Hui Tian
Orcid: 0000-0002-1591-656XAffiliations:
- National Huaqiao University, College of Computer Science and Technology, Xiamen, China
- Huazhong University of Science and Technology, Wuhan National Lab for Optoelectronics, China (PhD 2010)
According to our database1,
Hui Tian
authored at least 102 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A generalized detection framework for covert timing channels based on perceptual hashing.
Trans. Emerg. Telecommun. Technol., May, 2024
Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
DS-TDNN: Dual-Stream Time-Delay Neural Network With Global-Aware Filter for Speaker Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023
STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023
2022
Int. J. Intell. Syst., December, 2022
ACM Trans. Internet Techn., November, 2022
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022
2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Open J. Commun. Soc., 2021
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network.
IEEE Open J. Comput. Soc., 2021
2020
Swarm Evol. Comput., 2020
Int. J. Netw. Secur., 2020
Future Gener. Comput. Syst., 2020
A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT.
IEEE Access, 2020
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Soft Comput., 2019
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search.
Multim. Tools Appl., 2019
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
Int. J. Netw. Secur., 2019
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network.
Int. J. Netw. Secur., 2019
Int. J. Inf. Technol. Manag., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Provable Security, 2019
2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Inf. Sci., 2018
IEEE Commun. Lett., 2018
Comput. Networks, 2018
Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018
Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
IEEE Trans. Serv. Comput., 2017
Soft Comput., 2017
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017
Mob. Inf. Syst., 2017
云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession).
计算机科学, 2017
KSII Trans. Internet Inf. Syst., 2017
Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017
IEEE Commun. Lett., 2017
IEEE Commun. Lett., 2017
Appl. Soft Comput., 2017
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017
Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Rumor restraining based on propagation prediction with limited observations in large-scale social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Cellular direction information based differential evolution for numerical optimization: an empirical study.
Soft Comput., 2016
Soft Comput., 2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2016
计算机科学, 2016
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams.
J. Ambient Intell. Humaniz. Comput., 2016
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016
IEEE Commun. Lett., 2016
Improving differential evolution with a new selection method of parents for mutation.
Frontiers Comput. Sci., 2016
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
Int. J. Inf. Technol. Web Eng., 2015
Comput. Commun., 2015
Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015
Ad Hoc Sens. Wirel. Networks, 2015
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Improving security of quantization-index-modulation steganography in low bit-rate speech streams.
Multim. Syst., 2014
Ann. des Télécommunications, 2014
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream.
Ann. des Télécommunications, 2014
Proceedings of the International Conference on Smart Computing, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Secur. Commun. Networks, 2013
2012
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]
Comput. Commun., 2012
Comput. J., 2012
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Comput. Commun., 2011
2009
Proceedings of the 17th International Conference on Multimedia 2009, 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008