{"id":"https://openalex.org/W3012351899","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023018","title":"Non-structured Pruning for Deep-learning based Steganalytic Frameworks","display_name":"Non-structured Pruning for Deep-learning based Steganalytic Frameworks","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012351899","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023018","mag":"3012351899"},"language":"en","primary_location":{"id":"doi:10.1109/apsipaasc47483.2019.9023018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101572885","display_name":"Qiushi Li","orcid":"https://orcid.org/0000-0002-4976-3346"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qiushi Li","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019653345","display_name":"Zilong Shao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zilong Shao","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061167775","display_name":"Jishen Zeng","orcid":"https://orcid.org/0000-0002-4894-9966"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jishen Zeng","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Guangdong Key Laboratory of Intelligent Information Processing, National Engineering Laboratory for Big Data System Computing Technology, Shenzhen, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101572885"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1021,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.48875916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1735","last_page":"1739"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8992596864700317},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7745424509048462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7730965614318848},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7264841794967651},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6493347883224487},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.5413231253623962},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5340754985809326},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5115336179733276},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5059799551963806},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.46009960770606995},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4362197518348694},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42835530638694763},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.41605550050735474},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4156225323677063},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41163116693496704},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.157362699508667}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8992596864700317},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7745424509048462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7730965614318848},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7264841794967651},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6493347883224487},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.5413231253623962},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5340754985809326},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5115336179733276},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5059799551963806},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.46009960770606995},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4362197518348694},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42835530638694763},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41605550050735474},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4156225323677063},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41163116693496704},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.157362699508667},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc47483.2019.9023018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6700000166893005,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1663899164","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2046180645","https://openalex.org/W2081564928","https://openalex.org/W2114766824","https://openalex.org/W2170598445","https://openalex.org/W2194775991","https://openalex.org/W2322622188","https://openalex.org/W2538511122","https://openalex.org/W2610979719","https://openalex.org/W2621048556","https://openalex.org/W2892948265","https://openalex.org/W2963674932","https://openalex.org/W6600894407","https://openalex.org/W6677103964"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W1529294424","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W2357125417","https://openalex.org/W1966340347","https://openalex.org/W1716757876"],"abstract_inverted_index":{"Image":[0],"steganalysis":[1],"aims":[2],"to":[3,60,88],"discriminate":[4],"innocent":[5],"cover":[6],"images":[7,12],"and":[8,26,48,63,97,112,133],"those":[9,32,94,99],"suspected":[10],"stego":[11],"embedded":[13],"with":[14],"secret":[15],"message.":[16],"Recently,":[17],"increasing":[18],"advanced":[19],"deep":[20,33],"neural":[21],"networks":[22],"have":[23,106],"been":[24],"proposed":[25,122],"used":[27],"in":[28,43,71,102],"image":[29,76,114],"steganalysis.":[30,77],"Though":[31],"learning":[34],"models":[35],"can":[36,126],"gain":[37],"superior":[38],"performance,":[39],"they":[40],"also":[41],"result":[42],"redundancy":[44],"of":[45,74,82,131],"computational":[46],"resource":[47],"memory":[49],"storage.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54],"apply":[55],"a":[56,89],"non-structured":[57,123],"pruning":[58,124],"method":[59,125],"prune":[61,98],"XuNet2":[62],"SRNet":[64],"-":[65],"the":[66,72,80,83,103,129,137],"two":[67],"state-of-the-art":[68],"deep-learning":[69,139],"framework":[70],"field":[73],"JPEG":[75],"We":[78,105],"obtain":[79],"priorities":[81],"connections":[84],"among":[85],"neurons":[86],"according":[87],"certain":[90],"criterion,":[91],"then":[92],"keep":[93],"significant":[95],"weights":[96],"nonsignificant":[100],"ones":[101],"meantime.":[104],"conducted":[107],"extensive":[108],"experiments":[109],"on":[110],"BOSSBase":[111],"BOWS":[113],"dataset.":[115],"The":[116],"experimental":[117],"results":[118],"demonstrate":[119],"that":[120],"our":[121],"significantly":[127],"reduce":[128],"cost":[130],"computation":[132],"storage":[134],"required":[135],"by":[136],"original":[138],"frameworks":[140],"without":[141],"affecting":[142],"their":[143],"detection":[144],"accuracy.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
