2025
Smart contract-based public integrity auditing for cloud storage against malicious auditors.
Future Gener. Comput. Syst., 2025
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage.
Comput. Secur., 2025
Covert timing channel detection based on isolated binary trees.
Comput. Secur., 2025
2024
Public auditing of log integrity for shared cloud storage systems via blockchain.
Wirel. Networks, October, 2024
A generalized detection framework for covert timing channels based on perceptual hashing.
Trans. Emerg. Telecommun. Technol., May, 2024
Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
DS-TDNN: Dual-Stream Time-Delay Neural Network With Global-Aware Filter for Speaker Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023
STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023
2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data.
ACM Trans. Internet Techn., November, 2022
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022
A Novel Global-Local Representations Network for Speech Steganalysis.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022
2021
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension.
IEEE Trans. Circuits Syst. Video Technol., 2021
Detection of Covert Timing Channel Based on Time Series Symbolization.
IEEE Open J. Commun. Soc., 2021
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network.
IEEE Open J. Comput. Soc., 2021
2020
Self-organizing neighborhood-based differential evolution for global optimization.
Swarm Evol. Comput., 2020
StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020
Data collection from WSNs to the cloud based on mobile Fog elements.
Future Gener. Comput. Syst., 2020
A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT.
IEEE Access, 2020
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020
Data Auditing for the Internet of Things Environments Leveraging Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search.
Multim. Tools Appl., 2019
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019
Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019
A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network.
Int. J. Netw. Secur., 2019
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network.
Int. J. Netw. Secur., 2019
A collusion-resistant public auditing scheme for shared cloud data.
Int. J. Inf. Technol. Manag., 2019
Public Auditing for Trusted Cloud Storage Services.
IEEE Secur. Priv., 2019
Steganalysis of AMR Speech Based on Multiple Classifiers Combination.
IEEE Access, 2019
Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules.
IEEE Access, 2019
A Neighborhood-Assisted Framework for Differential Evolution.
IEEE Access, 2019
Multitasking differential evolution with difference vector sharing mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing.
Proceedings of the Provable Security, 2019
2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018
An Effective Authentication Scheme Using DCT for Mobile Devices.
Symmetry, 2018
StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018
Differential evolution with individual-dependent topology adaptation.
Inf. Sci., 2018
Social learning differential evolution.
Inf. Sci., 2018
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018
Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018
Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018
Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017
Distributed steganalysis of compressed speech.
Soft Comput., 2017
Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017
Neighborhood guided differential evolution.
Soft Comput., 2017
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017
云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession).
计算机科学, 2017
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP.
KSII Trans. Internet Inf. Syst., 2017
Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017
Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System.
IEEE Commun. Lett., 2017
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017
Interoperable localization for mobile group users.
Comput. Commun., 2017
Neighborhood-adaptive differential evolution for global numerical optimization.
Appl. Soft Comput., 2017
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017
Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017
Secure Logging and Public Audit for Operation Behavior in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Rumor restraining based on propagation prediction with limited observations in large-scale social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Cellular direction information based differential evolution for numerical optimization: an empirical study.
Soft Comput., 2016
Adaptive direction information in differential evolution for numerical optimization.
Soft Comput., 2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016
Trends in modern information hiding: techniques, applications, and detection.
Secur. Commun. Networks, 2016
两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2016
一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol).
计算机科学, 2016
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams.
J. Ambient Intell. Humaniz. Comput., 2016
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016
A Novel Connection Correlation Scheme Based on Threshold Secret Sharing.
IEEE Commun. Lett., 2016
Improving differential evolution with a new selection method of parents for mutation.
Frontiers Comput. Sci., 2016
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016
Operational-Behavior Auditing in Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015
A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015
Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015
Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015
BlueCat: An Infrastructure-Free System for Relative Mobile Localization.
Ad Hoc Sens. Wirel. Networks, 2015
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015
2014
Improving security of quantization-index-modulation steganography in low bit-rate speech streams.
Multim. Syst., 2014
Network forensics and challenges for cybersecurity.
Ann. des Télécommunications, 2014
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream.
Ann. des Télécommunications, 2014
Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014
Improving Differential Evolution with Ring Topology-Based Mutation Operators.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Trends in modern information hiding: techniques, applications and detection.
Secur. Commun. Networks, 2013
2012
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]
Comput. Commun., 2012
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography.
Comput. J., 2012
State-based steganography in low bit rate speech.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012
Least-significant-digit steganography in low bitrate speech.
Proceedings of IEEE International Conference on Communications, 2012
2011
Adaptive partial-matching steganography for voice over IP using triple M sequences.
Comput. Commun., 2011
2009
Digital logic based encoding strategies for steganography on voice-over-IP.
Proceedings of the 17th International Conference on Multimedia 2009, 2009
An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009
2008
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008