun, Xiangyang Luo, Chuan Qin, Ching-Chun Chang:
Privacy-preserving inpainting for outsourced image. Int. J. Distributed Sens. Networks 17(11): 155014772110590 (2021) - [j28]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Vis. Commun. Image Represent. 79: 103203 (2021) - [j27]Yung-Hui Li, Wenny Ramadha Putri, Muhammad Saqlain Aslam, Ching-Chun Chang:
Robust Iris Segmentation Algorithm in Non-Cooperative Environments Using Interleaved Residual U-Net. Sensors 21(4): 1434 (2021) - [j26]Latifa Nabila Harfiya, Ching-Chun Chang, Yung-Hui Li:
Continuous Blood Pressure Estimation Using Exclusively Photopletysmography by LSTM-Based Signal-to-Signal Translation. Sensors 21(9): 2952 (2021) - [j25]Chi-En Huang, Ching-Chun Chang, Yung-Hui Li:
Mask Attention-SRGAN for Mobile Sensing Networks. Sensors 21(17): 5973 (2021) - [j24]Chi-En Huang, Yung-Hui Li, Muhammad Saqlain Aslam, Ching-Chun Chang:
Super-Resolution Generative Adversarial Network Based on the Dual Dimension Attention Mechanism for Biometric Image Super-Resolution. Sensors 21(23): 7817 (2021) - [j23]Xiaoping Li, Ching-Chun Chang, Yanjun Liu:
A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network. Telecommun. Syst. 78(1): 49-56 (2021) - [c6]Chuan Qin, Shengyan Gao, Chanyu Jiang, Heng Yao, Ching-Chun Chang:
Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism. BDSIC 2021: 23-32 - [i1]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li:
Deep Learning for Reversible Steganography: Principles and Insights. CoRR abs/2106.06924 (2021) - 2020
- [j22]Ching-Chun Chang:
Adversarial Learning for Invertible Steganography. IEEE Access 8: 198425-198435 (2020) - [j21]Yan-Hong Chen, Ching-Chun Chang, Cheng-Yi Hsu:
Content-based image retrieval using block truncation coding based on edge quantization. Connect. Sci. 32(4): 431-448 (2020) - [j20]Li Li, Shengxian Wang, Ting Luo, Ching-Chun Chang, Qili Zhou, Hui Li:
Reversible Data Hiding for Encrypted 3D Model Based on Prediction Error Expansion. J. Sensors 2020: 8851999:1-8851999:14 (2020) - [j19]Ji-Hwei Horng, Shuying Xu, Ching-Chun Chang, Chinchen Chang:
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors 20(9): 2739 (2020) - [j18]Ching-Chun Chang, Ji-Hwei Horng, Chia-Shou Shih, Chin-Chen Chang:
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors 20(13): 3802 (2020) - [j17]Yan-Cheng Hsu, Yung-Hui Li, Ching-Chun Chang, Latifa Nabila Harfiya:
Generalized Deep Neural Network Model for Cuffless Blood Pressure Estimation with Photoplethysmogram Signal Only. Sensors 20(19): 5668 (2020) - [j16]Li Li, Shengxian Wang, Shanqing Zhang, Ting Luo, Ching-Chun Chang:
Homomorphic Encryption-Based Robust Reversible Watermarking for 3D Model. Symmetry 12(3): 347 (2020)
2010 – 2019
- 2019
- [b1]Ching-Chun Chang:
Privacy-preserving information hiding and its applications. University of Warwick, Coventry, UK, 2019 - [j15]Ching-Chun Chang, Chang-Tsun Li, Kaimeng Chen:
Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues. IEEE Access 7: 54117-54132 (2019) - [j14]Ching-Chun Chang, Yanjun Liu, Xiao-Qian Yang:
A Novel Image Compression Method Using Turtle-Shell-Shaped Codewords with Less Blocking Artifact. J. Inf. Hiding Multim. Signal Process. 10(1): 156-166 (2019) - [j13]Ching-Chun Chang, Yanjun Liu:
Fast turtle shell-based data embedding mechanisms with good visual quality. J. Real Time Image Process. 16(3): 589-599 (2019) - [j12]Ching-Chun Chang, Yanjun Liu, Kaimeng Chen:
Real-time adaptive visual secret sharing with reversibility and high capacity. J. Real Time Image Process. 16(4): 871-881 (2019) - [j11]Chia-Chen Lin, Ching-Chun Chang, Zhi-Ming Wang:
Reversible Data Hiding Scheme Using Adaptive Block Truncation Coding Based on an Edge-Based Quantization Approach. Symmetry 11(6): 765 (2019) - [c5]Ching-Chun Chang, Tai-Ying Liu:
Reframing the Absorptive Capacity's Mediating Effects on R&D Investment: Organizational Barrier and Quadruple-Helix Collaboration. ISSI 2019: 2543-2544 - 2018
- [j10]Ching-Chun Chang, Chang-Tsun Li, Yun-Qing Shi:
Privacy-Aware Reversible Watermarking in Cloud Computing Environments. IEEE Access 6: 70720-70733 (2018) - [j9]Shanqing Zhang, Pengcheng Li, Xianghua Xu, Li Li, Ching-Chun Chang:
No-Reference Image Blur Assessment Based on Response Function of Singular Values. Symmetry 10(8): 304 (2018) - [c4]Ching-Chun Chang, Chang-Tsun Li:
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations. IIH-MSP (1) 2018: 330-339 - 2017
- [j8]Ying-Hsuan Huang, Ching-Chun Chang:
A Multiple Image Based Reversible Data Hiding Scheme with High Embedding Capacity. J. Inf. Hiding Multim. Signal Process. 8(4): 880-887 (2017) - [j7]Thai-Son Nguyen, Ching-Chun Chang, Hsiao-Ling Wu:
Adaptive image sharing based on the quadri-directional search strategy with meaningful shadows. Multim. Tools Appl. 76(2): 2627-2643 (2017) - [j6]Ying-Hsuan Huang, Ching-Chun Chang, Yi-Hui Chen:
Hybrid secret hiding schemes based on absolute moment block truncation coding. Multim. Tools Appl. 76(5): 6159-6174 (2017) - [j5]Ting-Fang Cheng, Ching-Chun Chang, Li Liu:
Secret sharing: using meaningful image shadows based on Gray code. Multim. Tools Appl. 76(7): 9337-9362 (2017) - [c3]Ching-Chun Chang, Chang-Tsun Li:
Secure Secret Sharing in the Cloud. ISM 2017: 358-361 - [c2]Ching-Chun Chang, Chang-Tsun Li:
Reversible data hiding in JPEG images based on adjustable padding. IWBF 2017: 1-6 - 2016
- [j4]Yanjun Liu, Ching-Chun Chang, Thai-Son Nguyen:
High capacity turtle shell-based data hiding. IET Image Process. 10(2): 130-137 (2016) - [j3]Ching-Chun Chang, Yanjun Liu, Hsiao-Ling Wu:
Distortion-free secret image sharing method with two meaningful shadows. IET Image Process. 10(8): 590-597 (2016) - [j2]Chin-Yu Sun, Ching-Chun Chang:
Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. Int. J. Netw. Secur. 18(3): 594-596 (2016) - 2014
- [j1]Ching-Chun Chang, Chin-Yu Sun:
A Secure and Efficient Authentication Scheme for E-coupon Systems. Wirel. Pers. Commun. 77(4): 2981-2996 (2014) - [c1]Ching-Chun Chang, Yanjun Liu, Thai-Son Nguyen:
A Novel Turtle Shell Based Scheme for Data Hiding. IIH-MSP 2014: 89-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint