{"id":"https://openalex.org/W4410295407","doi":"https://doi.org/10.1109/tifs.2025.3569409","title":"Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis","display_name":"Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410295407","doi":"https://doi.org/10.1109/tifs.2025.3569409"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3569409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3569409","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101416736","display_name":"Zhen Yang","orcid":"https://orcid.org/0000-0002-9657-0854"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-9657-0854","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110377207","display_name":"Yufei Luo","orcid":"https://orcid.org/0009-0005-4791-1228"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yufei Luo","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0005-4791-1228","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035279134","display_name":"Jinshuai Yang","orcid":"https://orcid.org/0000-0002-6293-1981"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshuai Yang","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6293-1981","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xin Xu","orcid":"https://orcid.org/0000-0003-4474-2084"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xu","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4474-2084","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084460123","display_name":"Ru Zhang","orcid":"https://orcid.org/0000-0001-6641-3236"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Zhang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-6641-3236","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100768896","display_name":"Yongfeng Huang","orcid":"https://orcid.org/0000-0003-3825-2230"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongfeng Huang","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3825-2230","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101416736"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":6.7995,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.96852592,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"5181","last_page":"5194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8604691028594971},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8188816905021667},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8095536231994629},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.6022825241088867},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5859243869781494},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5829142332077026},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5142250061035156},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.503119170665741},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4888400435447693},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3411986827850342},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.2588813304901123},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.18962806463241577},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.0904855728149414}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8604691028594971},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8188816905021667},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8095536231994629},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.6022825241088867},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5859243869781494},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5829142332077026},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5142250061035156},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.503119170665741},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4888400435447693},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3411986827850342},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.2588813304901123},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.18962806463241577},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.0904855728149414},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3569409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3569409","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7272630985","display_name":null,"funder_award_id":"U21B2020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2096050104","https://openalex.org/W2593768305","https://openalex.org/W2776888948","https://openalex.org/W2893556909","https://openalex.org/W2964288524","https://openalex.org/W2971140743","https://openalex.org/W2998115938","https://openalex.org/W3018638193","https://openalex.org/W3085519426","https://openalex.org/W3162945253","https://openalex.org/W3175755605","https://openalex.org/W3185857134","https://openalex.org/W3187420508","https://openalex.org/W4283393394","https://openalex.org/W4285189660","https://openalex.org/W4313419234","https://openalex.org/W4313577329","https://openalex.org/W4317496741","https://openalex.org/W4321484124","https://openalex.org/W4362553511","https://openalex.org/W4386066514","https://openalex.org/W4388101334","https://openalex.org/W4408498127","https://openalex.org/W6634441602","https://openalex.org/W6640362995","https://openalex.org/W6676984168","https://openalex.org/W6688325169","https://openalex.org/W6750109254","https://openalex.org/W6755207826","https://openalex.org/W6849770162","https://openalex.org/W6853320337","https://openalex.org/W6861151572"],"related_works":["https://openalex.org/W4394775207","https://openalex.org/W4389474468","https://openalex.org/W4300172004","https://openalex.org/W3203792196","https://openalex.org/W4321649381","https://openalex.org/W2997645659","https://openalex.org/W3180787869","https://openalex.org/W2955455867","https://openalex.org/W4295929828","https://openalex.org/W3156096827"],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,18,57,84,105,215],"deep":[3],"learning":[4],"have":[5],"significantly":[6],"improved":[7],"linguistic":[8,24],"steganalysis,":[9],"but":[10],"challenges":[11],"persist":[12],"when":[13],"labeled":[14],"samples":[15],"are":[16],"scarce":[17],"the":[19,34,38,62,75,79,109,118,141,144,173,181,186,195,199,220,231],"target":[20,41,76,196,221],"domain.":[21,197,222],"Existing":[22],"cross-domain":[23],"steganalysis":[25,45,65,82,145,183],"methods":[26,46],"seek":[27],"to":[28,70,124,160,164,191,207],"improve":[29],"model":[30,146,184,200],"generalization":[31,63],"by":[32],"minimizing":[33],"domain":[35],"discrepancy":[36],"between":[37,52],"source":[39],"and":[40,54,130,155],"domains.":[42,139],"However,":[43],"these":[44,90,202],"often":[47],"struggle":[48,69],"with":[49,149,201],"incorrect":[50],"alignment":[51,137],"stego":[53,86,129,217],"cover":[55,131],"texts":[56,218],"both":[58],"domains,":[59],"which":[60,103],"hampers":[61],"of":[64,74,81,128],"models.":[66],"Additionally,":[67],"they":[68],"capture":[71],"domain-specific":[72,209],"features":[73],"domain,":[77],"reducing":[78],"effectiveness":[80],"models":[83],"discriminating":[85,216],"texts.":[87,132],"To":[88],"address":[89],"issues,":[91],"we":[92,116,179],"propose":[93],"a":[94],"novel":[95],"Class-aware":[96,112,176],"Adversarial":[97,113,152],"unsupervised":[98],"Domain":[99,121],"Adaptation":[100],"(CADA)":[101],"method,":[102],"operates":[104],"two":[106],"stages.":[107],"In":[108,140,172],"first":[110],"stage,":[111,143,175],"Pre-Training":[114],"(CAPT),":[115],"design":[117],"Weighted":[119],"Class-Aware":[120,151,156,187],"Distance":[122],"(WCADD)":[123],"leverage":[125],"class":[126],"information":[127],"This":[133],"ensures":[134],"accurate":[135],"class-aware":[136],"across":[138],"CAPT":[142],"is":[147],"pre-trained":[148,182],"WCADD,":[150],"Training":[153],"(CAAT),":[154],"Label":[157],"Smoothing":[158],"(CALS)":[159],"enhance":[161],"its":[162,170,205,213],"ability":[163,206],"extract":[165],"domain-invariant":[166],"features,":[167,210],"thereby":[168,211],"improving":[169,212],"generalization.":[171],"second":[174],"Fine-Tuning":[177],"(CFT),":[178],"employ":[180],"alongside":[185],"Progressive":[188],"Strategy":[189],"(CAPS)":[190],"generate":[192],"pseudo-labels":[193,203],"for":[194],"Fine-tuning":[198],"enhances":[204],"recognize":[208],"performance":[214],"within":[219],"Extensive":[223],"experiments":[224],"demonstrate":[225],"that":[226],"our":[227],"proposed":[228],"method":[229],"outperforms":[230],"existing":[232],"baseline":[233],"methods.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
