


default search action
Kai Gao 0004
Person information
Other persons with the same name
- Kai Gao — disambiguation page
- Kai Gao 0001
— Sichuan University, College of Cybersecurity, Chengdu, China (and 1 more)
- Kai Gao 0002
- Kai Gao 0003
- Kai Gao 0005
- Kai Gao 0006
- Kai Gao 0007
- Kai Gao 0008
- Kai Gao 0009
- Kai Gao 0010
- Kai Gao 0011
- Kai Gao 0012
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j17]Ching-Chun Chang
, Fan-Yun Chen, Shih-Hong Gu, Kai Gao
, Hanrui Wang
, Isao Echizen
:
Imitation Game for Adversarial Disillusion With Chain-of-Thought Reasoning in Generative AI. IEEE Access 13: 95085-95093 (2025) - [j16]Ching-Chun Chang
, Kai Gao
, Shuying Xu
, Anastasia Kordoni
, Christopher Leckie
, Isao Echizen
:
Hypnopaedia-Aware Machine Unlearning via Psychometrics of Artificial Mental Imagery. IEEE Access 13: 103880-103897 (2025) - [j15]Kai Gao, Ji-Hwei Horng
, Ching-Chun Chang, Chinchen Chang:
Crypto-space steganography for 3D mesh models with greedy selection and shortest expansion. Displays 87: 102961 (2025) - [j14]Kai Gao
, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion. J. Inf. Secur. Appl. 89: 103957 (2025) - 2024
- [j13]Kai Gao
, Chin-Chen Chang
, Chia-Chen Lin
:
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling. IEEE Access 12: 153274-153284 (2024) - [j12]Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. Cryptogr. 8(3): 41 (2024) - [j11]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding. Comput. Syst. Sci. Eng. 48(3): 813-833 (2024) - [j10]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications. Displays 81: 102609 (2024) - [j9]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field. IEEE Trans. Multim. 26: 5499-5510 (2024) - 2023
- [j8]Chin-Chen Chang, Jui-Chuan Liu, Kai Gao:
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack. J. Vis. Commun. Image Represent. 97: 103973 (2023) - [j7]Kai Gao, Chin-Chen Chang
, Chia-Chen Lin:
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack. Symmetry 15(1): 189 (2023) - 2022
- [j6]Kai Gao, Ching-Chun Chang
, Ji-Hwei Horng
, Isao Echizen:
Steganographic secret sharing via AI-generated photorealistic images. EURASIP J. Wirel. Commun. Netw. 2022(1): 119 (2022) - [j5]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 84: 103481 (2022) - 2021
- [j4]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix. IEEE Access 9: 50112-50125 (2021) - [j3]Kai Gao, Chin-Chen Chang, Yanjun Liu:
Predicting missing data for data integrity based on the linear regression model. Int. J. Embed. Syst. 14(4): 355-362 (2021) - 2020
- [j2]Kai Gao
, Ji-Hwei Horng
, Yanjun Liu
, Chin-Chen Chang
:
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix. IEEE Access 8: 130405-130416 (2020) - [j1]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 8: 174325-174341 (2020)
Informal and Other Publications
- 2025
- [i2]Ching-Chun Chang, Fan-Yun Chen, Shih-Hong Gu, Kai Gao, Hanrui Wang, Isao Echizen:
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play. CoRR abs/2501.19143 (2025) - 2024
- [i1]Ching-Chun Chang, Kai Gao, Shuying Xu, Anastasia Kordoni, Christopher Leckie, Isao Echizen:
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery. CoRR abs/2410.05284 (2024)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-05 22:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint