<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:pagemap="http://www.google.com/schemas/sitemap-pagemap/1.0" xmlns:xhtml="http://www.w3.org/1999/xhtml" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
  <url>
    <loc>https://hypersec.research.st</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/projects</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/people</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/courses</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/posts</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/cv</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/contact_form</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/57210-the-latent-seal-robust-model-watermarking-for-latent-diffusion-model</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/57126-an-sam-fine-tuning-framework-with-frequency-domain-interactive-lora-for-remote-sensing-change-detection</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61373-epix-embedded-panns-based-intelligent-auscultation-with-xgboost-for-respiratory-sound-classification</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52599-a-noise-assistant-network-for-tampering-detection-via-inconspicuous-feature-enhancement-and-multi-perspective-perception</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61372-sem-ucsnet-a-novel-semantic-maps-guided-compressive-sensing-framework-for-underwater-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61096-pasa-progressive-adaptive-spectral-augmentation-for-automated-auscultation-in-data-scarce-environments</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/57403-decoding-coefficients-recovery-based-on-modified-gauss-jordan-elimination-for-tampered-content-reconstruction</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52603-cca-yolo-channel-and-coordinate-aware-based-yolo-for-photovoltaic-cell-defect-detection-in-electroluminescence-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52601-transhfc-joints-hypergraph-filtering-convolution-and-transformer-framework-for-temporal-forgery-localization</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52600-sam-based-efficient-feature-integration-network-for-remote-sensing-change-detection-a-case-study-on-macao-sea-reclamation</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52604-lccdmamba-visual-state-space-model-for-land-cover-change-detection-of-vhr-remote-sensing-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/55916-pfl-alp-personalized-federated-learning-against-backdoor-attacks-via-attention-based-local-purification</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52606-pfps-polymerized-feature-panoptic-segmentation-based-on-fully-convolutional-networks</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54074-using-3d-lmm-based-encryption-to-secure-digital-images-with-3d-s-box-and-fibonacci-q-matrix</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54075-rnpm-neural-guided-embedding-region-selection-and-error-correction-for-robust-audio-multi-watermarking</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52602-ghcw-a-novel-guarded-high-fidelity-compression-based-watermarking-scheme-for-ai-model-protection-and-self-recovery</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/55655-a-symmetric-self-embedding-mechanism-for-high-fidelity-image-recovery-against-tampering</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52596-a-two-phase-scheme-by-integration-of-deep-and-corner-feature-for-balanced-copy-move-forgery-localization</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52597-lungscope-an-intelligent-embedded-system-with-a-lightweight-model-for-real-time-lung-sound-analysis</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54131-image-manipulation-localization-using-dual-shallow-feature-pyramid-fusion-and-boundary-contextual-incoherence-enhancement</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52598-dfformer-capturing-dynamic-frequency-features-to-locate-image-manipulation-through-adaptive-frequency-transformer-and-prototype-learning</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61669-ngqr-a-novel-generalized-quantum-image-representation</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54025-led-net-a-lightweight-edge-detection-network</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54153-f3net-feature-filtering-fusing-network-for-change-detection-of-remote-sensing-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54134-msfgnet-multi-scale-features-gathering-network-for-change-detection-of-remote-sensing-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54152-large-kernel-convolution-application-for-land-cover-change-detection-of-remote-sensing-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54077-a-novel-blockchain-watermarking-mechanism-utilizing-interplanetary-file-system-and-fast-walsh-hadamard-transform</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54022-encryption-then-embedding-based-hybrid-data-hiding-scheme-for-medical-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52769-ofgst-swin-swin-transformer-utilizing-overlap-fusion-based-generalized-s-transform-for-respiratory-cycle-classification</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52770-lungnext-a-novel-lightweight-network-utilizing-enhanced-mel-spectrogram-for-lung-sound-classification</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61670-mmqw-multi-modal-quantum-watermarking-scheme</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52605-pattern-based-quantum-text-watermarking-securing-digital-content-with-next-gen-quantum-techniques</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/54130-camu-net-copy-move-forgery-detection-utilizing-coordinate-attention-and-multi-scale-feature-fusion-based-up-sampling</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61671-a-novel-geometrically-invariant-quantum-watermarking-scheme-utilizing-quantum-error-correction</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52773-c3mw-a-novel-comprehensive-monitoring-motivated-multi-model-watermarking-scheme-for-tamper-detection-and-self-recovery</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/52771-tampering-localization-and-self-recovery-using-block-labeling-and-adaptive-significance</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/publications/61667-adaptive-feature-calculation-and-diagonal-mapping-for-successive-recovery-of-tampered-regions</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/people/5320-xiaochen-yuan-s-team</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8579-adversarial-defense</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8910-untitled-9lcc4z</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8484-bowen-meng</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8547-change-detection</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8914-untitled-vwn549</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/9289-untitled-1uzcz6</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8913-untitled-vla2q5</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8567-image-audio-watermarking</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8483-research-topic-multimedia-forensics-content-security</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8500-jiahao-huang</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8505-jiaxuan-lin</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8504-junqi-bao</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8499-yunqing-huang</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/9296-kaiqi-zhao</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8502-lihao-zhuang</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8571-lung-sound-classification</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8564-panopticseg</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8555-image-encryption</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8541-qin-zhao</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8498-qiutong-li</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/9294-zhang-qiyuan</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8482-research_topics</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8472-security-and-forensics-for-digital-images</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8485-shucheng-ji</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8506-untitled</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8476-cissy-team-tong-liu</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8912-untitled-bbx9gl</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8570-untitled-764m8k</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8911-visual-odometry</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8509-white-box-watermarking-based-model-protection</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8477-xiaochen-yuan</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8543-untitled-vnss0s</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8542-untitled-71uu38</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/9295-untitled-jmw9l7</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8510-yifeng-jiang</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8501-ying-wang</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8497-yunlong-liao</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/9293-zheng-xing</loc>
  </url>
  <url>
    <loc>https://hypersec.research.st/pages/8512-zhiyao-xie</loc>
  </url>
</urlset>
