1 |
Ld-CNNs: a deep learning system for structured text categorization based on LDA in content security
|
会议论文 |
Jinshuo Liu;Yabo Xu;Juan Deng;Lina Wang;Lanxin Zhang |
2 |
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks
|
期刊论文 |
Jing Chen;Kun He;Quan Yuan;Ruiying Du;Lina Wang;Jie Wu |
3 |
一种基于宏块复杂度的自适应视频运动矢量隐写方法
|
专利 |
王丽娜;徐一波;翟黎明;任延珍;谭选择 |
4 |
A novel image steganography method via deep convolutional generative adversarial networks
|
期刊论文 |
Hu Donghui;Wang Lina;Jiang Wenjie;Zheng Shuli;Li Bin |
5 |
A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection
|
会议论文 |
Chen Jian;Zheng Peijia;Guo Jianting;Zhang Wei;Huang Jiwu |
6 |
Efficient privacy-aware authentication scheme for mobile cloud computing services
|
期刊论文 |
Debiao He;Neeraj Kumar;Muhammad Khurram Khan;Lina Wang;Jian Shen |
7 |
Deep Learning with Feature Reuse for JPEG Image Steganalysis
|
会议论文 |
Yang Jianhua;Kang Xiangui;Edward K.Wong;Shi Yunqing |
8 |
网络安全优秀教师奖
|
奖励 |
王丽娜 |
9 |
Exposing heterogeneous chain of video recompression
|
会议论文 |
Liu Jingxian;Kang Xiangui |
10 |
AMR steganalysis based on second-order difference of pitch delay
|
期刊论文 |
Yanzhen Ren;Jing Yang;Jinwei Wang;Lina Wang |
11 |
基于差分隐私的Android物理传感器侧信道防御方法
|
期刊论文 |
唐奔宵;王丽娜;汪润;赵磊;王丹磊 |
12 |
A Cover Selection HEVC Video Steganography Based on Intra Prediction Model
|
期刊论文 |
Wang Jie;Jia Xiaoqing;Kang Xiangui;Shi Yunqing |
13 |
An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution
|
期刊论文 |
Jia Ju;Xiang Zhaoxia;Wang Lina;Xu Yan |
14 |
Revealing the processing history of pitch-shifted voice using CNNs
|
会议论文 |
Wang Lihua;Liang Huixin;Lin Xiaodan;Kang Xiangui |
15 |
《基础学科(弘毅学堂计算机)拔尖人才培养创新与实践》
|
奖励 |
王丽娜 |
16 |
网络安全威胁主动感知及研判的方法与技术
|
奖励 |
傅建明;彭国军;严飞;王丽娜 |
17 |
Nonlocal Low-Rank Tensor Completion for Visual Data
|
期刊论文 |
Lefei Zhang;Liangchen Song;Bo Du;Yipeng Zhang |
18 |
A multi-purpose image counter-anti-forensic method using convolutional neural networks
|
会议论文 |
Yu Jingjing;Zhan Yifeng;Yang Jianhua;Kang Xiangui |
19 |
Three-step general discrete-time Zhang neural network design and application to time-variant matrix inversion
|
期刊论文 |
Chao weiHu;Xiangui Kang;Yunong Zhang |
20 |
Exposing speech tampering via spectral phase analysis
|
期刊论文 |
Xiaodan Lin;Xiangui Kang |
21 |
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
|
期刊论文 |
Debiao He;Sherali Zeadally;Neeraj Kumar;Wei Wu |
22 |
Pedestrian detection via a leg-driven physiology framework
|
会议论文 |
Gongbo Liang;Qi Li;Xiangui Kang |
23 |
Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework
|
会议论文 |
Hanqi Zi;Qiong Zhang;Xiangui Kang |
24 |
Image forensics based on transfer learning and convolutional neural network
|
会议论文 |
Zhan Yifeng;Chen Yifang;Zhang Qiong;Kang Xiangui |
25 |
SILK Steganography Scheme Based on the Distribution of LSF Parameter
|
会议论文 |
Ren Yanzhen;Zheng Weiman;Wang Lina |
26 |
Deypos: Deduplicatable dynamic proof of storage for multi-user environments
|
期刊论文 |
Kun He;Jing Chen;Ruiying Du;Qianhong Wu;Guoliang Xue;Xiang Zhang |
27 |
Anonymous authentication for wireless body area networks with provable security
|
期刊论文 |
Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee |
28 |
DeepRD: 基于 Siamese LSTM 网络的 Android 重打包应用检测方法
|
期刊论文 |
汪润;唐奔宵;王丽娜 |
29 |
Towards Automatic Embedding Cost Learning for JPEG Steganography
|
会议论文 |
Yang Jianhua;Kang Xiangui;Ruan Danyang;Shi Yunqing |
30 |
基于基音延迟组内相关性的AMR隐写分析算法
|
期刊论文 |
任延珍;柳登凯;杨靖;王丽娜 |
31 |
A rotation-invariant convolutional neural network for image enhancement forensics
|
会议论文 |
Yifang Chen;Zi Xian Lyu;Xiangui Kang |
32 |
Steganalysis based on awareness of selection-channel and deep learning
|
会议论文 |
Yang Jianhua;Liu Kai;Kang Xiangui;Edward Wong;Shi Yunqing |
33 |
基于最优脉冲和脉冲相关性的 AMR 自适应隐写算法
|
期刊论文 |
吴红霞;任延珍;王丽娜 |
34 |
面向JPEG图像的隐写分析盲检测方法
|
期刊论文 |
王丽娜;王汉森;翟黎明;徐一波;任延珍 |
35 |
面向云平台安全监控多维数据的离群节点自识别可视化技术
|
期刊论文 |
吴頔;王丽娜;余荣威;章鑫;徐来 |
36 |
一种基于窗口最优校准的视频隐写分析方法
|
专利 |
王丽娜;翟黎明;徐一波 |
37 |
An efficient and secure 3‐factor user‐authentication protocol for multiserver environment
|
期刊论文 |
Min Luo;Aiying Sun;Debiao He;Xiaohong Li |
38 |
基于分割的邻域最优概率视频隐写分析方法
|
专利 |
王丽娜;翟黎明;徐一波 |
39 |
基于宏块复杂度的自适应视频运动矢量隐写算法
|
期刊论文 |
王丽娜;徐一波;翟黎明;任延珍 |
40 |
Domain Transfer Learning for Hyperspectral Image Super-Resolution
|
期刊论文 |
Xiaoyan Li;Lefei Zhang;Jane You |
41 |
一种基于熵的视频运动矢量隐写检测方法
|
专利 |
王丽娜;徐一波;翟黎明;任延珍;谭选择;任魏翔 |
42 |
Controlled Channel Attack Detection Based on Hardware Virtualization
|
会议论文 |
Qiang Chenyi;Liu Weijie;Wang Lina;Yu Rongwei |
43 |
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis
|
会议论文 |
Huilin Zheng;Xuan Li;Danyang Ruan;Xiangui Kang |
44 |
A novel convert channel detection method in cloud based on XSRM and improved event association algorithm
|
期刊论文 |
Lina Wang;Weijie Liu;Neeraj Kumar;Debiao He;Cheng Tan;Debin Gao |
45 |
Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
|
期刊论文 |
Debiao He;Yudi Zhang;Ding Wang;Kim-Kwang Raymond Choo |
46 |
Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries
|
期刊论文 |
Debiao He;Neeraj Kumar;Sherali Zeadally;Alexey Vinel;Laurence T. Yang |
47 |
Multi-channel neural network for steganalysis
|
会议论文 |
Kai Liu;Qiong Zhang;Xuan Li;Xiangui Kang |
48 |
面向云平台的异构监控数据存储方法
|
期刊论文 |
鞠瑞;王丽娜;余荣威;徐来 |
49 |
Secure independent-update concise-expression access control for video on demand in cloud
|
期刊论文 |
Kun He;Jing Chen;Yu Zhang;Ruiying Du;Yang Xiang;Mohammad Mehedi Hassan;Abdulhameed Alelaiwi |
50 |
一种基于用户影响力以及内容的微博传播 预测方法
|
专利 |
郭晓东;刘金硕;王丽娜;章岚昕;杨广益;陈煜森;李扬眉 |
51 |
面向云平台的硬件辅助 ROP 检测方法.
|
期刊论文 |
王丽娜;周伟康;刘维杰;余荣威 |
52 |
基于残差共生概率的隐写图像载体安全性评价
|
期刊论文 |
王丽娜;王凯歌;徐一波;唐奔宵;谭选择 |
53 |
Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system
|
期刊论文 |
Debiao He;Neeraj Kumar;Kim-Kwang Raymond Choo;Wei Wu |
54 |
A framework of camera source identification Bayesian game
|
期刊论文 |
Hui Zeng;Jingxian Liu;Jingjing Yu;Xiangui Kang;Shi Yunqing;Z. Jane Wang |
55 |
基于块效应的非加性失真JPEG图像隐写方法
|
专利 |
王丽娜;陆宇博 |
56 |
Anti-forensics of JPEG Compression Using Generative Adversarial Networks
|
会议论文 |
Yingmin Luo;Hanqi Zi;Qiong Zhang;Xiangui Kang |
57 |
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
|
期刊论文 |
Lai Xu;Rongwei Yu;Lina Wang;Weijie Liu |
58 |
SPRD: 基于应用 UI 和程序依赖图的 Android 重打包应用快速检测方法
|
期刊论文 |
汪润;王丽娜;唐奔宵;赵磊 |
59 |
基于纹理复杂度的JPEG图像自适应隐写
|
期刊论文 |
王丽娜;谭选择;徐一波;翟黎明 |
60 |
Joint weighted nuclear norm and total variation regularization for hyperspectral image denoising
|
期刊论文 |
Du Bo;Huang Zhiqiang;Wang Nan;Zhang Yuxiang;Jia Xiuping |
61 |
深度学习在图像隐写术与隐写分析领域中的研究进展
|
期刊论文 |
翟黎明;嘉炬;任魏翔;徐一波;王丽娜 |
62 |
The Evaluation of the Embedded Software Quality Based on the Binary Code
|
会议论文 |
Liu Jinshuo;Chen Yusen;Zhang Lanxin;Zhang Weixin |
63 |
Ensemble of CNN and rich model for steganalysis
|
会议论文 |
Kai Liu;Jianhua Yang;Xiangui Kang |
64 |
Audio recapture detection with convolutional neural networks
|
期刊论文 |
Xiaodan Lin;Jingxian Liu;Xiangui Kang |
65 |
一种基于纹理复杂度的JPEG图像自适应隐写 方法
|
专利 |
王丽娜;徐一波;翟黎明;谭选择;任魏翔;王汉森;王博 |
66 |
一种基于C-MAC特征的AACHuffman域隐写分析方法
|
专利 |
任延珍;熊翘楚;王丽娜;熊浩 |
67 |
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis
|
期刊论文 |
Jia Ju;Zhai Liming;Wang Lina |
68 |
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference
|
期刊论文 |
Benxiao Tang;Zhibo Wang;Run Wang;Lei Zhao;Lina Wang |
69 |
一种基于三元特征的深度注意力谣言鉴别方法
|
专利 |
王丽娜;陈铜 |
70 |
A multi-purpose countermeasure against image anti-forensics using autoregressive model
|
期刊论文 |
Hui Zeng;Xiangui Kang;Anjie Peng |
71 |
A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization
|
期刊论文 |
Donghui Hu;Haiyan Xu;Zhongjin Ma;Shuli Zheng;Bin Li |
72 |
Independent encoding joint sparse representation and multitask learning for hyperspectral target detection
|
期刊论文 |
Zhang Yuxiang;Ke Wu;Du Bo;Hu Xiangyun |
73 |
Exploiting interslice correlation for MRI prostate image segmentation, from recursive neural networks aspect
|
期刊论文 |
Zhu Qikui;Du Bo;Baris Turkbey;Peter Choyke;Yan Pingkun |
74 |
DroidFAR: 一种基于程序语义的 Android 重打包应用抗混淆检测方法
|
期刊论文 |
汪润;唐奔宵;王丽娜 |
75 |
Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
|
期刊论文 |
Liu Dong;Chen Jing;Du Ruiying;Zhang Huanguo |
76 |
Image splicing localization using PCA-based noise level estimation
|
期刊论文 |
Hui Zeng;Yifeng Zhan;Xiangui Kang;Xiaodan Lin |
77 |
一种基于手机传感器的行为特征识别认证方法
|
专利 |
王丽娜;王汉森;谈诚;徐来;唐奔宵 |
78 |
Steganalysis of AAC using calibrated Markov model of adjacent codebook
|
会议论文 |
Ren Yanzhen;Wang Lina;Xiong Qiaochu |
79 |
Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction
|
期刊论文 |
Xiaodan Lin;Xiangui Kang |
80 |
一种基于用户评论的Android应用权限推理方法
|
专利 |
王丽娜;汪润;唐奔宵;赵磊;王志波 |
81 |
Beyond the sparsity-based target detector: A hybrid sparsity and statistics-based detector for hyperspectral images
|
期刊论文 |
Bo Du;Yuxiang Zhang;Liangpei Zhang;Dacheng Tao |
82 |
基于边信息估计的 JPEG 图像隐写方法
|
期刊论文 |
王丽娜;王博;翟黎明;徐一波 |
83 |
面向云计算平台的虚拟机同驻方法
|
期刊论文 |
刘维杰;王丽娜;王丹磊;尹正光;付楠 |
84 |
CertChain: Public and efficient certificate audit based on blockchain for TLS connections
|
会议论文 |
Chen Jing;Yao Shixiong;Yuan Quan;He Kun;Ji Shouling;Du Ruiying |
85 |
LAM3L: Locally adaptive maximum margin metric learning for visual data classification
|
期刊论文 |
Yanni Dong;Du Bo;Leifei Zhang;Liangpei Zhang;Dacheng Tao |
86 |
Self-Representative Manifold Concept Factorization with Adaptive Neighbors for Clustering
|
会议论文 |
Sihan Ma;Lefei Zhang;Wenbin Hu;Yipeng Zhang;Jia Wu;Xuelong Li |
87 |
Countering JPEG anti-forensics based on noise level estimation
|
期刊论文 |
Hui Zeng;Jingjing Yu;Xiangui Kang;Siwei LYU |
88 |
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model
|
期刊论文 |
Yanzhen Ren;Hanyi Yang;Hongxia Wu;Weiping Tu;Lina Wang |
89 |
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H. 264/AVC
|
会议论文 |
Zhai Liming;Wang Lina;Ren Yanzhen |
90 |
An AMR Adaptive steganographic Scheme Based on the Pitch Delay of Unvoiced Speech
|
期刊论文 |
Yanzhen Ren;Dengkai Liu;Jing Yang;Lina Wang |
91 |
Adaptive steganalysis based on selection region and combined convolutional neural networks
|
期刊论文 |
Hu Donghui;Shen Qiang;Zhou Shennan;Liu Xueliang;Fan Yunqi;Wang Lina |
92 |
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
|
会议论文 |
Zhai Liming;Wang Lina;Ren Yanzhen |
93 |
一种空域图像隐写分析可信度评估方法
|
专利 |
王丽娜;徐一波;翟黎明;任延珍 |
94 |
面向 SDN 的安全威胁及其对抗技术研究
|
期刊论文 |
王丽娜;王斐;刘维杰 |
95 |
JPEG steganalysis with combined dense connected CNNs and SCA-GFR
|
期刊论文 |
Jianhua Yang;Xiangui Kang;Edward K. Wong;Yun-Qing Shi |
96 |
An embedding cost learning framework using GAN
|
期刊论文 |
Jianhua Yang;Danyang Ruan;Jiwu Huang;Xiangui Kang;Yun-Qing Shi |
97 |
图像视频中 ENF 信号的分析及应用综述
|
期刊论文 |
崔三帅;毛毛雨;林晓丹;康显桂 |
98 |
An unsupervised domain adaptation algorithm based on canonical correlation analysis
|
会议论文 |
Pan Xiao;Bo Du;Xue Li |
99 |
一种基于运动矢量残差相关性的视频隐写分析方法
|
专利 |
王丽娜;翟黎明;徐一波 |
100 |
A novel android malware detection method based on markov blanket
|
会议论文 |
Zhang Xiaotian;Hu Donghui;Fan Yuqi;Yu Kui |
101 |
A Low-Rank Total-Variation Regularized Tensor Completion Algorithm
|
会议论文 |
Liangchen Song;Bo Du;Lefei Zhang;Liangpei Zhang |
102 |
A study of the two-way effects of cover source mismatch and texture complexity in steganalysis
|
会议论文 |
Hu Donghui;Ma Zhongjin;Fan Yuqi;Wang Lina |
103 |
A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame
|
会议论文 |
Ren Yanzhen;Xiong Qiaochu;Wang Lina |
104 |
Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction
|
期刊论文 |
Xiaodan Lin;Xiangui Kang |
105 |
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors
|
期刊论文 |
Zhai Liming;Wang Lina;Ren Yanzhen |
106 |
A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA
|
会议论文 |
Wu Yangxin;Zheng Peijia;Guo Jianting;Zhang Wei;Huang Jiwu |
107 |
基于卷积神经网络的 JPEG 图像隐写分析参照图像生成方法
|
期刊论文 |
任魏翔;翟黎明;王丽娜 |
108 |
A Universal Image Forensics of Smoothing Filtering
|
期刊论文 |
Anjie Peng;Gao Yu;Yadong Wu;Qiong Zhang;Xiangui Kang |
109 |
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions
|
期刊论文 |
Cheng Tan;Qian Wang |
110 |
A multi-purpose image forensic method using densely connected convolutional neural networks
|
期刊论文 |
Yifang Chen;Xiangui Kang;Yunqing Shi;Z. Jane Wang |
111 |
Recognition of spoofed voice using convolutional neural networks
|
会议论文 |
Huixin Liang;Xiaodan Lin;Qiong Zhang;Xiangui Kang |
112 |
A Posterior Evaluation Algorithm of Steganalysis Accuracy Inspired by Residual Co-occurrence Probability
|
期刊论文 |
Lina Wang;Yibo Xu;Liming Zhai;Yanzhen Ren;Bo Du |
113 |
Message‐locked proof of ownership and retrievability with remote repairing in cloud
|
期刊论文 |
Jing Chen;Lihong Zhang;Kun He;Min Chen;Ruiying Du;Lina Wang |
114 |
一种面向中文文本情感倾向性检测的对抗样本生成方法及装置
|
专利 |
王丽娜;王文琦;汪润;唐奔宵 |
115 |
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
|
期刊论文 |
Debiao He;Sherali Zeadally;Libing Wu;Huaqun Wang |
116 |
CAPT: Context-Aware Provenance Tracing for Attack Investigation
|
期刊论文 |
Cheng Tan;Lei Zhao;Weijie Liu;Lai Xu;Lina Wang |
117 |
Replay attack detection based on distortion by loudspeaker for voice authentication
|
期刊论文 |
Yanzhen Ren;Zhong Fang;Dengkai Liu;Changwen Chen |
118 |
Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking
|
会议论文 |
Chen Jian;Chen Ziyang;Zheng Peijia;Guo Jianting;Zhang Wei;Huang Jiwu |
119 |
Densely connected convolutional neural network for multi-purpose image forensics under anti-forensic attacks
|
会议论文 |
Chen Yifang;Kang Xiangui;Wang Z. Jane;Zhang Qiong |
120 |
基于异构特征子空间迁移的JPEG图像失配隐写分析方法
|
专利 |
王丽娜;嘉炬;任魏翔;翟黎明;徐一波 |
121 |
基于熵的视频运动矢量隐写分析算法
|
期刊论文 |
王丽娜;徐一波;翟黎明;任延珍 |