{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:50:30Z","timestamp":1762253430982,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,22]]},"DOI":"10.1145\/3369412.3395060","type":"proceedings-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T13:06:14Z","timestamp":1592917574000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis"],"prefix":"10.1145","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Beiling","family":"Lu","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, NJ, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"volume-title":"Proceedings of International Conference on Learning Representations","year":"2017","author":"Baker Bowen","key":"e_1_3_2_1_1_1"},{"volume-title":"Proceedings of International Conference on Learning Representations, Workshop","year":"2018","author":"Baker Bowen","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"e_1_3_2_1_4_1","unstructured":"Patrick Bas and Teddy Furon. 2007. Bows-2. (July 2007). available at http:\/\/bows2.ec-lille.fr.  Patrick Bas and Teddy Furon. 2007. Bows-2. (July 2007). available at http:\/\/bows2.ec-lille.fr."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2014.2312817","volume-title":"Uniform embedding for efficient JPEG steganography","author":"Guo Linjie","year":"2014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2364918"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"volume-title":"Proceedings of Media Watermarking, Security, and Forensics","author":"Holub Vojtech","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"volume-title":"Proceedings of Media Watermarking, Security, and Forensics","author":"Kodovsk\u00fd Jan","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756608"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083236"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6878-4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335713"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00257"},{"volume-title":"Blockqnn: Efficient block-wise neural network architecture generation. arXiv preprint arXiv:1808.05584","year":"2018","author":"Zhong Zhao","key":"e_1_3_2_1_29_1"},{"volume-title":"Proceedings of International Conference on Learning Representations","year":"2017","author":"Zoph Barret","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"}],"event":{"name":"IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Denver CO USA","acronym":"IH&MMSec '20"},"container-title":["Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369412.3395060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3369412.3395060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:30Z","timestamp":1750202610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369412.3395060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":30,"alternative-id":["10.1145\/3369412.3395060","10.1145\/3369412"],"URL":"https:\/\/doi.org\/10.1145\/3369412.3395060","relation":{},"subject":[],"published":{"date-parts":[[2020,6,22]]},"assertion":[{"value":"2020-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}