Fenlin Liu
Orcid: 0000-0001-8019-1713
According to our database1,
Fenlin Liu
authored at least 150 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering.
Inf. Process. Manag., 2025
2024
Frontiers Comput. Sci., December, 2024
HpGraphNEI: A network entity identification model based on heterophilous graph learning.
Inf. Process. Manag., 2024
Topic Partition of User-Generated Texts for User Identity Linkage Across Social Networks.
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., December, 2023
Inf. Process. Manag., November, 2023
Comput. Networks, November, 2023
IEEE Trans. Cybern., September, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
J. Inf. Secur. Appl., June, 2023
Neurocomputing, April, 2023
BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023
2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio.
J. Netw. Comput. Appl., 2022
J. Ambient Intell. Humaniz. Comput., 2022
IET Image Process., 2022
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths.
Digit. Commun. Networks, 2022
Proceedings of the IVSP 2022: 4th International Conference on Image, Video and Signal Processing, Singapore, March 18, 2022
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography.
Signal Process., 2021
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching.
KSII Trans. Internet Inf. Syst., 2021
Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Signal Process. Image Commun., 2020
Signal Process., 2020
Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020
J. Vis. Commun. Image Represent., 2020
Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection.
KSII Trans. Internet Inf. Syst., 2020
Color image steganalysis based on embedding change probabilities in differential channels.
Int. J. Distributed Sens. Networks, 2020
EURASIP J. Image Video Process., 2020
Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Peer-to-Peer Netw. Appl., 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
J. Electronic Imaging, 2019
An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition.
Int. J. Distributed Sens. Networks, 2019
Int. J. Distributed Sens. Networks, 2019
IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Parallel Distributed Syst., 2018
Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018
Signal Process., 2018
Multim. Tools Appl., 2018
Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018
网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping).
计算机科学, 2018
J. Electronic Imaging, 2018
Sci. China Inf. Sci., 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
2017
Secur. Commun. Networks, 2017
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017
KSII Trans. Internet Inf. Syst., 2017
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016
Int. J. Digit. Crime Forensics, 2016
Int. J. Bifurc. Chaos, 2016
Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016
2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015
基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes).
计算机科学, 2015
Detection of perturbed quantization class stego images based on possible change modes.
J. Electronic Imaging, 2015
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Digit. Investig., 2014
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Multim. Tools Appl., 2012
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012
Digit. Investig., 2012
Comput. Secur., 2012
Comput. J., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012
2011
IEEE J. Sel. Areas Commun., 2011
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis.
J. Multim., 2011
Int. J. Multim. Intell. Secur., 2011
Int. J. Multim. Intell. Secur., 2011
Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Secur. Commun. Networks, 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the International Conference on Image Processing, 2008
Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007
Proceedings of the Advances in Multimedia Information Processing, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Double Zero-Watermarks Scheme Utilizing Scale Invariant Feature Transform and Log-Polar Mapping.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the Global Communications Conference, 2007
2006
Searching and Detecting Spatial LSB Steganographic Images on the Internet.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Adaptive robust output feedback controllers guaranteeing uniform ultimate boundedness for uncertain nonlinear systems.
Proceedings of the 2004 American Control Conference, 2004