default search action
Fenlin Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j89]Zhaorui Ma, Xinhao Hu, Fenlin Liu, Xiangyang Luo, Shicheng Zhang, Wenxin Tai, Guoming Ren, Zheng Er, Mingming Xu:
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering. Inf. Process. Manag. 62(1): 103921 (2025) - 2024
- [j88]Fan Zhang, Meijuan Yin, Fenlin Liu, Xiangyang Luo, Shuodi Zu:
IP2vec: an IP node representation model for IP geolocation. Frontiers Comput. Sci. 18(6): 186506 (2024) - [j87]Na Li, Tianao Li, Zhaorui Ma, Xinhao Hu, Shicheng Zhang, Fenlin Liu, Xiaowen Quan, Xiangyang Luo, Guoming Ren, Hao Feng, Shubo Zhang:
HpGraphNEI: A network entity identification model based on heterophilous graph learning. Inf. Process. Manag. 61(5): 103810 (2024) - [c60]Xiaoyu Guo, Yan Liu, Fenlin Liu:
Topic Partition of User-Generated Texts for User Identity Linkage Across Social Networks. IJCNN 2024: 1-7 - 2023
- [j86]Zhaorui Ma, Shicheng Zhang, Na Li, Tianao Li, Xinhao Hu, Hao Feng, Qinglei Zhou, Fenlin Liu, Xiaowen Quan, Hongjian Wang, Guangwu Hu, Shubo Zhang, Yaqi Zhai, Shuaibin Chen, Shuaiwei Zhang:
GraphNEI: A GNN-based network entity identification method for IP geolocation. Comput. Networks 235: 109946 (2023) - [j85]Fan Zhang, Fenlin Liu, Xiangyang Luo:
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis. EURASIP J. Image Video Process. 2023(1): 2 (2023) - [j84]Lei Tan, Daofu Gong, Jinmao Xu, Zhenyu Li, Fenlin Liu:
Meta-path fusion based neural recommendation in heterogeneous information networks. Neurocomputing 529: 236-248 (2023) - [j83]Zhaorui Ma, Xinhao Hu, Na Li, Hao Feng, Shicheng Zhang, Tianao Li, Fenlin Liu, Qinglei Zhou, Zhankui Tian, Hongjian Wang, Guangwu Hu:
HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning. Inf. Process. Manag. 60(6): 103518 (2023) - [j82]Zhaorui Ma, Shicheng Zhang, Xinhao Hu, Na Li, Qinglei Zhou, Fenlin Liu, Hongjian Wang, Guangwu Hu, Qilin Dong:
GWS-Geo: A graph neural network based model for street-level IPv6 geolocation. J. Inf. Secur. Appl. 75: 103511 (2023) - [j81]Taisong Jin, Jie Liu, Huaqiang Dai, Lingling Li, Fenlin Liu, Yongdong Zhang:
Ridge-Regression-Induced Robust Graph Relational Network. IEEE Trans. Cybern. 53(9): 5631-5640 (2023) - [j80]Lei Tan, Daofu Gong, Zhenyu Li, Shaoyong Du, Fenlin Liu:
Neural Attention Networks for Recommendation With Auxiliary Data. IEEE Trans. Netw. Serv. Manag. 20(2): 1125-1139 (2023) - [c59]Lei Tan, Jinmao Xu, Daofu Gong, Fenlin Liu:
Recurrent Attentive Neural Networks for Sequential Recommendation. CNML 2023: 356-360 - [c58]Haoyu Lu, Daofu Gong, Zhenyu Li, Feng Liu, Fenlin Liu:
BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models. ICC 2023: 2870-2876 - 2022
- [j79]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths. Digit. Commun. Networks 8(4): 455-465 (2022) - [j78]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image fragile watermarking algorithm based on deneighbourhood mapping. IET Image Process. 16(10): 2652-2664 (2022) - [j77]Jinmao Xu, Lei Tan, Daofu Gong, Fenlin Liu:
Extended matrix factorization with entity network construction for recommendation. J. Ambient Intell. Humaniz. Comput. 13(4): 1763-1775 (2022) - [j76]Yimin Liu, Xiangyang Luo, Meng Zhang, Zhiyuan Tao, Fenlin Liu:
Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio. J. Netw. Comput. Appl. 199: 103302 (2022) - [j75]Liyan Zhu, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
Inverse Interpolation and Its Application in Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4052-4064 (2022) - [c57]Xiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu:
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment. ICAIS (3) 2022: 663-677 - [c56]Yilong Wang, Daofu Gong, Zhenyu Li, Fenlin Liu:
A Fragile Watermarking Algorithm Based on Multiple Watermarking. IVSP 2022: 48-55 - [i2]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping. CoRR abs/2201.10272 (2022) - 2021
- [j74]Yi Zhang, Xiangyang Luo, Jinwei Wang, Yanqing Guo, Fenlin Liu:
Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564: 306-326 (2021) - [j73]Zhiyuan Tao, Fenlin Liu, Yan Liu, Xiangyang Luo:
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching. KSII Trans. Internet Inf. Syst. 15(8): 2764-2782 (2021) - [j72]Shunhao Jin, Fenlin Liu, Chunfang Yang, Yuanyuan Ma, Yuan Liu:
Feature Selection of the Rich Model Based on the Correlation of Feature Components. Secur. Commun. Networks 2021: 6680528:1-6680528:12 (2021) - [j71]Liyan Zhu, Jinwei Wang, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. Secur. Commun. Networks 2021: 9864833:1-9864833:15 (2021) - [j70]Liyan Zhu, Xiangyang Luo, Chunfang Yang, Yi Zhang, Fenlin Liu:
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Signal Process. 183: 108015 (2021) - [j69]Wenqi Shi, Xiangyang Luo, Jiadong Guo, Chong Liu, Fenlin Liu:
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis. IEEE Trans. Comput. Soc. Syst. 8(2): 319-331 (2021) - [c55]Zhenyu Li, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors:
Self-embedding watermarking method for G-code used in 3D printing. WIFS 2021: 1-6 - 2020
- [j68]Fan Zhang, Fenlin Liu, Xiangyang Luo:
Geolocation of covert communication entity on the Internet for post-steganalysis. EURASIP J. Image Video Process. 2020(1): 15 (2020) - [j67]Chunfang Yang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang, Xiangyang Luo:
Color image steganalysis based on embedding change probabilities in differential channels. Int. J. Distributed Sens. Networks 16(5) (2020) - [j66]Hechan Tian, Fenlin Liu, Xiangyang Luo, Fan Zhang, Yaqiong Qiao:
Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection. KSII Trans. Internet Inf. Syst. 14(10): 3972-3988 (2020) - [j65]Baojun Qi, Chunfang Yang, Lei Tan, Xiangyang Luo, Fenlin Liu:
A novel haze image steganography method via cover-source switching. J. Vis. Commun. Image Represent. 70: 102814 (2020) - [j64]Lei Tan, Chunfang Yang, Fenlin Liu, Xiangyang Luo, Baojun Qi, Zhenyu Li:
Steganalysis of homogeneous-representation based steganography for high dynamic range images. Multim. Tools Appl. 79(27-28): 20079-20105 (2020) - [j63]Ping Wang, Fenlin Liu, Chunfang Yang:
Towards feature representation for steganalysis of spatial steganography. Signal Process. 169: 107422 (2020) - [j62]Ping Wang, Fenlin Liu, Chunfang Yang:
Thresholding binary coding for image forensics of weak sharpening. Signal Process. Image Commun. 88: 115956 (2020) - [j61]Yi Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2750-2764 (2020) - [c54]Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo:
Network Topology Boundary Routing IP Identification for IP Geolocation. ICAIS (2) 2020: 534-544 - [c53]Chong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu:
RNBG: A Ranking Nodes Based IP Geolocation Method. INFOCOM Workshops 2020: 80-84 - [c52]Xianfeng Zhao, Chunfang Yang, Fenlin Liu:
On the Sharing-Based Model of Steganography. IWDW 2020: 94-105 - [c51]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Steganalysis of Adaptive Steganography Under the Known Cover Image. SPDE 2020: 560-574 - [c50]Hechan Tian, Meng Zhang, Xiangyang Luo, Fenlin Liu, Yaqiong Qiao:
Twitter User Location Inference Based on Representation Learning and Label Propagation. WWW 2020: 2648-2654
2010 – 2019
- 2019
- [j60]Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection. IEEE Access 7: 24282-24289 (2019) - [j59]Fuxiang Yuan, Fenlin Liu, Donghua Huang, Yan Liu, Xiangyang Luo:
A High Completeness PoP Partition Algorithm for IP Geolocation. IEEE Access 7: 28340-28355 (2019) - [j58]Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Qingfeng Cheng, Fenlin Liu:
IP Geolocation based on identification routers and local delay distribution similarity. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j57]Yuhan Kang, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, Ping Wang:
Color image steganalysis based on channel gradient correlation. Int. J. Distributed Sens. Networks 15(5) (2019) - [j56]Wenyan Liu, Xiangyang Luo, Qing Mu, Yimin Liu, Fenlin Liu:
An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition. Int. J. Distributed Sens. Networks 15(5) (2019) - [j55]Hongyong Jia, Yue Chen, Yan Li, Xincheng Yan, Fenlin Liu, Xiangyang Luo, Bo Wang:
Attributes revocation through ciphertext puncturation. J. Inf. Secur. Appl. 48 (2019) - [j54]Haoyu Lu, Daofu Gong, Fenlin Liu, Ping Wang, Yuhan Kang:
Deep neural network-based image copyright protection scheme. J. Electronic Imaging 28(2): 023021 (2019) - [j53]Liu Feng, Daofu Gong, Fenlin Liu, Haoyu Lu:
Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation. Multim. Tools Appl. 78(7): 8133-8149 (2019) - [j52]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Steganalysis aided by fragile detection of image manipulations. Multim. Tools Appl. 78(16): 23309-23328 (2019) - [j51]Fei Xiang, Daofu Gong, Jie Li, Fenlin Liu:
A code protection method against function call analysis in P2P network. Peer-to-Peer Netw. Appl. 12(6): 1799-1809 (2019) - [c49]Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu:
Enhanced branch obfuscation based on exception handling and encrypted mapping table. ACM TUR-C 2019: 140:1-140:9 - [c48]Te Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo:
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement. ICAIS (3) 2019: 163-177 - [c47]Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding:
A Security-Sensitive Function Mining Framework for Source Code. ICAIS (4) 2019: 421-432 - [i1]Shichang Ding, Xiangyang Luo, Dengpan Ye, Fenlin Liu:
Delay-Distance Correlation Study for IP Geolocation. CoRR abs/1909.02439 (2019) - 2018
- [j50]Yilong Wang, Daofu Gong, Bin Lu, Fei Xiang, Fenlin Liu:
Exception Handling-Based Dynamic Software Watermarking. IEEE Access 6: 8882-8889 (2018) - [j49]Shuodi Zu, Xiangyang Luo, Siqi Liu, Yan Liu, Fenlin Liu:
City-Level IP Geolocation Algorithm Based on PoP Network Topology. IEEE Access 6: 64867-64875 (2018) - [j48]Chunfang Yang, Xiangyang Luo, Jicang Lu, Fenlin Liu:
Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci. 61(11): 119103:1-119103:3 (2018) - [j47]Jicang Lu, Chunfang Yang, Fenlin Liu, Xiangyang Luo:
Quantitative steganalysis of JPEG additive steganography based on boundary effect. J. Electronic Imaging 27(2): 023004 (2018) - [j46]Yang Zhou, Qing Xu, Xiangyang Luo, Fenlin Liu, Long Zhang, Xiaofei Hu:
网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping). 计算机科学 45(5): 1-4 (2018) - [j45]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Blind forensics of image gamma transformation and its application in splicing detection. J. Vis. Commun. Image Represent. 55: 80-90 (2018) - [j44]Junjun Gan, Jiu-fen Liu, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Reliable steganalysis of HUGO steganography based on partially known plaintext. Multim. Tools Appl. 77(14): 18007-18027 (2018) - [j43]Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, Xiangyang Luo:
On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146: 99-111 (2018) - [j42]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Parameter estimation of image gamma transformation based on zero-value histogram bin locations. Signal Process. Image Commun. 64: 33-45 (2018) - [j41]Siyang Li, Fenlin Liu, Jiwu Shu, Youyou Lu, Tao Li, Yang Hu:
A Flattened Metadata Service for Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 29(12): 2641-2657 (2018) - [j40]Ziru Peng, Xiangyang Luo, Fan Zhao, Qingfeng Cheng, Fenlin Liu:
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device. Wirel. Commun. Mob. Comput. 2018: 2769417:1-2769417:19 (2018) - [c46]Yiqin Zhang, Fenlin Liu, Hongyan Jia, Jicang Lu, Chunfang Yang:
Optimization of rich model based on fisher criterion for image steganalysis. ICACI 2018: 187-192 - [c45]Zhenyu Li, Fenlin Liu, Adrian G. Bors:
3D Steganalysis Using Laplacian Smoothing at Various Levels. ICCCS (6) 2018: 223-232 - [c44]Pai Liu, Fenlin Liu, Daofu Gong:
Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect. ICCCS (2) 2018: 366-376 - [c43]Bin Lu, Fenlin Liu, Ping Xu, Xin Ge:
Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation. ICCCS (3) 2018: 506-518 - [c42]Zhenyu Li, Daofu Gong, Fenlin Liu, Adrian G. Bors:
3D Steganalysis Using the Extended Local Feature Set. ICIP 2018: 1683-1687 - 2017
- [j39]Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. KSII Trans. Internet Inf. Syst. 11(1): 552-569 (2017) - [j38]Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN based hopping multicast communication against DoS attack. KSII Trans. Internet Inf. Syst. 11(4): 2196-2218 (2017) - [j37]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song, Jicang Lu:
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank. J. Electronic Imaging 26(1): 13011 (2017) - [j36]Yi Zhang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multim. Tools Appl. 76(3): 3649-3668 (2017) - [j35]Zhenkun Bao, Xiangyang Luo, Weiming Zhang, Chunfang Yang, Fenlin Liu:
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method. Multim. Tools Appl. 76(12): 14345-14374 (2017) - [j34]Xiaofeng Song, Fenlin Liu, Zhengui Zhang, Chunfang Yang, Xiangyang Luo, Liju Chen:
2D Gabor filters-based steganalysis of content-adaptive JPEG steganography. Multim. Tools Appl. 76(24): 26391-26419 (2017) - [j33]Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. Secur. Commun. Networks 2017: 1560594:1-1560594:12 (2017) - [c41]Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Fenlin Liu:
IP Geolocation Base on Local Delay Distribution Similarity. CSS 2017: 383-395 - [c40]Chunfang Yang, Yi Zhang, Ping Wang, Xiangyang Luo, Fenlin Liu, Jicang Lu:
Steganalysis Feature Subspace Selection Based on Fisher Criterion. DSAA 2017: 514-521 - 2016
- [j32]Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A landmark calibration-based IP geolocation approach. EURASIP J. Inf. Secur. 2016: 4 (2016) - [j31]Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:
Random table and hash coding-based binary code obfuscation against stack trace analysis. IET Inf. Secur. 10(1): 18-27 (2016) - [j30]Xin Ge, Bin Lu, Fenlin Liu, Daofu Gong:
An Image Encryption Algorithm Based on Information Hiding. Int. J. Bifurc. Chaos 26(11): 1650192:1-1650192:14 (2016) - [j29]Ping Wang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling. Int. J. Digit. Crime Forensics 8(2): 36-47 (2016) - [j28]Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu:
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multim. Tools Appl. 75(21): 13557-13583 (2016) - [j27]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A framework of adaptive steganography resisting JPEG compression and detection. Secur. Commun. Networks 9(15): 2957-2971 (2016) - 2015
- [j26]Jicang Lu, Fenlin Liu, Xiangyang Luo:
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix. Digit. Investig. 12: 1-14 (2015) - [j25]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. KSII Trans. Internet Inf. Syst. 9(12): 5209-5228 (2015) - [j24]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song:
Detection of perturbed quantization class stego images based on possible change modes. J. Electronic Imaging 24(6): 063005 (2015) - [j23]Xin Xie, Fenlin Liu, Bin Lu, Daofu Gong:
基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes). 计算机科学 42(3): 167-173 (2015) - [j22]Xiaofeng Song, Fenlin Liu, Xiangyang Luo, Jicang Lu, Yi Zhang:
Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multim. Tools Appl. 74(24): 11045-11071 (2015) - [c39]Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A Landmark Calibration Based IP Geolocation Approach. ARES 2015: 411-416 - [c38]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. ARES 2015: 461-466 - [c37]Fan Zhao, Yuhan Song, Fenlin Liu, Ke Ke, Jingning Chen, Xiangyang Luo:
City-Level Geolocation Based on Routing Feature. AINA 2015: 414-419 - [c36]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang:
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. IH&MMSec 2015: 15-23 - [c35]Guang Zhu, Xiangyang Luo, Fenlin Liu, Jingning Chen:
An Algorithm of City-Level Landmark Mining Based on Internet Forum. NBiS 2015: 294-301 - 2014
- [j21]Jicang Lu, Fenlin Liu, Xiangyang Luo:
Selection of image features for steganalysis based on the Fisher criterion. Digit. Investig. 11(1): 57-66 (2014) - [j20]Jicang Lu, Fenlin Liu, Xiangyang Luo:
Recognizing F5-like Stego images from Multi-class JPEG Stego Images. KSII Trans. Internet Inf. Syst. 8(11): 4153-4169 (2014) - [j19]Xiangyang Luo, Lin Yang, Dai Hao, Fenlin Liu, Daoshun Wang:
On Data and Virtualization Security Risks and Solutions of Cloud Computing. J. Networks 9(3): 571-581 (2014) - [c34]Xin Xie, Fenlin Liu, Bin Lu, Fei Xiang:
Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates. CIS 2014: 524-528 - [c33]Xin Xie, Fenlin Liu, Bin Lu:
A Data Obfuscation Based on State Transition Graph of Mealy Automata. ICIC (1) 2014: 520-531 - 2013
- [j18]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Fusion of Two Typical Quantitative Steganalysis Based on SVR. J. Softw. 8(3): 731-736 (2013) - [j17]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. IEEE Trans. Inf. Forensics Secur. 8(1): 216-228 (2013) - [c32]Wei Wang, Fenlin Liu, Xin Ge, Zheng Zhao:
A Chaotic Encryption Algorithm for Palette Image. CIS 2013: 734-737 - [c31]Yong Wang, Fenlin Liu, Zheng Zhao, Bin Lu, Xin Xie:
Operand stack dependence based Java static software birthmark. FSKD 2013: 1090-1095 - 2012
- [j16]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang:
On F5 Steganography in Images. Comput. J. 55(4): 447-456 (2012) - [j15]Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang:
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. Comput. J. 55(6): 717-727 (2012) - [j14]Ying Zeng, Fenlin Liu, Xiangyang Luo, Shiguo Lian:
Abstract interpretation-based semantic framework for software birthmark. Comput. Secur. 31(4): 377-390 (2012) - [j13]Han Zong, Fenlin Liu, Xiangyang Luo:
Blind image steganalysis based on wavelet coefficient correlation. Digit. Investig. 9(1): 58-68 (2012) - [j12]Jicang Lu, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis. Multim. Tools Appl. 57(1): 91-107 (2012) - [j11]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Ying Zeng:
Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multim. Tools Appl. 57(3): 651-667 (2012) - [c30]Jicang Lu, Fenlin Liu, Sijin Qian, Hui Dai, Jingning Chen:
Embedding Ratio Estimation of MB2 Based on Relativity of Intra-block Pixels. ISPA 2012: 749-754 - [c29]Zheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu:
LSB Replacement Steganography Software Detection Based on Model Checking. IWDW 2012: 54-68 - 2011
- [j10]Jicang Lu, Yongfeng Huang, Fenlin Liu, Xiangyang Luo:
Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP. Int. J. Multim. Intell. Secur. 2(3/4): 225-237 (2011) - [j9]Dongning Zheng, Fenlin Liu, Chunfang Yang, Qian Zhang, Xiangyang Luo:
Identification of steganography software based on register dependence. Int. J. Multim. Intell. Secur. 2(3/4): 339-350 (2011) - [j8]Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis. J. Multim. 6(4): 329-340 (2011) - [j7]Xiangyang Luo, Fenlin Liu, Shiguo Lian, Chunfang Yang, Stefanos Gritzalis:
On the Typical Statistic Features for Image Blind Steganalysis. IEEE J. Sel. Areas Commun. 29(7): 1404-1422 (2011) - [c28]Ying Zeng, Fenlin Liu:
Abstract interpretation-based formal description of data obfuscation. EMEIT 2011: 1447-1450 - [c27]Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu:
Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. SECRYPT 2011: 97-104 - [c26]Xin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li:
A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. SECRYPT 2011: 231-237 - 2010
- [j6]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang:
Image universal steganalysis based on best wavelet packet decomposition. Sci. China Inf. Sci. 53(3): 634-647 (2010) - [j5]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian:
Modification ratio estimation for a category of adaptive steganography. Sci. China Inf. Sci. 53(12): 2472-2484 (2010)
2000 – 2009
- 2009
- [c25]Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing:
An Authentication Watermark Algorithm for JPEG images. ARES 2009: 584-588 - [c24]Chunfang Yang, Xiangyang Luo, Fenlin Liu:
Embedding Ratio Estimating for Each Bit Plane of Image. Information Hiding 2009: 59-72 - [c23]Mao Ye, Fenlin Liu, Chunfang Yang, Xiongfei He:
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography. IIH-MSP 2009: 945-948 - [c22]Xiongfei He, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Classification between PS and Stego Images Based on Noise Model. MUE 2009: 31-36 - 2008
- [j4]Bin Liu, Fenlin Liu, Chunfang Yang:
Stepwise inter-frame correlation-based steganalysis system for video streams. Secur. Commun. Networks 1(6): 487-494 (2008) - [j3]Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:
A review on blind detection for image steganography. Signal Process. 88(9): 2138-2157 (2008) - [j2]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu:
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 3(4): 662-672 (2008) - [c21]Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams. ARES 2008: 1382-1387 - [c20]Li Jing, Fenlin Liu, Bin Liu:
Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm. ICIC (1) 2008: 243-250 - [c19]Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, Daofu Gong:
Multi-class steganalysis for Jpeg stego algorithms. ICIP 2008: 2076-2079 - [c18]Daofu Gong, Fenlin Liu, Bin Lu, Ping Wang, Lan Ding:
Hiding Informationin in Java Class File. ISCSCT (2) 2008: 160-164 - [c17]Bin Lu, Fenlin Liu, Xin Ge, Ping Wang:
Feature n-gram Set Based Software Zero-Watermarking. ISIP 2008: 607-611 - [c16]Yifeng Sun, Fenlin Liu, Bin Liu, Ping Wang:
Steganalysis Based on Difference Image. IWDW 2008: 184-198 - [c15]Xiangyang Luo, Fenlin Liu, Jianming Chen, Yining Zhang:
Image universal steganalysis based on wavelet packet transform. MMSP 2008: 780-784 - 2007
- [j1]Xiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu:
LTSB Steganalysis Based on Quartic Equation. Trans. Data Hiding Multim. Secur. 2: 68-90 (2007) - [c14]Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:
Secret Key Estimation for Image Sequential Steganograph in Transform Domain. GLOBECOM 2007: 538-542 - [c13]Xin Ge, Fenlin Liu, Lu Bin, Wang Ping:
Analysis of Baptista-Type Chaotic Cryptosystem. ICME 2007: 891-894 - [c12]Li Jing, Fenlin Liu:
Double Zero-Watermarks Scheme Utilizing Scale Invariant Feature Transform and Log-Polar Mapping. ICME 2007: 2118-2121 - [c11]Jie Zhang, Fenlin Liu, Ping Wang, Guodong Wang:
Value Combination Technique for Image Authentication. PCM 2007: 276-285 - [c10]Bin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo:
A Software Birthmark Based on Dynamic Opcode n-gram. ICSC 2007: 37-44 - 2006
- [c9]Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. Communications and Multimedia Security 2006: 161-172 - [c8]Ping Wang, Xiangyang Luo, Fenlin Liu:
An Improved Secret Key Estimation Method for Sequential Steganography. IIH-MSP 2006: 396-402 - [c7]Xiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu:
Fast and Blind Restoration Scheme for the Initial States of LFSRs. IMSCCS (1) 2006: 192-198 - [c6]Fenlin Liu, Bin Lu, Xiangyang Luo:
A Chaos-Based Robust Software Watermarking. ISPEC 2006: 355-366 - [c5]Bin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo:
Real-Time Steganography in Compressed Video. MRCS 2006: 43-48 - [c4]Xiangyang Luo, Junyong Luo, Fenlin Liu:
Searching and Detecting Spatial LSB Steganographic Images on the Internet. Parallel and Distributed Computing and Networks 2006: 273-278 - 2005
- [c3]Xiangyang Luo, Bin Liu, Fenlin Liu:
Improved RS Method for Detection of LSB Steganography. ICCSA (2) 2005: 508-516 - [c2]Xiangyang Luo, Bin Liu, Fenlin Liu:
Detecting LSB Steganography Based on Dynamic Masks. ISDA 2005: 251-255 - 2004
- [c1]Fenlin Liu, Yanrong Cai, Junyong Luo:
Adaptive robust output feedback controllers guaranteeing uniform ultimate boundedness for uncertain nonlinear systems. ACC 2004: 3693-3698
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint