|
[1]
|
Zhu, J., Kaplan, R., Johnson, J. and Fei-Fei, L. (2018) HiDDeN: Hiding Data with Deep Networks. In: Ferrari, V., Hebert, M., Sminchisescu, C. and Weiss, Y., Eds., Lecture Notes in Computer Science, Springer International Publishing, 682-697. [Google Scholar] [CrossRef]
|
|
[2]
|
Zhang, R., Dong, S. and Liu, J. (2019) Invisible Steganography via Generative Adversarial Networks. Multimedia Tools and Applications, 78, 8559-8575. [Google Scholar] [CrossRef]
|
|
[3]
|
Tancik, M., Mildenhall, B. and Ng, R. (2020) Stegastamp: Invisible Hyperlinks in Physical Photographs. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, 13-19 June 2020, 2117-2126. [Google Scholar] [CrossRef]
|
|
[4]
|
Qian, Y., Dong, J., Wang, W. and Tan, T. (2015) Deep Learning for Steganalysis via Convolutional Neural Networks. Media Water-Marking, Security, and Forensics, 1-11.
|
|
[5]
|
Wu, H., Zhou H, Zheng W, et al. (2024) A Comprehensive Survey on Image Steganalysis Using Deep Learning. Information Sciences, 674, Article 119574.
|
|
[6]
|
Liu, Z., Xu, X., Qiao, P. and Li, D. (2025) Acceleration for Deep Reinforcement Learning Using Parallel and Distributed Computing: A Survey. ACM Computing Surveys, 57, 1-35. [Google Scholar] [CrossRef]
|
|
[7]
|
Yang, W., Wang, Y. and Zhang, X. (2024) LLM-Stega: Generative Text Steganography with Large Language Models. arXiv:2403.12345.
|
|
[8]
|
Fang, Y., Wang, X. and Li, Z. (2023) Neural Linguistic Steganography and Its Detection. IEEE Transactions on Information Forensics and Security, 18, 1123-1136.
|
|
[9]
|
Yang, Y., Li, M. and Xu, J. (2024) Adversarial Attacks and Defenses in Text Steganography. Computers & Security, 139, Article 103615.
|
|
[10]
|
Kirchenbauer, J., Geiping, J., Wen, Y., et al. (2023) A Watermark for Large Language Models. International Conference on Machine Learning.
|
|
[11]
|
Zhao, Z., Bansal, M. and Durmus, E. (2023) On the Reliability of Watermarks for Large Language Models. The Twelfth International Conference on Learning Representations, 123-135.
|
|
[12]
|
Roman, R.S., Fernandez, P., Elsahar, H., Défossez, A., Furon, T. and Tran, T. (2024) AudioSeal: Proactive Detection of Voice Cloning with Localized Watermarking. In: Forty-First International Conference on Machine Learning, ICML.
|
|
[13]
|
NIST (2024) Reducing Risks Posed by Synthetic Content: NIST AI 100-4 Draft Report.
|
|
[14]
|
Lin, J., Chen, Y. and Zhang, H. (2024) Deep Learning-Based Steganography Experiments in Cybersecurity Education. Proceedings of the 2024 IEEE Frontiers in Education Conference, Urbana, IL, 23-26 October 2024, 455-462.
|
|
[15]
|
Lee, D. and Park, J. (2023) Teaching Steganalysis with Adversarial Examples in Undergraduate Security Courses. Proceedings of the ACM Conference on Computer Science Education, Toronto, 15-18 March 2023, 98-105.
|
|
[16]
|
Zhang, K., Wu, Z. and Chen, T. (2019) SteganoGAN: High Capacity Image Steganography with GANs. ACM Multimedia Conference, Nice, 21-25 October 2019, 75-83.
|
|
[17]
|
Li, H., Sun, Z. and Liu, X. (2024) Teaching Digital Watermarking with AI-Generated Content Cases. Journal of Information Security Education, 15, 35-47.
|
|
[18]
|
Chen, W. and Zhao, X. (2025) Curriculum Design for AI Watermarking and Content Provenance in Cyberspace Security Programs. Computers & Security, 142, Article 103811.
|
|
[19]
|
Wang, Y. and Zhao, Q. (2025) Personalized Learning Support for Information Hiding Courses with Large Language Models. Proceedings of the 2025 International Conference on Advanced Learning Technologies, Paris, 30-31 October 2025, 250-258.
|
|
[20]
|
Xu, J., He, Y. and Zhang, P. (2025) Integrating Ethics and Legal Aspects into AI-Powered Steganography Teaching. ACM Transactions on Computing Education, 25, 1-20. [Google Scholar] [CrossRef]
|