BibTeX records: Hui Tian 0002

download as .bib file

@article{DBLP:journals/taslp/LiGLQZT24,
  author       = {Yangfu Li and
                  Jiapan Gan and
                  Xiaodan Lin and
                  Yingqiang Qiu and
                  Hongjian Zhan and
                  Hui Tian},
  title        = {{DS-TDNN:} Dual-Stream Time-Delay Neural Network With Global-Aware
                  Filter for Speaker Verification},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {32},
  pages        = {2814--2827},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASLP.2024.3402072},
  doi          = {10.1109/TASLP.2024.3402072},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taslp/LiGLQZT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/SunTTLQ24,
  author       = {Congcong Sun and
                  Hui Tian and
                  Peng Tian and
                  Haizhou Li and
                  Zhenxing Qian},
  title        = {Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography
                  Methods},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {32},
  pages        = {2957--2972},
  year         = {2024},
  url          = {https://doi.org/10.1109/TASLP.2024.3407607},
  doi          = {10.1109/TASLP.2024.3407607},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taslp/SunTTLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-10471,
  author       = {Weizhi Liu and
                  Yue Li and
                  Dongdong Lin and
                  Hui Tian and
                  Haizhou Li},
  title        = {{GROOT:} Generating Robust Watermark for Diffusion-Model-Based Audio
                  Synthesis},
  journal      = {CoRR},
  volume       = {abs/2407.10471},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.10471},
  doi          = {10.48550/ARXIV.2407.10471},
  eprinttype    = {arXiv},
  eprint       = {2407.10471},
  timestamp    = {Wed, 04 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-10471.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SunTMCQC23,
  author       = {Congcong Sun and
                  Hui Tian and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang and
                  Hanyu Quan and
                  Yonghong Chen},
  title        = {Steganalysis of adaptive multi-rate speech with unknown embedding
                  rates using clustering and ensemble learning},
  journal      = {Comput. Electr. Eng.},
  volume       = {111},
  number       = {Part {A}},
  pages        = {108909},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108909},
  doi          = {10.1016/J.COMPELECENG.2023.108909},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/SunTMCQC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/TianYWQC23,
  author       = {Hui Tian and
                  Weiping Ye and
                  Jia Wang and
                  Hanyu Quan and
                  Chin{-}Chen Chang},
  title        = {Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare
                  Industry 4.0},
  journal      = {Int. J. Intell. Syst.},
  volume       = {2023},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/3375823},
  doi          = {10.1155/2023/3375823},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/TianYWQC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/TianQMLQ23,
  author       = {Hui Tian and
                  Yiqin Qiu and
                  Wojciech Mazurczyk and
                  Haizhou Li and
                  Zhenxing Qian},
  title        = {{STFF-SM:} Steganalysis Model Based on Spatial and Temporal Feature
                  Fusion for Speech Streams},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {31},
  pages        = {277--289},
  year         = {2023},
  url          = {https://doi.org/10.1109/TASLP.2022.3224295},
  doi          = {10.1109/TASLP.2022.3224295},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taslp/TianQMLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QiuTLCV23,
  author       = {Yiqin Qiu and
                  Hui Tian and
                  Haizhou Li and
                  Chin{-}Chen Chang and
                  Athanasios V. Vasilakos},
  title        = {Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy
                  for Speech Steganalysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2737--2750},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3269640},
  doi          = {10.1109/TIFS.2023.3269640},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QiuTLCV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/SunTMCCC22,
  author       = {Congcong Sun and
                  Hui Tian and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang and
                  Yiqiao Cai and
                  Yonghong Chen},
  title        = {Towards blind detection of steganography in low-bit-rate speech streams},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {12085--12112},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23077},
  doi          = {10.1002/INT.23077},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/SunTMCCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiuTTMC22,
  author       = {Yiqin Qiu and
                  Hui Tian and
                  Lili Tang and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang},
  title        = {Steganalysis of adaptive multi-rate speech streams with distributed
                  representations of codewords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103250},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103250},
  doi          = {10.1016/J.JISA.2022.103250},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TianWQC22,
  author       = {Hui Tian and
                  Junyan Wu and
                  Hanyu Quan and
                  Chin{-}Chen Chang},
  title        = {Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder
                  Network},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {29},
  pages        = {2462--2466},
  year         = {2022},
  url          = {https://doi.org/10.1109/LSP.2022.3226126},
  doi          = {10.1109/LSP.2022.3226126},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/TianWQC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/TianPQC22,
  author       = {Hui Tian and
                  Fang Peng and
                  Hanyu Quan and
                  Chin{-}Chen Chang},
  title        = {Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles
                  Data},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {4},
  pages        = {88:1--88:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3433543},
  doi          = {10.1145/3433543},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/TianPQC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aipr2/Xu0QL22,
  author       = {Shulong Xu and
                  Hui Tian and
                  Hanyu Quan and
                  Jing Lu},
  title        = {A Novel Global-Local Representations Network for Speech Steganalysis},
  booktitle    = {Proceedings of the 5th International Conference on Artificial Intelligence
                  and Pattern Recognition, {AIPR} 2022, Xiamen, China, September 23-25,
                  2022},
  pages        = {945--949},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573942.3574196},
  doi          = {10.1145/3573942.3574196},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aipr2/Xu0QL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcomps/SunCTW21,
  author       = {Chonggao Sun and
                  Yonghong Chen and
                  Hui Tian and
                  Shuhong Wu},
  title        = {Covert Timing Channels Detection Based on Auxiliary Classifier Generative
                  Adversarial Network},
  journal      = {{IEEE} Open J. Comput. Soc.},
  volume       = {2},
  pages        = {407--418},
  year         = {2021},
  url          = {https://doi.org/10.1109/OJCS.2021.3131598},
  doi          = {10.1109/OJCS.2021.3131598},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcomps/SunCTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/WuCTS21,
  author       = {Shuhong Wu and
                  Yonghong Chen and
                  Hui Tian and
                  Chonggao Sun},
  title        = {Detection of Covert Timing Channel Based on Time Series Symbolization},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {2},
  pages        = {2372--2382},
  year         = {2021},
  url          = {https://doi.org/10.1109/OJCOMS.2021.3118697},
  doi          = {10.1109/OJCOMS.2021.3118697},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcs/WuCTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/QiuQHTZ21,
  author       = {Yingqiang Qiu and
                  Zhenxing Qian and
                  Han He and
                  Hui Tian and
                  Xinpeng Zhang},
  title        = {Optimized Lossless Data Hiding in {JPEG} Bitstream and Relay Transfer-Based
                  Extension},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {4},
  pages        = {1380--1394},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.3006494},
  doi          = {10.1109/TCSVT.2020.3006494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/QiuQHTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TianLCHC20,
  author       = {Hui Tian and
                  Jie Liu and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Yiqiao Cai},
  title        = {Detecting Steganography in Inactive Voice-Over-IP Frames Based on
                  Statistic Characteristics of Fundamental Frequency},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {6117--6129},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2962009},
  doi          = {10.1109/ACCESS.2019.2962009},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TianLCHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouWTJW20,
  author       = {Changli Zhou and
                  Tian Wang and
                  Hui Tian and
                  Wenxian Jiang and
                  Zhijian Wang},
  title        = {A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle
                  Network in Mobile IoT},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {81698--81710},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2990932},
  doi          = {10.1109/ACCESS.2020.2990932},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouWTJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangZLCTCW20,
  author       = {Tian Wang and
                  Jiandian Zeng and
                  Yongxuan Lai and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {Data collection from WSNs to the cloud based on mobile Fog elements},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {105},
  pages        = {864--872},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2017.07.031},
  doi          = {10.1016/J.FUTURE.2017.07.031},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangZLCTCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianZCHWCC20,
  author       = {Hui Tian and
                  Zhao{-}Hua Zhu and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Tian Wang and
                  Yonghong Chen and
                  Yiqiao Cai},
  title        = {StegoNote: Steganography in Guitar Music Using Note Modulation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {68--79},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p68-79.pdf},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianZCHWCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/swevo/CaiWZFTD20,
  author       = {Yiqiao Cai and
                  Duanwei Wu and
                  Ying Zhou and
                  Shunkai Fu and
                  Hui Tian and
                  Yongqian Du},
  title        = {Self-organizing neighborhood-based differential evolution for global
                  optimization},
  journal      = {Swarm Evol. Comput.},
  volume       = {56},
  pages        = {100699},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.swevo.2020.100699},
  doi          = {10.1016/J.SWEVO.2020.100699},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/swevo/CaiWZFTD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/Peng0QL20,
  author       = {Fang Peng and
                  Hui Tian and
                  Hanyu Quan and
                  Jing Lu},
  editor       = {Guangquan Xu and
                  Kaitai Liang and
                  Chunhua Su},
  title        = {Data Auditing for the Internet of Things Environments Leveraging Smart
                  Contract},
  booktitle    = {Frontiers in Cyber Security - Third International Conference, {FCS}
                  2020, Tianjin, China, November 15-17, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1286},
  pages        = {133--149},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9739-8\_12},
  doi          = {10.1007/978-981-15-9739-8\_12},
  timestamp    = {Wed, 07 Dec 2022 09:54:09 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/Peng0QL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaiSZFTC19,
  author       = {Yiqiao Cai and
                  Chi Shao and
                  Huizhen Zhang and
                  Shunkai Fu and
                  Hui Tian and
                  Yonghong Chen},
  title        = {A Neighborhood-Assisted Framework for Differential Evolution},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {44338--44358},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2908660},
  doi          = {10.1109/ACCESS.2019.2908660},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CaiSZFTC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaiSZFZT19,
  author       = {Yiqiao Cai and
                  Chi Shao and
                  Ying Zhou and
                  Shunkai Fu and
                  Huizhen Zhang and
                  Hui Tian},
  title        = {Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic
                  Rules},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {58023--58040},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2914963},
  doi          = {10.1109/ACCESS.2019.2914963},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CaiSZFZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TianLCCH19,
  author       = {Hui Tian and
                  Jie Liu and
                  Chin{-}Chen Chang and
                  Chih{-}Cheng Chen and
                  Yongfeng Huang},
  title        = {Steganalysis of {AMR} Speech Based on Multiple Classifiers Combination},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {140957--140968},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2943504},
  doi          = {10.1109/ACCESS.2019.2943504},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TianLCCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TianCJHNC19,
  author       = {Hui Tian and
                  Yuxiang Chen and
                  Hong Jiang and
                  Yongfeng Huang and
                  Fulin Nan and
                  Yonghong Chen},
  title        = {Public Auditing for Trusted Cloud Storage Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {10--22},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2875880},
  doi          = {10.1109/MSEC.2018.2875880},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TianCJHNC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitm/NanTWCC19,
  author       = {Fulin Nan and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai and
                  Yonghong Chen},
  title        = {A collusion-resistant public auditing scheme for shared cloud data},
  journal      = {Int. J. Inf. Technol. Manag.},
  volume       = {18},
  number       = {2/3},
  pages        = {195--212},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJITM.2019.099816},
  doi          = {10.1504/IJITM.2019.099816},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitm/NanTWCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuCTW19,
  author       = {Huaijin Liu and
                  Yonghong Chen and
                  Hui Tian and
                  Tian Wang},
  title        = {A Security and Efficient Data Aggregation Scheme for Cloud-Assisted
                  Wireless Body Area Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {243--249},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n2/ijns-2019-v21-n2-p243-249.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuCTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuCTWC19,
  author       = {Huaijin Liu and
                  Yonghong Chen and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {A Secure and Reliable Data Transmission Scheme in Wireless Body Area
                  Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {648--660},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p648-660.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuCTWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TianNJCNH19,
  author       = {Hui Tian and
                  Fulin Nan and
                  Hong Jiang and
                  Chin{-}Chen Chang and
                  Jianting Ning and
                  Yongfeng Huang},
  title        = {Public auditing for shared cloud data with efficient and secure group
                  management},
  journal      = {Inf. Sci.},
  volume       = {472},
  pages        = {107--125},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.009},
  doi          = {10.1016/J.INS.2018.09.009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TianNJCNH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TianNCHLD19,
  author       = {Hui Tian and
                  Fulin Nan and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Jing Lu and
                  Yongqian Du},
  title        = {Privacy-preserving public auditing for secure data storage in fog-to-cloud
                  computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {127},
  pages        = {59--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.12.004},
  doi          = {10.1016/J.JNCA.2018.12.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TianNCHLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/TianHCHLD19,
  author       = {Hui Tian and
                  Meilun Huang and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Jing Lu and
                  Yongqian Du},
  title        = {Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics
                  of Pitch Delay},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {9},
  pages        = {1131--1150},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_9/steganalysis\_of\_adaptive\_multi},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/TianHCHLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuTHL19,
  author       = {Xiaokang Liu and
                  Hui Tian and
                  Yongfeng Huang and
                  Jing Lu},
  title        = {A novel steganographic method for algebraic-code-excited-linear-prediction
                  speech streams based on fractional pitch delay search},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {7},
  pages        = {8447--8461},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6867-7},
  doi          = {10.1007/S11042-018-6867-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuTHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/TianCCHWHCC19,
  author       = {Hui Tian and
                  Zhaoyi Chen and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Tian Wang and
                  Zheng{-}an Huang and
                  Yiqiao Cai and
                  Yonghong Chen},
  title        = {Public audit for operation behavior logs with error locating in cloud
                  storage},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {11},
  pages        = {3779--3792},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-018-3038-8},
  doi          = {10.1007/S00500-018-3038-8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/TianCCHWHCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Li0N19,
  author       = {Xiang Li and
                  Hui Tian and
                  Jianting Ning},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Secure Online/Offline Attribute-Based Encryption for IoT Users in
                  Cloud Computing},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {347--354},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_22},
  doi          = {10.1007/978-3-030-31919-9\_22},
  timestamp    = {Tue, 07 May 2024 20:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Li0N19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/CaiPFT19,
  author       = {Yiqiao Cai and
                  Deining Peng and
                  Shunkai Fu and
                  Hui Tian},
  title        = {Multitasking differential evolution with difference vector sharing
                  mechanism},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2019,
                  Xiamen, China, December 6-9, 2019},
  pages        = {3039--3046},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SSCI44817.2019.9002698},
  doi          = {10.1109/SSCI44817.2019.9002698},
  timestamp    = {Wed, 26 Feb 2020 16:57:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/CaiPFT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangZBCCTX18,
  author       = {Tian Wang and
                  Jiandian Zeng and
                  Md. Zakirul Alam Bhuiyan and
                  Yonghong Chen and
                  Yiqiao Cai and
                  Hui Tian and
                  Mande Xie},
  title        = {Energy-efficient relay tracking with multiple mobile camera sensors},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {130--140},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.002},
  doi          = {10.1016/J.COMNET.2018.01.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangZBCCTX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/TianSCHC18,
  author       = {Hui Tian and
                  Jun Sun and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Yonghong Chen},
  title        = {Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {22},
  number       = {6},
  pages        = {1196--1199},
  year         = {2018},
  url          = {https://doi.org/10.1109/LCOMM.2018.2822804},
  doi          = {10.1109/LCOMM.2018.2822804},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/TianSCHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CaiLWCT18,
  author       = {Yiqiao Cai and
                  Jingliang Liao and
                  Tian Wang and
                  Yonghong Chen and
                  Hui Tian},
  title        = {Social learning differential evolution},
  journal      = {Inf. Sci.},
  volume       = {433-434},
  pages        = {464--509},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2016.10.003},
  doi          = {10.1016/J.INS.2016.10.003},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/CaiLWCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunCWTWC18,
  author       = {Guo Sun and
                  Yiqiao Cai and
                  Tian Wang and
                  Hui Tian and
                  Cheng Wang and
                  Yonghong Chen},
  title        = {Differential evolution with individual-dependent topology adaptation},
  journal      = {Inf. Sci.},
  volume       = {450},
  pages        = {1--38},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.02.048},
  doi          = {10.1016/J.INS.2018.02.048},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunCWTWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/Zhu00C0C18,
  author       = {Zhao{-}Hua Zhu and
                  Hui Tian and
                  Chin{-}Chen Chang and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {StegTab: Steganography in Guitar Tablatures},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {9},
  number       = {4},
  pages        = {904--917},
  year         = {2018},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2018/vol9/JIH-MSP-2018-04-013.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/Zhu00C0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChangLZT18,
  author       = {Chin{-}Chen Chang and
                  Tzu{-}Chuen Lu and
                  Zhao{-}Hua Zhu and
                  Hui Tian},
  title        = {An Effective Authentication Scheme Using {DCT} for Mobile Devices},
  journal      = {Symmetry},
  volume       = {10},
  number       = {1},
  pages        = {13},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10010013},
  doi          = {10.3390/SYM10010013},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ChangLZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/Liu000CC18,
  author       = {Jie Liu and
                  Hui Tian and
                  Chin{-}Chen Chang and
                  Tian Wang and
                  Yonghong Chen and
                  Yiqiao Cai},
  title        = {Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test},
  journal      = {Symmetry},
  volume       = {10},
  number       = {8},
  pages        = {336},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10080336},
  doi          = {10.3390/SYM10080336},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/Liu000CC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ChenTCNL18,
  author       = {Wenqi Chen and
                  Hui Tian and
                  Chin{-}Chen Chang and
                  Fulin Nan and
                  Jing Lu},
  title        = {Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile
                  Cloud Computing},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {3471312:1--3471312:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/3471312},
  doi          = {10.1155/2018/3471312},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ChenTCNL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LuC0C0C18,
  author       = {Jing Lu and
                  Yuxiang Chen and
                  Hui Tian and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai},
  editor       = {Ting Hu and
                  Feng Wang and
                  Hongwei Li and
                  Qian Wang},
  title        = {Improving the Security of a Public Auditing Scheme for Multiple-Replica
                  Dynamic Data},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} 2018
                  International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11338},
  pages        = {185--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05234-8\_23},
  doi          = {10.1007/978-3-030-05234-8\_23},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LuC0C0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWJT18,
  author       = {Changli Zhou and
                  Tian Wang and
                  Wenxian Jiang and
                  Hui Tian},
  title        = {Practical {K} Nearest Neighbor Query Scheme with Two-Party Guarantees
                  in Road Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1316--1321},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00181},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/0001TJ18,
  author       = {Tian Wang and
                  Hui Tian and
                  Wenxian Jiang},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {Continuous {K} Nearest Neighbor Query Scheme with Privacy and Security
                  Guarantees in Road Networks},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {828--833},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00153},
  doi          = {10.1109/SMARTWORLD.2018.00153},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/0001TJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZBTCCZ17,
  author       = {Tian Wang and
                  Jiandian Zeng and
                  Md. Zakirul Alam Bhuiyan and
                  Hui Tian and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Bineng Zhong},
  title        = {Trajectory Privacy Preservation Based on a Fog Structure for Cloud
                  Location Services},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {7692--7701},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2698078},
  doi          = {10.1109/ACCESS.2017.2698078},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZBTCCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/WangWLWTCCW17,
  author       = {Tian Wang and
                  Wenhua Wang and
                  Yongxuan Lai and
                  Sheng Wen and
                  Hui Tian and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving
                  the Efficiency and Security},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {37},
  number       = {1-4},
  pages        = {95--115},
  year         = {2017},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-95-115/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/WangWLWTCCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/CaiSWTCW17,
  author       = {Yiqiao Cai and
                  Guo Sun and
                  Tian Wang and
                  Hui Tian and
                  Yonghong Chen and
                  Jiahai Wang},
  title        = {Neighborhood-adaptive differential evolution for global numerical
                  optimization},
  journal      = {Appl. Soft Comput.},
  volume       = {59},
  pages        = {659--706},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.asoc.2017.06.002},
  doi          = {10.1016/J.ASOC.2017.06.002},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/CaiSWTCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangWCBLCTCW17,
  author       = {Tian Wang and
                  Wenhua Wang and
                  Jiannong Cao and
                  Md. Zakirul Alam Bhuiyan and
                  Yongxuan Lai and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {Interoperable localization for mobile group users},
  journal      = {Comput. Commun.},
  volume       = {105},
  pages        = {53--65},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2017.02.006},
  doi          = {10.1016/J.COMCOM.2017.02.006},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WangWCBLCTCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/TianSCQC17,
  author       = {Hui Tian and
                  Jun Sun and
                  Chin{-}Chen Chang and
                  Jie Qin and
                  Yonghong Chen},
  title        = {Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate
                  Modulation},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {21},
  number       = {4},
  pages        = {749--752},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCOMM.2017.2659718},
  doi          = {10.1109/LCOMM.2017.2659718},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/TianSCQC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WangLCTCJW17,
  author       = {Tian Wang and
                  Yang Li and
                  Yonghong Chen and
                  Hui Tian and
                  Yiqiao Cai and
                  Weijia Jia and
                  Baowei Wang},
  title        = {Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud
                  System},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {21},
  number       = {11},
  pages        = {2532--2535},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCOMM.2017.2740279},
  doi          = {10.1109/LCOMM.2017.2740279},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/WangLCTCJW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangPWLJCTC17,
  author       = {Tian Wang and
                  Zhen Peng and
                  Sheng Wen and
                  Yongxuan Lai and
                  Weijia Jia and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen},
  title        = {Reliable wireless connections for fast-moving rail users based on
                  a chained fog structure},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {160--176},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.06.031},
  doi          = {10.1016/J.INS.2016.06.031},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangPWLJCTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/GuoCCWT17,
  author       = {Weipeng Guo and
                  Yonghong Chen and
                  Yiqiao Cai and
                  Tian Wang and
                  Hui Tian},
  title        = {DIntrusion Detection in {WSN} with an Improved {NSA} Based on the
                  {DE-CMOP}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {11},
  pages        = {5574--5591},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.11.022},
  doi          = {10.3837/TIIS.2017.11.022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/GuoCCWT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/0002CHL18,
  author       = {Hui Tian and
                  Yuxiang Chen and
                  Yongfeng Huang and
                  Jing Lu},
  title        = {{\unicode{20113}}{\unicode{25968}}{\unicode{25454}}{\unicode{25345}}{\unicode{26377}}{\unicode{24615}}{\unicode{23457}}{\unicode{35745}}{\unicode{30740}}{\unicode{31350}}{\unicode{19982}}{\unicode{36827}}{\unicode{23637}}
                  (Research and Development of Auditing Techniques for Cloud Data Possession)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {6},
  pages        = {8--16},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.06.002},
  doi          = {10.11896/J.ISSN.1002-137X.2017.06.002},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/0002CHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/TianSHWCC17,
  author       = {Hui Tian and
                  Jun Sun and
                  Yongfeng Huang and
                  Tian Wang and
                  Yonghong Chen and
                  Yiqiao Cai},
  title        = {Detecting Steganography of Adaptive Multirate Speech with Unknown
                  Embedding Rate},
  journal      = {Mob. Inf. Syst.},
  volume       = {2017},
  pages        = {5418978:1--5418978:18},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5418978},
  doi          = {10.1155/2017/5418978},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mis/TianSHWCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangWWCTCW17,
  author       = {Tian Wang and
                  Qun Wu and
                  Sheng Wen and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless
                  Sensor and Actuator Networks},
  journal      = {Sensors},
  volume       = {17},
  number       = {1},
  pages        = {139},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17010139},
  doi          = {10.3390/S17010139},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/WangWWCTCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/TianWCHCWCL17,
  author       = {Hui Tian and
                  Yanpeng Wu and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai and
                  Jin Liu},
  title        = {Steganalysis of adaptive multi-rate speech using statistical characteristics
                  of pulse pairs},
  journal      = {Signal Process.},
  volume       = {134},
  pages        = {9--22},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.sigpro.2016.11.013},
  doi          = {10.1016/J.SIGPRO.2016.11.013},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/TianWCHCWCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/TianWCHLWCL17,
  author       = {Hui Tian and
                  Yanpeng Wu and
                  Yiqiao Cai and
                  Yongfeng Huang and
                  Jin Liu and
                  Tian Wang and
                  Yonghong Chen and
                  Jing Lu},
  title        = {Distributed steganalysis of compressed speech},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {3},
  pages        = {795--804},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1816-0},
  doi          = {10.1007/S00500-015-1816-0},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/TianWCHLWCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/TianCCKHCCW17,
  author       = {Hui Tian and
                  Zhaoyi Chen and
                  Chin{-}Chen Chang and
                  Minoru Kuribayashi and
                  Yongfeng Huang and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Tian Wang},
  title        = {Enabling public auditability for operation behaviors in cloud storage},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {8},
  pages        = {2175--2187},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2311-y},
  doi          = {10.1007/S00500-016-2311-Y},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/TianCCKHCCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/CaiZLWTC17,
  author       = {Yiqiao Cai and
                  Meng Zhao and
                  Jingliang Liao and
                  Tian Wang and
                  Hui Tian and
                  Yonghong Chen},
  title        = {Neighborhood guided differential evolution},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {16},
  pages        = {4769--4812},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2088-z},
  doi          = {10.1007/S00500-016-2088-Z},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/CaiZLWTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/TianCCJHCL17,
  author       = {Hui Tian and
                  Yuxiang Chen and
                  Chin{-}Chen Chang and
                  Hong Jiang and
                  Yongfeng Huang and
                  Yonghong Chen and
                  Jin Liu},
  title        = {Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {701--714},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2015.2512589},
  doi          = {10.1109/TSC.2015.2512589},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/TianCCJHCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/WuWCTC17,
  author       = {Qun Wu and
                  Tian Wang and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen},
  title        = {Rumor restraining based on propagation prediction with limited observations
                  in large-scale social networks},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3014812.3014813},
  doi          = {10.1145/3014812.3014813},
  timestamp    = {Tue, 06 Nov 2018 11:06:53 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/WuWCTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/ChenTLCCWC17,
  author       = {Zhaoyi Chen and
                  Hui Tian and
                  Jing Lu and
                  Wenqi Chen and
                  Yiqiao Cai and
                  Tian Wang and
                  Yonghong Chen},
  title        = {Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 2},
  pages        = {51--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.195},
  doi          = {10.1109/CSE-EUC.2017.195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/ChenTLCCWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/ChenTLNCWC17,
  author       = {Zhaoyi Chen and
                  Hui Tian and
                  Jing Lu and
                  Fulin Nan and
                  Yiqiao Cai and
                  Tian Wang and
                  Yonghong Chen},
  title        = {Secure Logging and Public Audit for Operation Behavior in Cloud Storage},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {444--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.85},
  doi          = {10.1109/CSE-EUC.2017.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/ChenTLNCWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/CaiCWT16,
  author       = {Yiqiao Cai and
                  Yonghong Chen and
                  Tian Wang and
                  Hui Tian},
  title        = {Improving differential evolution with a new selection method of parents
                  for mutation},
  journal      = {Frontiers Comput. Sci.},
  volume       = {10},
  number       = {2},
  pages        = {246--269},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11704-015-4480-8},
  doi          = {10.1007/S11704-015-4480-8},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/CaiCWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ChenZTWC16,
  author       = {Yonghong Chen and
                  Ning Zhang and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {A Novel Connection Correlation Scheme Based on Threshold Secret Sharing},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {20},
  number       = {12},
  pages        = {2414--2417},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCOMM.2016.2604390},
  doi          = {10.1109/LCOMM.2016.2604390},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ChenZTWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WangPWCCTLZ16,
  author       = {Tian Wang and
                  Zhen Peng and
                  Cheng Wang and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Hui Tian and
                  Junbin Liang and
                  Bineng Zhong},
  title        = {Extracting Target Detection Knowledge Based on Spatiotemporal Information
                  in Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {2},
  pages        = {5831471:1--5831471:11},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/5831471},
  doi          = {10.1155/2016/5831471},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WangPWCCTLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/LiuTLC16,
  author       = {Jin Liu and
                  Hui Tian and
                  Jing Lu and
                  Yonghong Chen},
  title        = {Neighbor-index-division steganography based on {QIM} method for {G.723.1}
                  speech streams},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {139--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12652-015-0315-6},
  doi          = {10.1007/S12652-015-0315-6},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/LiuTLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuC00C16a,
  author       = {Huaijin Liu and
                  Yonghong Chen and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {{\unicode{20004}}{\unicode{23618}}{\unicode{26080}}{\unicode{32447}}{\unicode{20256}}{\unicode{24863}}{\unicode{32593}}{\unicode{20013}}{\unicode{33410}}{\unicode{33021}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{33539}}{\unicode{22260}}{\unicode{26597}}{\unicode{35810}}{\unicode{26041}}{\unicode{27861}}
                  (Privacy and Integrity Protection Range Query Processing in Two-tiered
                  Wireless Sensor Networks)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {{Z11}},
  pages        = {393--397},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.11A.090},
  doi          = {10.11896/J.ISSN.1002-137X.2016.11A.090},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuC00C16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuC00C16,
  author       = {Huaijin Liu and
                  Yonghong Chen and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{21487}}{\unicode{26816}}{\unicode{27979}}{\unicode{25968}}{\unicode{25454}}{\unicode{23436}}{\unicode{25972}}{\unicode{24615}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{25968}}{\unicode{25454}}{\unicode{32858}}{\unicode{21512}}{\unicode{21327}}{\unicode{35758}}
                  (Integrity-checking Security Data Aggregation Protocol)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {{Z6}},
  pages        = {353--356},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.6A.084},
  doi          = {10.11896/J.ISSN.1002-137X.2016.6A.084},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuC00C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSJT16,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Artur Janicki and
                  Hui Tian},
  title        = {Trends in modern information hiding: techniques, applications, and
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {8},
  pages        = {703--704},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1469},
  doi          = {10.1002/SEC.1469},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianWCHLWCC16,
  author       = {Hui Tian and
                  Yanpeng Wu and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Jin Liu and
                  Tian Wang and
                  Yonghong Chen and
                  Yiqiao Cai},
  title        = {Steganalysis of analysis-by-synthesis speech exploiting pulse-position
                  distribution characteristics},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2934--2944},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1443},
  doi          = {10.1002/SEC.1443},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TianWCHLWCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/CaiWCWTL16,
  author       = {Yiqiao Cai and
                  Jiahai Wang and
                  Yonghong Chen and
                  Tian Wang and
                  Hui Tian and
                  Wei Luo},
  title        = {Adaptive direction information in differential evolution for numerical
                  optimization},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {2},
  pages        = {465--494},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-014-1517-0},
  doi          = {10.1007/S00500-014-1517-0},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/CaiWCWTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiaoCWTC16,
  author       = {Jingliang Liao and
                  Yiqiao Cai and
                  Tian Wang and
                  Hui Tian and
                  Yonghong Chen},
  title        = {Cellular direction information based differential evolution for numerical
                  optimization: an empirical study},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {7},
  pages        = {2801--2827},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-015-1682-9},
  doi          = {10.1007/S00500-015-1682-9},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiaoCWTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcomp/Chen0LC0C16,
  author       = {Zhaoyi Chen and
                  Hui Tian and
                  Jing Lu and
                  Yiqiao Cai and
                  Tian Wang and
                  Yonghong Chen},
  editor       = {Jiafu Wan and
                  Kai Lin and
                  Delu Zeng and
                  Jin Li and
                  Yang Xiang and
                  Xiaofeng Liao and
                  Jiwu Huang and
                  Zheli Liu},
  title        = {Operational-Behavior Auditing in Cloud Storage},
  booktitle    = {Cloud Computing, Security, Privacy in New Computing Environments -
                  7th International Conference, CloudComp 2016, and First International
                  Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December
                  15-16, 2016, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {197},
  pages        = {162--172},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69605-8\_15},
  doi          = {10.1007/978-3-319-69605-8\_15},
  timestamp    = {Sat, 29 Aug 2020 18:19:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcomp/Chen0LC0C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/KongCTWCC16,
  author       = {Xinling Kong and
                  Yonghong Chen and
                  Hui Tian and
                  Tian Wang and
                  Yiqiao Cai and
                  Xin Chen},
  editor       = {Bin Xie and
                  Xiaolong Xu},
  title        = {A Novel Botnet Detection Method Based on Preprocessing Data Packet
                  by Graph Structure Clustering},
  booktitle    = {International Conference on Cyber-Enabled Distributed Computing and
                  Knowledge Discovery, CyberC 2016, Chengdu, China, October 13-15, 2016},
  pages        = {42--45},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CyberC.2016.16},
  doi          = {10.1109/CYBERC.2016.16},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cyberc/KongCTWCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/WangWBCTC16,
  author       = {Wenhua Wang and
                  Tian Wang and
                  Md. Zakirul Alam Bhuiyan and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jos{\'{e}} M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {Improving the Localization Probability and Decreasing Communication
                  Cost for Mobile Users},
  booktitle    = {Security, Privacy and Anonymity in Computation, Communication and
                  Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE,
                  DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10067},
  pages        = {197--207},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49145-5\_20},
  doi          = {10.1007/978-3-319-49145-5\_20},
  timestamp    = {Wed, 24 Apr 2024 14:55:54 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/WangWBCTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/WangJZTZ15,
  author       = {Tian Wang and
                  Weijia Jia and
                  Bineng Zhong and
                  Hui Tian and
                  Guoliang Zhang},
  title        = {BlueCat: An Infrastructure-Free System for Relative Mobile Localization},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {29},
  number       = {1-4},
  pages        = {133--152},
  year         = {2015},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-29-number-1-4-2015/ahswn-29-1-4-p-133-152/},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ahswn/WangJZTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangCJWWTCZ15,
  author       = {Tian Wang and
                  Yiqiao Cai and
                  Weijia Jia and
                  Sheng Wen and
                  Guojun Wang and
                  Hui Tian and
                  Yonghong Chen and
                  Bineng Zhong},
  title        = {Maximizing real-time streaming services based on a multi-servers networking
                  framework},
  journal      = {Comput. Networks},
  volume       = {93},
  pages        = {199--212},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.10.019},
  doi          = {10.1016/J.COMNET.2015.10.019},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangCJWWTCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/TianQGHLWCC15,
  author       = {Hui Tian and
                  Jie Qin and
                  Shuting Guo and
                  Yongfeng Huang and
                  Jin Liu and
                  Tian Wang and
                  Yonghong Chen and
                  Yiqiao Cai},
  title        = {Improved adaptive partial-matching steganography for Voice over {IP}},
  journal      = {Comput. Commun.},
  volume       = {70},
  pages        = {95--108},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.08.011},
  doi          = {10.1016/J.COMCOM.2015.08.011},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/TianQGHLWCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/TianQHWLCWC15,
  author       = {Hui Tian and
                  Jie Qin and
                  Yongfeng Huang and
                  Xu An Wang and
                  Jin Liu and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {A High-Capacity Covering Code for Voice-Over-IP Steganography},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {10},
  number       = {3},
  pages        = {46--63},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJITWE.2015070104},
  doi          = {10.4018/IJITWE.2015070104},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/TianQHWLCWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/TianQHCWLC15,
  author       = {Hui Tian and
                  Jie Qin and
                  Yongfeng Huang and
                  Yonghong Chen and
                  Tian Wang and
                  Jin Liu and
                  Yiqiao Cai},
  title        = {Optimal matrix embedding for Voice-over-IP steganography},
  journal      = {Signal Process.},
  volume       = {117},
  pages        = {33--43},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.sigpro.2015.05.001},
  doi          = {10.1016/J.SIGPRO.2015.05.001},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/TianQHCWLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/QinTHLCWCW15,
  author       = {Jie Qin and
                  Hui Tian and
                  Yongfeng Huang and
                  Jin Liu and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai and
                  Xu An Wang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Fabrizio Messina and
                  Marek R. Ogiela},
  title        = {An Efficient VoIP Steganography Based on Random Binary Matrix},
  booktitle    = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet
                  Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015},
  pages        = {462--465},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/3PGCIC.2015.65},
  doi          = {10.1109/3PGCIC.2015.65},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/QinTHLCWCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TianWHLCWC15,
  author       = {Hui Tian and
                  Yanpeng Wu and
                  Yongfeng Huang and
                  Jin Liu and
                  Yonghong Chen and
                  Tian Wang and
                  Yiqiao Cai},
  title        = {Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics
                  of Pulse Positions},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {455--460},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.21},
  doi          = {10.1109/ARES.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TianWHLCWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WangPLCCTZ15,
  author       = {Tian Wang and
                  Zhen Peng and
                  Junbin Liang and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Hui Tian and
                  Bineng Zhong},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {Detecting Targets Based on a Realistic Detection and Decision Model
                  in Wireless Sensor Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {836--844},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_82},
  doi          = {10.1007/978-3-319-21837-3\_82},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WangPLCCTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/MazurczykST14,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Hui Tian},
  title        = {Network forensics and challenges for cybersecurity},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {69},
  number       = {7-8},
  pages        = {345--346},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12243-014-0434-7},
  doi          = {10.1007/S12243-014-0434-7},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/MazurczykST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/LiDTD14,
  author       = {Songbin Li and
                  Haojiang Deng and
                  Hui Tian and
                  Qiongxing Dai},
  title        = {Steganalysis of prediction mode modulated data-hiding algorithms in
                  {H.264/AVC} video stream},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {69},
  number       = {7-8},
  pages        = {461--473},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12243-013-0381-8},
  doi          = {10.1007/S12243-013-0381-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/LiDTD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/TianLL14,
  author       = {Hui Tian and
                  Jin Liu and
                  Songbin Li},
  title        = {Improving security of quantization-index-modulation steganography
                  in low bit-rate speech streams},
  journal      = {Multim. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {143--154},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00530-013-0302-8},
  doi          = {10.1007/S00530-013-0302-8},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/TianLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/LiaoCCWT14,
  author       = {Jingliang Liao and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Tian Wang and
                  Hui Tian},
  title        = {Improving Differential Evolution with Ring Topology-Based Mutation
                  Operators},
  booktitle    = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing, Guangdong, China, November 8-10, 2014},
  pages        = {103--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/3PGCIC.2014.43},
  doi          = {10.1109/3PGCIC.2014.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/LiaoCCWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/WangPCCT14,
  author       = {Tian Wang and
                  Zhen Peng and
                  Yonghong Chen and
                  Yiqiao Cai and
                  Hui Tian},
  title        = {Continuous tracking for mobile targets with mobility nodes in WSNs},
  booktitle    = {International Conference on Smart Computing, {SMARTCOMP} 2014, Hong
                  Kong, China, November 3-5, 2014},
  pages        = {261--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SMARTCOMP.2014.7043867},
  doi          = {10.1109/SMARTCOMP.2014.7043867},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcomp/WangPCCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSTL13,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Hui Tian and
                  Yali Liu},
  title        = {Trends in modern information hiding: techniques, applications and
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1414--1415},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.919},
  doi          = {10.1002/SEC.919},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TianJZF12,
  author       = {Hui Tian and
                  Hong Jiang and
                  Ke Zhou and
                  Dan Feng},
  title        = {Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {6},
  pages        = {702--716},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr111},
  doi          = {10.1093/COMJNL/BXR111},
  timestamp    = {Mon, 25 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/TianJZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/TianJZF12,
  author       = {Hui Tian and
                  Hong Jiang and
                  Ke Zhou and
                  Dan Feng},
  title        = {Erratum to "Adaptive partial-matching steganography for voice
                  over {IP} using triple {M} sequences" [Comput. Commun. 34 {(2011)}
                  2236-2247]},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {2},
  pages        = {272},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2011.11.005},
  doi          = {10.1016/J.COMCOM.2011.11.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/TianJZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuZT12,
  author       = {Jin Liu and
                  Ke Zhou and
                  Hui Tian},
  title        = {Least-significant-digit steganography in low bitrate speech},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {1133--1137},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363997},
  doi          = {10.1109/ICC.2012.6363997},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LiuZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ZhouLTL12,
  author       = {Ke Zhou and
                  Jin Liu and
                  Hui Tian and
                  Chun{-}hua Li},
  editor       = {Noboru Babaguchi and
                  Kiyoharu Aizawa and
                  John R. Smith and
                  Shin'ichi Satoh and
                  Thomas Plagemann and
                  Xian{-}Sheng Hua and
                  Rong Yan},
  title        = {State-based steganography in low bit rate speech},
  booktitle    = {Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara,
                  Japan, October 29 - November 02, 2012},
  pages        = {1109--1112},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393347.2396395},
  doi          = {10.1145/2393347.2396395},
  timestamp    = {Tue, 20 Jul 2021 15:36:10 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/ZhouLTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/TianJZF11,
  author       = {Hui Tian and
                  Hong Jiang and
                  Ke Zhou and
                  Dan Feng},
  title        = {Adaptive partial-matching steganography for voice over {IP} using
                  triple {M} sequences},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {18},
  pages        = {2236--2247},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2011.07.003},
  doi          = {10.1016/J.COMCOM.2011.07.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/TianJZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TianZJLHF09,
  author       = {Hui Tian and
                  Ke Zhou and
                  Hong Jiang and
                  Jin Liu and
                  Yongfeng Huang and
                  Dan Feng},
  title        = {An M-Sequence Based Steganography Model for Voice over {IP}},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198737},
  doi          = {10.1109/ICC.2009.5198737},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/TianZJLHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/TianZJHLF09,
  author       = {Hui Tian and
                  Ke Zhou and
                  Hong Jiang and
                  Yongfeng Huang and
                  Jin Liu and
                  Dan Feng},
  title        = {An Adaptive Steganography Scheme for Voice Over {IP}},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17
                  May 2009, Taipei, Taiwan},
  pages        = {2922--2925},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCAS.2009.5118414},
  doi          = {10.1109/ISCAS.2009.5118414},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/TianZJHLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/TianZJF09,
  author       = {Hui Tian and
                  Ke Zhou and
                  Hong Jiang and
                  Dan Feng},
  editor       = {Wen Gao and
                  Yong Rui and
                  Alan Hanjalic and
                  Changsheng Xu and
                  Eckehard G. Steinbach and
                  Abdulmotaleb El{-}Saddik and
                  Michelle X. Zhou},
  title        = {Digital logic based encoding strategies for steganography on voice-over-IP},
  booktitle    = {Proceedings of the 17th International Conference on Multimedia 2009,
                  Vancouver, British Columbia, Canada, October 19-24, 2009},
  pages        = {777--780},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1631272.1631412},
  doi          = {10.1145/1631272.1631412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/TianZJF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/TianZHFL08,
  author       = {Hui Tian and
                  Ke Zhou and
                  Yongfeng Huang and
                  Dan Feng and
                  Jin Liu},
  title        = {A Covert Communication Model Based on Least Significant Bits Steganography
                  in Voice over {IP}},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {647--652},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.394},
  doi          = {10.1109/ICYCS.2008.394},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/TianZHFL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}