BibTeX records: Jicang Lu

download as .bib file

@article{DBLP:journals/ijdsn/WangYWSL20,
  author    = {Jie Wang and
               Chunfang Yang and
               Ping Wang and
               Xiaofeng Song and
               Jicang Lu},
  title     = {Payload location for {JPEG} image steganography based on co-frequency
               sub-image filtering},
  journal   = {Int. J. Distributed Sens. Networks},
  volume    = {16},
  number    = {1},
  year      = {2020},
  url       = {https://doi.org/10.1177/1550147719899569},
  doi       = {10.1177/1550147719899569},
  timestamp = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdsn/WangYWSL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuZYLL19,
  author    = {Jicang Lu and
               Gang Zhou and
               Chunfang Yang and
               Zhenyu Li and
               Mingjing Lan},
  title     = {Steganalysis of Content-Adaptive Steganography Based on Massive Datasets
               Pre-Classification and Feature Selection},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {21702--21711},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2896781},
  doi       = {10.1109/ACCESS.2019.2896781},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/LuZYLL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangZLZ19,
  author    = {Shu{-}wei Wang and
               Gang Zhou and
               Ji{-}Cang Lu and
               Feng{-}juan Zhang},
  editor    = {Xingming Sun and
               Zhaoqing Pan and
               Elisa Bertino},
  title     = {A Novel Malware Detection and Classification Method Based on Capsule
               Network},
  booktitle = {Artificial Intelligence and Security - 5th International Conference,
               {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11632},
  pages     = {573--584},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-24274-9\_52},
  doi       = {10.1007/978-3-030-24274-9\_52},
  timestamp = {Thu, 18 Jul 2019 12:52:54 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/WangZLZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YangLLL18,
  author    = {Chunfang Yang and
               Xiangyang Luo and
               Jicang Lu and
               Fenlin Liu},
  title     = {Extracting hidden messages of {MLSB} steganography based on optimal
               stego subset},
  journal   = {Sci. China Inf. Sci.},
  volume    = {61},
  number    = {11},
  pages     = {119103:1--119103:3},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11432-017-9328-2},
  doi       = {10.1007/s11432-017-9328-2},
  timestamp = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/chinaf/YangLLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/LuYLL18,
  author    = {Jicang Lu and
               Chunfang Yang and
               Fenlin Liu and
               Xiangyang Luo},
  title     = {Quantitative steganalysis of {JPEG} additive steganography based on
               boundary effect},
  journal   = {J. Electronic Imaging},
  volume    = {27},
  number    = {2},
  pages     = {023004},
  year      = {2018},
  url       = {https://doi.org/10.1117/1.JEI.27.2.023004},
  doi       = {10.1117/1.JEI.27.2.023004},
  timestamp = {Wed, 28 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jei/LuYLL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaci/ZhangLJLY18,
  author    = {Yiqin Zhang and
               Fenlin Liu and
               Hongyan Jia and
               Jicang Lu and
               Chunfang Yang},
  title     = {Optimization of rich model based on fisher criterion for image steganalysis},
  booktitle = {Tenth International Conference on Advanced Computational Intelligence,
               {ICACI} 2018, Xiamen, China, March 29-31, 2018},
  pages     = {187--192},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/ICACI.2018.8377604},
  doi       = {10.1109/ICACI.2018.8377604},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/icaci/ZhangLJLY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XingZLZ18,
  author    = {Chang{-}shuai Xing and
               Gang Zhou and
               Ji{-}Cang Lu and
               Feng{-}juan Zhang},
  editor    = {Xingming Sun and
               Zhaoqing Pan and
               Elisa Bertino},
  title     = {A Word Embeddings Training Method Based on Modified Skip-Gram and
               Align},
  booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS}
               2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
               {VI}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11068},
  pages     = {334--346},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00021-9\_31},
  doi       = {10.1007/978-3-030-00021-9\_31},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/XingZLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLYL17,
  author    = {Zhe Chen and
               Jicang Lu and
               Pengfei Yang and
               Xiangyang Luo},
  title     = {Recognizing Substitution Steganography of Spatial Domain Based on
               the Characteristics of Pixels Correlation},
  journal   = {{IJDCF}},
  volume    = {9},
  number    = {4},
  pages     = {48--61},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJDCF.2017100105},
  doi       = {10.4018/IJDCF.2017100105},
  timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ZhangLYLSL17,
  author    = {Yi Zhang and
               Fenlin Liu and
               Chunfang Yang and
               Xiangyang Luo and
               Xiaofeng Song and
               Jicang Lu},
  title     = {Steganalysis of content-adaptive {JPEG} steganography based on Gauss
               partial derivative filter bank},
  journal   = {J. Electronic Imaging},
  volume    = {26},
  number    = {1},
  pages     = {13011},
  year      = {2017},
  url       = {https://doi.org/10.1117/1.JEI.26.1.013011},
  doi       = {10.1117/1.JEI.26.1.013011},
  timestamp = {Thu, 18 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jei/ZhangLYLSL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/YangZWLLL17,
  author    = {Chunfang Yang and
               Yi Zhang and
               Ping Wang and
               Xiangyang Luo and
               Fenlin Liu and
               Jicang Lu},
  title     = {Steganalysis Feature Subspace Selection Based on Fisher Criterion},
  booktitle = {2017 {IEEE} International Conference on Data Science and Advanced
               Analytics, {DSAA} 2017, Tokyo, Japan, October 19-21, 2017},
  pages     = {514--521},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/DSAA.2017.53},
  doi       = {10.1109/DSAA.2017.53},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsaa/YangZWLLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuoSLZLYL16,
  author    = {Xiangyang Luo and
               Xiaofeng Song and
               Xiaolong Li and
               Weiming Zhang and
               Jicang Lu and
               Chunfang Yang and
               Fenlin Liu},
  title     = {Steganalysis of {HUGO} steganography based on parameter recognition
               of syndrome-trellis-codes},
  journal   = {Multim. Tools Appl.},
  volume    = {75},
  number    = {21},
  pages     = {13557--13583},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11042-015-2759-2},
  doi       = {10.1007/s11042-015-2759-2},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/LuoSLZLYL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SongLLLZ15,
  author    = {Xiaofeng Song and
               Fenlin Liu and
               Xiangyang Luo and
               Jicang Lu and
               Yi Zhang},
  title     = {Steganalysis of perturbed quantization steganography based on the
               enhanced histogram features},
  journal   = {Multim. Tools Appl.},
  volume    = {74},
  number    = {24},
  pages     = {11045--11071},
  year      = {2015},
  url       = {https://doi.org/10.1007/s11042-014-2217-6},
  doi       = {10.1007/s11042-014-2217-6},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/SongLLLZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LuLL14,
  author    = {Jicang Lu and
               Fenlin Liu and
               Xiangyang Luo},
  title     = {Selection of image features for steganalysis based on the Fisher criterion},
  journal   = {Digital Investigation},
  volume    = {11},
  number    = {1},
  pages     = {57--66},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.diin.2013.12.001},
  doi       = {10.1016/j.diin.2013.12.001},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/di/LuLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LuLL14,
  author    = {Jicang Lu and
               Fenlin Liu and
               Xiangyang Luo},
  title     = {Recognizing F5-like Stego images from Multi-class {JPEG} Stego Images},
  journal   = {{KSII} Trans. Internet Inf. Syst.},
  volume    = {8},
  number    = {11},
  pages     = {4153--4169},
  year      = {2014},
  url       = {https://doi.org/10.3837/tiis.2014.11.028},
  doi       = {10.3837/tiis.2014.11.028},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/LuLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icimcs/LiuLLG13,
  author    = {Yuan Liu and
               Xiangyang Luo and
               Jicang Lu and
               Daofu Gong},
  editor    = {Ke Lu and
               Tao Mei and
               Xindong Wu},
  title     = {Steganalysis of F5-like steganography based on selection of joint
               distribution features},
  booktitle = {International Conference on Internet Multimedia Computing and Service,
               {ICIMCS} '13, Huangshan, China - August 17 - 19, 2013},
  pages     = {71--75},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2499788.2499821},
  doi       = {10.1145/2499788.2499821},
  timestamp = {Mon, 07 Jan 2019 17:17:42 +0100},
  biburl    = {https://dblp.org/rec/conf/icimcs/LiuLLG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuLLY12,
  author    = {Jicang Lu and
               Fenlin Liu and
               Xiangyang Luo and
               Chunfang Yang},
  title     = {Parameter-estimation and algorithm-selection based United-Judgment
               for image steganalysis},
  journal   = {Multim. Tools Appl.},
  volume    = {57},
  number    = {1},
  pages     = {91--107},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11042-010-0588-x},
  doi       = {10.1007/s11042-010-0588-x},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/LuLLY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LuLQDC12,
  author    = {Jicang Lu and
               Fenlin Liu and
               Sijin Qian and
               Hui Dai and
               Jingning Chen},
  title     = {Embedding Ratio Estimation of {MB2} Based on Relativity of Intra-block
               Pixels},
  booktitle = {10th {IEEE} International Symposium on Parallel and Distributed Processing
               with Applications, {ISPA} 2012, Leganes, Madrid, Spain, July 10-13,
               2012},
  pages     = {749--754},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/ISPA.2012.110},
  doi       = {10.1109/ISPA.2012.110},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/ispa/LuLQDC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LuHLL11,
  author    = {Jicang Lu and
               Yongfeng Huang and
               Fenlin Liu and
               Xiangyang Luo},
  title     = {Pulse position checking-based steganalysis of {G.723.1} compressed
               speech in VoIP},
  journal   = {{IJMIS}},
  volume    = {2},
  number    = {3/4},
  pages     = {225--237},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJMIS.2011.044762},
  doi       = {10.1504/IJMIS.2011.044762},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijmis/LuHLL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics