Xiangyang Luo
Orcid: 0000-0002-2747-4236
According to our database1,
Xiangyang Luo
authored at least 283 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering.
Inf. Process. Manag., 2025
2024
Frontiers Comput. Sci., December, 2024
Int. J. Comput. Vis., November, 2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024
6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning.
IEEE Trans. Netw. Serv. Manag., August, 2024
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.
Frontiers Comput. Sci., June, 2024
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation.
IEEE Trans. Circuits Syst. Video Technol., March, 2024
Inf. Process. Manag., March, 2024
CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images.
IEEE Trans. Cogn. Dev. Syst., February, 2024
J. Inf. Secur. Appl., February, 2024
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles.
IEEE Trans. Serv. Comput., 2024
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping.
IEEE Trans. Dependable Secur. Comput., 2024
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Pattern Anal. Mach. Intell., 2024
Neural Networks, 2024
J. Inf. Secur. Appl., 2024
TaReT: Temporal knowledge graph reasoning based on topology-aware dynamic relation graph and temporal fusion.
Inf. Process. Manag., 2024
HpGraphNEI: A network entity identification model based on heterophilous graph learning.
Inf. Process. Manag., 2024
Improving the transferability of adversarial examples through black-box feature attacks.
Neurocomputing, 2024
A review of graph neural networks and pretrained language models for knowledge graph reasoning.
Neurocomputing, 2024
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification.
CoRR, 2024
Comput. Secur., 2024
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur., 2024
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks, 2024
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Fed2VAEs: An Efficient Privacy-Preserving Federated Learning Approach Based on Variational Autoencoders.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., December, 2023
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023
Twitter user geolocation based on heterogeneous relationship modeling and representation learning.
Inf. Sci., November, 2023
Inf. Sci., October, 2023
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments.
IEEE Trans. Consumer Electron., August, 2023
IEEE Trans. Big Data, August, 2023
CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment.
IEEE Trans. Circuits Syst. Video Technol., May, 2023
Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023
Comput. Secur., April, 2023
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Multim., 2023
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023
An accurate identification method for network devices based on spatial attention mechanism.
Secur. Saf., 2023
SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis.
IET Image Process., 2023
Comput. Stand. Interfaces, 2023
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples.
CoRR, 2023
Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Int. J. Intell. Syst., December, 2022
DR-NET: a novel mobile anchor-assisted localization method based on the density of nodes distribution.
Wirel. Networks, 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network.
IEEE Trans. Circuits Syst. Video Technol., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks.
Symmetry, 2022
Signal Process., 2022
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.
Secur. Commun. Networks, 2022
Multim. Tools Appl., 2022
Steganographic key recovery for adaptive steganography under "known-message attacks".
Multim. Tools Appl., 2022
Classifying between computer generated and natural images: An empirical study from RAW to JPEG format.
J. Vis. Commun. Image Represent., 2022
Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022
Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio.
J. Netw. Comput. Appl., 2022
IP-geolocater: a more reliable IP geolocation algorithm based on router error training.
Frontiers Comput. Sci., 2022
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths.
Digit. Commun. Networks, 2022
Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy.
Comput. Commun., 2022
Comput. Networks, 2022
Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning.
Proceedings of the Big Data and Security - 4th International Conference, 2022
Multi-Attribute Controlled Text Generation with Contrastive-Generator and External-Discriminator.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
ACM Trans. Internet Things, 2021
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021
Signal Process. Image Commun., 2021
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography.
Signal Process., 2021
Robust steganography resisting JPEG compression by improving selection of cover element.
Signal Process., 2021
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.
Secur. Commun. Networks, 2021
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching.
KSII Trans. Internet Inf. Syst., 2021
Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021
Instant messaging user geolocating method based on multi-source information association.
Int. J. Sens. Networks, 2021
Int. J. Intell. Syst., 2021
Int. J. Distributed Sens. Networks, 2021
CoRR, 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Research of Robust Video Object Tracking Algorithm Based on Jetson Nano Embedded Platform.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020
Secur. Commun. Networks, 2020
Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
J. Vis. Commun. Image Represent., 2020
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes.
J. Real Time Image Process., 2020
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020
A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020
Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection.
KSII Trans. Internet Inf. Syst., 2020
Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020
Heterogeneous graph-based joint representation learning for users and POIs in location-based social network.
Inf. Process. Manag., 2020
Color image steganalysis based on embedding change probabilities in differential channels.
Int. J. Distributed Sens. Networks, 2020
A reversible database watermarking method non-redundancy shifting-based histogram gaps.
Int. J. Distributed Sens. Networks, 2020
Frontiers Comput. Sci., 2020
EURASIP J. Image Video Process., 2020
Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
ACM Trans. Inf. Syst., 2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019
IEEE Trans. Inf. Forensics Secur., 2019
<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction.
IEEE Trans. Circuits Syst. Video Technol., 2019
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019
Multim. Tools Appl., 2019
J. Univers. Comput. Sci., 2019
Efficient stego key recovery based on distribution differences of extracting message bits.
J. Real Time Image Process., 2019
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019
An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition.
Int. J. Distributed Sens. Networks, 2019
Int. J. Distributed Sens. Networks, 2019
Int. J. Digit. Crime Forensics, 2019
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019
IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019
Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
DLocRL: A Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets.
Proceedings of the World Wide Web Conference, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
A Label-Specific Attention-Based Network with Regularized Loss for Multi-label Classification.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning, 2019
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018
Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018
Signal Process., 2018
Secur. Commun. Networks, 2018
Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018
网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping).
计算机科学, 2018
J. Netw. Comput. Appl., 2018
J. Electronic Imaging, 2018
Reversible data hiding in encrypted image with separable capability and high embedding capacity.
Inf. Sci., 2018
Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018
Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018
Int. J. Digit. Crime Forensics, 2018
Sci. China Inf. Sci., 2018
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
IEEE Signal Process. Lett., 2017
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017
On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband.
J. Electronic Imaging, 2017
KSII Trans. Internet Inf. Syst., 2017
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation.
Int. J. Digit. Crime Forensics, 2017
CoRR, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016
Int. J. Digit. Crime Forensics, 2016
Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016
Sci. China Inf. Sci., 2016
2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015
Detection of perturbed quantization class stego images based on possible change modes.
J. Electronic Imaging, 2015
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Digit. Investig., 2014
2013
Wirel. Pers. Commun., 2013
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IEEE Trans. Inf. Forensics Secur., 2013
A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013
Signal Process., 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Steganalysis of F5-like steganography based on selection of joint distribution features.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013
2012
Multim. Tools Appl., 2012
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012
Digit. Investig., 2012
Comput. Secur., 2012
Comput. J., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
2011
IEEE J. Sel. Areas Commun., 2011
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis.
J. Multim., 2011
Int. J. Multim. Intell. Secur., 2011
Int. J. Multim. Intell. Secur., 2011
2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
2007
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007
Proceedings of the Global Communications Conference, 2007
2006
Searching and Detecting Spatial LSB Steganographic Images on the Internet.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004