Fenlin Liu

Orcid: 0000-0001-8019-1713

According to our database1, Fenlin Liu authored at least 150 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering.
Inf. Process. Manag., 2025

2024
IP2vec: an IP node representation model for IP geolocation.
Frontiers Comput. Sci., December, 2024

HpGraphNEI: A network entity identification model based on heterophilous graph learning.
Inf. Process. Manag., 2024

Topic Partition of User-Generated Texts for User Identity Linkage Across Social Networks.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., December, 2023

HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning.
Inf. Process. Manag., November, 2023

GraphNEI: A GNN-based network entity identification method for IP geolocation.
Comput. Networks, November, 2023

Ridge-Regression-Induced Robust Graph Relational Network.
IEEE Trans. Cybern., September, 2023

Neural Attention Networks for Recommendation With Auxiliary Data.
IEEE Trans. Netw. Serv. Manag., June, 2023

GWS-Geo: A graph neural network based model for street-level IPv6 geolocation.
J. Inf. Secur. Appl., June, 2023

Meta-path fusion based neural recommendation in heterogeneous information networks.
Neurocomputing, April, 2023

BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models.
Proceedings of the IEEE International Conference on Communications, 2023

Recurrent Attentive Neural Networks for Sequential Recommendation.
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023

2022
Inverse Interpolation and Its Application in Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio.
J. Netw. Comput. Appl., 2022

Extended matrix factorization with entity network construction for recommendation.
J. Ambient Intell. Humaniz. Comput., 2022

Image fragile watermarking algorithm based on deneighbourhood mapping.
IET Image Process., 2022

Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths.
Digit. Commun. Networks, 2022

Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping.
CoRR, 2022

A Fragile Watermarking Algorithm Based on Multiple Watermarking.
Proceedings of the IVSP 2022: 4th International Conference on Image, Video and Signal Processing, Singapore, March 18, 2022

A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021

Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography.
Signal Process., 2021

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021

Feature Selection of the Rich Model Based on the Correlation of Feature Components.
Secur. Commun. Networks, 2021

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching.
KSII Trans. Internet Inf. Syst., 2021

Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021

Self-embedding watermarking method for G-code used in 3D printing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

2020
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels.
IEEE Trans. Circuits Syst. Video Technol., 2020

Thresholding binary coding for image forensics of weak sharpening.
Signal Process. Image Commun., 2020

Towards feature representation for steganalysis of spatial steganography.
Signal Process., 2020

Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020

A novel haze image steganography method via cover-source switching.
J. Vis. Commun. Image Represent., 2020

Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection.
KSII Trans. Internet Inf. Syst., 2020

Color image steganalysis based on embedding change probabilities in differential channels.
Int. J. Distributed Sens. Networks, 2020

Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., 2020

Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Steganalysis of Adaptive Steganography Under the Known Cover Image.
Proceedings of the Security and Privacy in Digital Economy, 2020

On the Sharing-Based Model of Steganography.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

RNBG: A Ranking Nodes Based IP Geolocation Method.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Network Topology Boundary Routing IP Identification for IP Geolocation.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A code protection method against function call analysis in P2P network.
Peer-to-Peer Netw. Appl., 2019

Steganalysis aided by fragile detection of image manipulations.
Multim. Tools Appl., 2019

Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation.
Multim. Tools Appl., 2019

Deep neural network-based image copyright protection scheme.
J. Electronic Imaging, 2019

Attributes revocation through ciphertext puncturation.
J. Inf. Secur. Appl., 2019

An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition.
Int. J. Distributed Sens. Networks, 2019

Color image steganalysis based on channel gradient correlation.
Int. J. Distributed Sens. Networks, 2019

Delay-Distance Correlation Study for IP Geolocation.
CoRR, 2019

IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019

A High Completeness PoP Partition Algorithm for IP Geolocation.
IEEE Access, 2019

An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Security-Sensitive Function Mining Framework for Source Code.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Enhanced branch obfuscation based on exception handling and encrypted mapping table.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018

A Flattened Metadata Service for Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2018

Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Process., 2018

Reliable steganalysis of HUGO steganography based on partially known plaintext.
Multim. Tools Appl., 2018

Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018

网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping).
计算机科学, 2018

Quantitative steganalysis of JPEG additive steganography based on boundary effect.
J. Electronic Imaging, 2018

Extracting hidden messages of MLSB steganography based on optimal stego subset.
Sci. China Inf. Sci., 2018

City-Level IP Geolocation Algorithm Based on PoP Network Topology.
IEEE Access, 2018

Exception Handling-Based Dynamic Software Watermarking.
IEEE Access, 2018

3D Steganalysis Using the Extended Local Feature Set.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

3D Steganalysis Using Laplacian Smoothing at Various Levels.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Optimization of rich model based on fisher criterion for image steganalysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks.
Secur. Commun. Networks, 2017

Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017

2D Gabor filters-based steganalysis of content-adaptive JPEG steganography.
Multim. Tools Appl., 2017

Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017

Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017

An SDN based hopping multicast communication against DoS attack.
KSII Trans. Internet Inf. Syst., 2017

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography.
KSII Trans. Internet Inf. Syst., 2017

Steganalysis Feature Subspace Selection Based on Fisher Criterion.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

IP Geolocation Base on Local Delay Distribution Similarity.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Secur. Commun. Networks, 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016

Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling.
Int. J. Digit. Crime Forensics, 2016

An Image Encryption Algorithm Based on Information Hiding.
Int. J. Bifurc. Chaos, 2016

Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016

A landmark calibration-based IP geolocation approach.
EURASIP J. Inf. Secur., 2016

2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015

基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes).
计算机科学, 2015

Detection of perturbed quantization class stego images based on possible change modes.
J. Electronic Imaging, 2015

Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015

A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015

An Algorithm of City-Level Landmark Mining Based on Internet Forum.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

City-Level Geolocation Based on Routing Feature.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
On Data and Virtualization Security Risks and Solutions of Cloud Computing.
J. Networks, 2014

Recognizing F5-like Stego images from Multi-class JPEG Stego Images.
KSII Trans. Internet Inf. Syst., 2014

Selection of image features for steganalysis based on the Fisher criterion.
Digit. Investig., 2014

A Data Obfuscation Based on State Transition Graph of Mealy Automata.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IEEE Trans. Inf. Forensics Secur., 2013

Fusion of Two Typical Quantitative Steganalysis Based on SVR.
J. Softw., 2013

Operand stack dependence based Java static software birthmark.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

A Chaotic Encryption Algorithm for Palette Image.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Steganalysis of adaptive image steganography in multiple gray code bit-planes.
Multim. Tools Appl., 2012

Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012

Blind image steganalysis based on wavelet coefficient correlation.
Digit. Investig., 2012

Abstract interpretation-based semantic framework for software birthmark.
Comput. Secur., 2012

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane.
Comput. J., 2012

On F5 Steganography in Images.
Comput. J., 2012

LSB Replacement Steganography Software Detection Based on Model Checking.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Embedding Ratio Estimation of MB2 Based on Relativity of Intra-block Pixels.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

2011
On the Typical Statistic Features for Image Blind Steganalysis.
IEEE J. Sel. Areas Commun., 2011

Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis.
J. Multim., 2011

Identification of steganography software based on register dependence.
Int. J. Multim. Intell. Secur., 2011

Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP.
Int. J. Multim. Intell. Secur., 2011

Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Abstract interpretation-based formal description of data obfuscation.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Image universal steganalysis based on best wavelet packet decomposition.
Sci. China Inf. Sci., 2010

Modification ratio estimation for a category of adaptive steganography.
Sci. China Inf. Sci., 2010

2009
Classification between PS and Stego Images Based on Noise Model.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Ratio Estimating for Each Bit Plane of Image.
Proceedings of the Information Hiding, 11th International Workshop, 2009

An Authentication Watermark Algorithm for JPEG images.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.
IEEE Trans. Inf. Forensics Secur., 2008

A review on blind detection for image steganography.
Signal Process., 2008

Stepwise inter-frame correlation-based steganalysis system for video streams.
Secur. Commun. Networks, 2008

Image universal steganalysis based on wavelet packet transform.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Steganalysis Based on Difference Image.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Feature n-gram Set Based Software Zero-Watermarking.
Proceedings of the International Symposium on Information Processing, 2008

Hiding Informationin in Java Class File.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Multi-class steganalysis for Jpeg stego algorithms.
Proceedings of the International Conference on Image Processing, 2008

Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

Secure Steganography in Compressed Video Bitstreams.
Proceedings of the The Third International Conference on Availability, 2008

2007
LTSB Steganalysis Based on Quartic Equation.
Trans. Data Hiding Multim. Secur., 2007

A Software Birthmark Based on Dynamic Opcode n-gram.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Value Combination Technique for Image Authentication.
Proceedings of the Advances in Multimedia Information Processing, 2007

Analysis of Baptista-Type Chaotic Cryptosystem.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Double Zero-Watermarks Scheme Utilizing Scale Invariant Feature Transform and Log-Polar Mapping.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Secret Key Estimation for Image Sequential Steganograph in Transform Domain.
Proceedings of the Global Communications Conference, 2007

2006
Searching and Detecting Spatial LSB Steganographic Images on the Internet.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Real-Time Steganography in Compressed Video.
Proceedings of the Multimedia Content Representation, 2006

A Chaos-Based Robust Software Watermarking.
Proceedings of the Information Security Practice and Experience, 2006

Fast and Blind Restoration Scheme for the Initial States of LFSRs.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Improved Secret Key Estimation Method for Sequential Steganography.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.
Proceedings of the Communications and Multimedia Security, 2006

2005
Detecting LSB Steganography Based on Dynamic Masks.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Improved RS Method for Detection of LSB Steganography.
Proceedings of the Computational Science and Its Applications, 2005

2004
Adaptive robust output feedback controllers guaranteeing uniform ultimate boundedness for uncertain nonlinear systems.
Proceedings of the 2004 American Control Conference, 2004


  Loading...