default search action
BibTeX records: Hui Tian 0002
@article{DBLP:journals/taslp/LiGLQZT24, author = {Yangfu Li and Jiapan Gan and Xiaodan Lin and Yingqiang Qiu and Hongjian Zhan and Hui Tian}, title = {{DS-TDNN:} Dual-Stream Time-Delay Neural Network With Global-Aware Filter for Speaker Verification}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {32}, pages = {2814--2827}, year = {2024}, url = {https://doi.org/10.1109/TASLP.2024.3402072}, doi = {10.1109/TASLP.2024.3402072}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taslp/LiGLQZT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taslp/SunTTLQ24, author = {Congcong Sun and Hui Tian and Peng Tian and Haizhou Li and Zhenxing Qian}, title = {Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {32}, pages = {2957--2972}, year = {2024}, url = {https://doi.org/10.1109/TASLP.2024.3407607}, doi = {10.1109/TASLP.2024.3407607}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taslp/SunTTLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-10471, author = {Weizhi Liu and Yue Li and Dongdong Lin and Hui Tian and Haizhou Li}, title = {{GROOT:} Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis}, journal = {CoRR}, volume = {abs/2407.10471}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.10471}, doi = {10.48550/ARXIV.2407.10471}, eprinttype = {arXiv}, eprint = {2407.10471}, timestamp = {Wed, 04 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-10471.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SunTMCQC23, author = {Congcong Sun and Hui Tian and Wojciech Mazurczyk and Chin{-}Chen Chang and Hanyu Quan and Yonghong Chen}, title = {Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning}, journal = {Comput. Electr. Eng.}, volume = {111}, number = {Part {A}}, pages = {108909}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108909}, doi = {10.1016/J.COMPELECENG.2023.108909}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/SunTMCQC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/TianYWQC23, author = {Hui Tian and Weiping Ye and Jia Wang and Hanyu Quan and Chin{-}Chen Chang}, title = {Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0}, journal = {Int. J. Intell. Syst.}, volume = {2023}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.1155/2023/3375823}, doi = {10.1155/2023/3375823}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/TianYWQC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taslp/TianQMLQ23, author = {Hui Tian and Yiqin Qiu and Wojciech Mazurczyk and Haizhou Li and Zhenxing Qian}, title = {{STFF-SM:} Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {31}, pages = {277--289}, year = {2023}, url = {https://doi.org/10.1109/TASLP.2022.3224295}, doi = {10.1109/TASLP.2022.3224295}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taslp/TianQMLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QiuTLCV23, author = {Yiqin Qiu and Hui Tian and Haizhou Li and Chin{-}Chen Chang and Athanasios V. Vasilakos}, title = {Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2737--2750}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3269640}, doi = {10.1109/TIFS.2023.3269640}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QiuTLCV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/SunTMCCC22, author = {Congcong Sun and Hui Tian and Wojciech Mazurczyk and Chin{-}Chen Chang and Yiqiao Cai and Yonghong Chen}, title = {Towards blind detection of steganography in low-bit-rate speech streams}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {12085--12112}, year = {2022}, url = {https://doi.org/10.1002/int.23077}, doi = {10.1002/INT.23077}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/SunTMCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiuTTMC22, author = {Yiqin Qiu and Hui Tian and Lili Tang and Wojciech Mazurczyk and Chin{-}Chen Chang}, title = {Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103250}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103250}, doi = {10.1016/J.JISA.2022.103250}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TianWQC22, author = {Hui Tian and Junyan Wu and Hanyu Quan and Chin{-}Chen Chang}, title = {Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network}, journal = {{IEEE} Signal Process. Lett.}, volume = {29}, pages = {2462--2466}, year = {2022}, url = {https://doi.org/10.1109/LSP.2022.3226126}, doi = {10.1109/LSP.2022.3226126}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/TianWQC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/TianPQC22, author = {Hui Tian and Fang Peng and Hanyu Quan and Chin{-}Chen Chang}, title = {Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {4}, pages = {88:1--88:24}, year = {2022}, url = {https://doi.org/10.1145/3433543}, doi = {10.1145/3433543}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/TianPQC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aipr2/Xu0QL22, author = {Shulong Xu and Hui Tian and Hanyu Quan and Jing Lu}, title = {A Novel Global-Local Representations Network for Speech Steganalysis}, booktitle = {Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, {AIPR} 2022, Xiamen, China, September 23-25, 2022}, pages = {945--949}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573942.3574196}, doi = {10.1145/3573942.3574196}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aipr2/Xu0QL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcomps/SunCTW21, author = {Chonggao Sun and Yonghong Chen and Hui Tian and Shuhong Wu}, title = {Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network}, journal = {{IEEE} Open J. Comput. Soc.}, volume = {2}, pages = {407--418}, year = {2021}, url = {https://doi.org/10.1109/OJCS.2021.3131598}, doi = {10.1109/OJCS.2021.3131598}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcomps/SunCTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/WuCTS21, author = {Shuhong Wu and Yonghong Chen and Hui Tian and Chonggao Sun}, title = {Detection of Covert Timing Channel Based on Time Series Symbolization}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {2}, pages = {2372--2382}, year = {2021}, url = {https://doi.org/10.1109/OJCOMS.2021.3118697}, doi = {10.1109/OJCOMS.2021.3118697}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcs/WuCTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/QiuQHTZ21, author = {Yingqiang Qiu and Zhenxing Qian and Han He and Hui Tian and Xinpeng Zhang}, title = {Optimized Lossless Data Hiding in {JPEG} Bitstream and Relay Transfer-Based Extension}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {4}, pages = {1380--1394}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3006494}, doi = {10.1109/TCSVT.2020.3006494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/QiuQHTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TianLCHC20, author = {Hui Tian and Jie Liu and Chin{-}Chen Chang and Yongfeng Huang and Yiqiao Cai}, title = {Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency}, journal = {{IEEE} Access}, volume = {8}, pages = {6117--6129}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2962009}, doi = {10.1109/ACCESS.2019.2962009}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TianLCHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouWTJW20, author = {Changli Zhou and Tian Wang and Hui Tian and Wenxian Jiang and Zhijian Wang}, title = {A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT}, journal = {{IEEE} Access}, volume = {8}, pages = {81698--81710}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2990932}, doi = {10.1109/ACCESS.2020.2990932}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouWTJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangZLCTCW20, author = {Tian Wang and Jiandian Zeng and Yongxuan Lai and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Data collection from WSNs to the cloud based on mobile Fog elements}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {864--872}, year = {2020}, url = {https://doi.org/10.1016/j.future.2017.07.031}, doi = {10.1016/J.FUTURE.2017.07.031}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangZLCTCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianZCHWCC20, author = {Hui Tian and Zhao{-}Hua Zhu and Chin{-}Chen Chang and Yongfeng Huang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {StegoNote: Steganography in Guitar Music Using Note Modulation}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {1}, pages = {68--79}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p68-79.pdf}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianZCHWCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/swevo/CaiWZFTD20, author = {Yiqiao Cai and Duanwei Wu and Ying Zhou and Shunkai Fu and Hui Tian and Yongqian Du}, title = {Self-organizing neighborhood-based differential evolution for global optimization}, journal = {Swarm Evol. Comput.}, volume = {56}, pages = {100699}, year = {2020}, url = {https://doi.org/10.1016/j.swevo.2020.100699}, doi = {10.1016/J.SWEVO.2020.100699}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/swevo/CaiWZFTD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/Peng0QL20, author = {Fang Peng and Hui Tian and Hanyu Quan and Jing Lu}, editor = {Guangquan Xu and Kaitai Liang and Chunhua Su}, title = {Data Auditing for the Internet of Things Environments Leveraging Smart Contract}, booktitle = {Frontiers in Cyber Security - Third International Conference, {FCS} 2020, Tianjin, China, November 15-17, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1286}, pages = {133--149}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9739-8\_12}, doi = {10.1007/978-981-15-9739-8\_12}, timestamp = {Wed, 07 Dec 2022 09:54:09 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/Peng0QL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiSZFTC19, author = {Yiqiao Cai and Chi Shao and Huizhen Zhang and Shunkai Fu and Hui Tian and Yonghong Chen}, title = {A Neighborhood-Assisted Framework for Differential Evolution}, journal = {{IEEE} Access}, volume = {7}, pages = {44338--44358}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2908660}, doi = {10.1109/ACCESS.2019.2908660}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaiSZFTC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiSZFZT19, author = {Yiqiao Cai and Chi Shao and Ying Zhou and Shunkai Fu and Huizhen Zhang and Hui Tian}, title = {Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules}, journal = {{IEEE} Access}, volume = {7}, pages = {58023--58040}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2914963}, doi = {10.1109/ACCESS.2019.2914963}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaiSZFZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TianLCCH19, author = {Hui Tian and Jie Liu and Chin{-}Chen Chang and Chih{-}Cheng Chen and Yongfeng Huang}, title = {Steganalysis of {AMR} Speech Based on Multiple Classifiers Combination}, journal = {{IEEE} Access}, volume = {7}, pages = {140957--140968}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2943504}, doi = {10.1109/ACCESS.2019.2943504}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TianLCCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TianCJHNC19, author = {Hui Tian and Yuxiang Chen and Hong Jiang and Yongfeng Huang and Fulin Nan and Yonghong Chen}, title = {Public Auditing for Trusted Cloud Storage Services}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {10--22}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2875880}, doi = {10.1109/MSEC.2018.2875880}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/TianCJHNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/NanTWCC19, author = {Fulin Nan and Hui Tian and Tian Wang and Yiqiao Cai and Yonghong Chen}, title = {A collusion-resistant public auditing scheme for shared cloud data}, journal = {Int. J. Inf. Technol. Manag.}, volume = {18}, number = {2/3}, pages = {195--212}, year = {2019}, url = {https://doi.org/10.1504/IJITM.2019.099816}, doi = {10.1504/IJITM.2019.099816}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/NanTWCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuCTW19, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang}, title = {A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {2}, pages = {243--249}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n2/ijns-2019-v21-n2-p243-249.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuCTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuCTWC19, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {4}, pages = {648--660}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p648-660.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuCTWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TianNJCNH19, author = {Hui Tian and Fulin Nan and Hong Jiang and Chin{-}Chen Chang and Jianting Ning and Yongfeng Huang}, title = {Public auditing for shared cloud data with efficient and secure group management}, journal = {Inf. Sci.}, volume = {472}, pages = {107--125}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.009}, doi = {10.1016/J.INS.2018.09.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TianNJCNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TianNCHLD19, author = {Hui Tian and Fulin Nan and Chin{-}Chen Chang and Yongfeng Huang and Jing Lu and Yongqian Du}, title = {Privacy-preserving public auditing for secure data storage in fog-to-cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {127}, pages = {59--69}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.12.004}, doi = {10.1016/J.JNCA.2018.12.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TianNCHLD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/TianHCHLD19, author = {Hui Tian and Meilun Huang and Chin{-}Chen Chang and Yongfeng Huang and Jing Lu and Yongqian Du}, title = {Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {9}, pages = {1131--1150}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_9/steganalysis\_of\_adaptive\_multi}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/TianHCHLD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuTHL19, author = {Xiaokang Liu and Hui Tian and Yongfeng Huang and Jing Lu}, title = {A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search}, journal = {Multim. Tools Appl.}, volume = {78}, number = {7}, pages = {8447--8461}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6867-7}, doi = {10.1007/S11042-018-6867-7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuTHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianCCHWHCC19, author = {Hui Tian and Zhaoyi Chen and Chin{-}Chen Chang and Yongfeng Huang and Tian Wang and Zheng{-}an Huang and Yiqiao Cai and Yonghong Chen}, title = {Public audit for operation behavior logs with error locating in cloud storage}, journal = {Soft Comput.}, volume = {23}, number = {11}, pages = {3779--3792}, year = {2019}, url = {https://doi.org/10.1007/s00500-018-3038-8}, doi = {10.1007/S00500-018-3038-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/TianCCHWHCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Li0N19, author = {Xiang Li and Hui Tian and Jianting Ning}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {347--354}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_22}, doi = {10.1007/978-3-030-31919-9\_22}, timestamp = {Tue, 07 May 2024 20:13:43 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Li0N19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/CaiPFT19, author = {Yiqiao Cai and Deining Peng and Shunkai Fu and Hui Tian}, title = {Multitasking differential evolution with difference vector sharing mechanism}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2019, Xiamen, China, December 6-9, 2019}, pages = {3039--3046}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SSCI44817.2019.9002698}, doi = {10.1109/SSCI44817.2019.9002698}, timestamp = {Wed, 26 Feb 2020 16:57:41 +0100}, biburl = {https://dblp.org/rec/conf/ssci/CaiPFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangZBCCTX18, author = {Tian Wang and Jiandian Zeng and Md. Zakirul Alam Bhuiyan and Yonghong Chen and Yiqiao Cai and Hui Tian and Mande Xie}, title = {Energy-efficient relay tracking with multiple mobile camera sensors}, journal = {Comput. Networks}, volume = {133}, pages = {130--140}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.002}, doi = {10.1016/J.COMNET.2018.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangZBCCTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/TianSCHC18, author = {Hui Tian and Jun Sun and Chin{-}Chen Chang and Yongfeng Huang and Yonghong Chen}, title = {Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication}, journal = {{IEEE} Commun. Lett.}, volume = {22}, number = {6}, pages = {1196--1199}, year = {2018}, url = {https://doi.org/10.1109/LCOMM.2018.2822804}, doi = {10.1109/LCOMM.2018.2822804}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/TianSCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaiLWCT18, author = {Yiqiao Cai and Jingliang Liao and Tian Wang and Yonghong Chen and Hui Tian}, title = {Social learning differential evolution}, journal = {Inf. Sci.}, volume = {433-434}, pages = {464--509}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2016.10.003}, doi = {10.1016/J.INS.2016.10.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CaiLWCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SunCWTWC18, author = {Guo Sun and Yiqiao Cai and Tian Wang and Hui Tian and Cheng Wang and Yonghong Chen}, title = {Differential evolution with individual-dependent topology adaptation}, journal = {Inf. Sci.}, volume = {450}, pages = {1--38}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.048}, doi = {10.1016/J.INS.2018.02.048}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SunCWTWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/Zhu00C0C18, author = {Zhao{-}Hua Zhu and Hui Tian and Chin{-}Chen Chang and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {StegTab: Steganography in Guitar Tablatures}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {904--917}, year = {2018}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2018/vol9/JIH-MSP-2018-04-013.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/Zhu00C0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ChangLZT18, author = {Chin{-}Chen Chang and Tzu{-}Chuen Lu and Zhao{-}Hua Zhu and Hui Tian}, title = {An Effective Authentication Scheme Using {DCT} for Mobile Devices}, journal = {Symmetry}, volume = {10}, number = {1}, pages = {13}, year = {2018}, url = {https://doi.org/10.3390/sym10010013}, doi = {10.3390/SYM10010013}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ChangLZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Liu000CC18, author = {Jie Liu and Hui Tian and Chin{-}Chen Chang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test}, journal = {Symmetry}, volume = {10}, number = {8}, pages = {336}, year = {2018}, url = {https://doi.org/10.3390/sym10080336}, doi = {10.3390/SYM10080336}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/Liu000CC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ChenTCNL18, author = {Wenqi Chen and Hui Tian and Chin{-}Chen Chang and Fulin Nan and Jing Lu}, title = {Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {3471312:1--3471312:12}, year = {2018}, url = {https://doi.org/10.1155/2018/3471312}, doi = {10.1155/2018/3471312}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ChenTCNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LuC0C0C18, author = {Jing Lu and Yuxiang Chen and Hui Tian and Yonghong Chen and Tian Wang and Yiqiao Cai}, editor = {Ting Hu and Feng Wang and Hongwei Li and Qian Wang}, title = {Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11338}, pages = {185--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05234-8\_23}, doi = {10.1007/978-3-030-05234-8\_23}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LuC0C0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWJT18, author = {Changli Zhou and Tian Wang and Wenxian Jiang and Hui Tian}, title = {Practical {K} Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1316--1321}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00181}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00181}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/0001TJ18, author = {Tian Wang and Hui Tian and Wenxian Jiang}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Continuous {K} Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {828--833}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00153}, doi = {10.1109/SMARTWORLD.2018.00153}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/uic/0001TJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZBTCCZ17, author = {Tian Wang and Jiandian Zeng and Md. Zakirul Alam Bhuiyan and Hui Tian and Yiqiao Cai and Yonghong Chen and Bineng Zhong}, title = {Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services}, journal = {{IEEE} Access}, volume = {5}, pages = {7692--7701}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2698078}, doi = {10.1109/ACCESS.2017.2698078}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZBTCCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/WangWLWTCCW17, author = {Tian Wang and Wenhua Wang and Yongxuan Lai and Sheng Wen and Hui Tian and Yiqiao Cai and Yonghong Chen and Baowei Wang}, title = {The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {37}, number = {1-4}, pages = {95--115}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-95-115/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/WangWLWTCCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/CaiSWTCW17, author = {Yiqiao Cai and Guo Sun and Tian Wang and Hui Tian and Yonghong Chen and Jiahai Wang}, title = {Neighborhood-adaptive differential evolution for global numerical optimization}, journal = {Appl. Soft Comput.}, volume = {59}, pages = {659--706}, year = {2017}, url = {https://doi.org/10.1016/j.asoc.2017.06.002}, doi = {10.1016/J.ASOC.2017.06.002}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/CaiSWTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangWCBLCTCW17, author = {Tian Wang and Wenhua Wang and Jiannong Cao and Md. Zakirul Alam Bhuiyan and Yongxuan Lai and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Interoperable localization for mobile group users}, journal = {Comput. Commun.}, volume = {105}, pages = {53--65}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.02.006}, doi = {10.1016/J.COMCOM.2017.02.006}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/WangWCBLCTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/TianSCQC17, author = {Hui Tian and Jun Sun and Chin{-}Chen Chang and Jie Qin and Yonghong Chen}, title = {Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation}, journal = {{IEEE} Commun. Lett.}, volume = {21}, number = {4}, pages = {749--752}, year = {2017}, url = {https://doi.org/10.1109/LCOMM.2017.2659718}, doi = {10.1109/LCOMM.2017.2659718}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/TianSCQC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WangLCTCJW17, author = {Tian Wang and Yang Li and Yonghong Chen and Hui Tian and Yiqiao Cai and Weijia Jia and Baowei Wang}, title = {Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System}, journal = {{IEEE} Commun. Lett.}, volume = {21}, number = {11}, pages = {2532--2535}, year = {2017}, url = {https://doi.org/10.1109/LCOMM.2017.2740279}, doi = {10.1109/LCOMM.2017.2740279}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/WangLCTCJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangPWLJCTC17, author = {Tian Wang and Zhen Peng and Sheng Wen and Yongxuan Lai and Weijia Jia and Yiqiao Cai and Hui Tian and Yonghong Chen}, title = {Reliable wireless connections for fast-moving rail users based on a chained fog structure}, journal = {Inf. Sci.}, volume = {379}, pages = {160--176}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.06.031}, doi = {10.1016/J.INS.2016.06.031}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangPWLJCTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GuoCCWT17, author = {Weipeng Guo and Yonghong Chen and Yiqiao Cai and Tian Wang and Hui Tian}, title = {DIntrusion Detection in {WSN} with an Improved {NSA} Based on the {DE-CMOP}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {11}, pages = {5574--5591}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.11.022}, doi = {10.3837/TIIS.2017.11.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GuoCCWT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/0002CHL18, author = {Hui Tian and Yuxiang Chen and Yongfeng Huang and Jing Lu}, title = {{\unicode{20113}}{\unicode{25968}}{\unicode{25454}}{\unicode{25345}}{\unicode{26377}}{\unicode{24615}}{\unicode{23457}}{\unicode{35745}}{\unicode{30740}}{\unicode{31350}}{\unicode{19982}}{\unicode{36827}}{\unicode{23637}} (Research and Development of Auditing Techniques for Cloud Data Possession)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {6}, pages = {8--16}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.06.002}, doi = {10.11896/J.ISSN.1002-137X.2017.06.002}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/0002CHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/TianSHWCC17, author = {Hui Tian and Jun Sun and Yongfeng Huang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {5418978:1--5418978:18}, year = {2017}, url = {https://doi.org/10.1155/2017/5418978}, doi = {10.1155/2017/5418978}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mis/TianSHWCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangWWCTCW17, author = {Tian Wang and Qun Wu and Sheng Wen and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks}, journal = {Sensors}, volume = {17}, number = {1}, pages = {139}, year = {2017}, url = {https://doi.org/10.3390/s17010139}, doi = {10.3390/S17010139}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WangWWCTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/TianWCHCWCL17, author = {Hui Tian and Yanpeng Wu and Chin{-}Chen Chang and Yongfeng Huang and Yonghong Chen and Tian Wang and Yiqiao Cai and Jin Liu}, title = {Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs}, journal = {Signal Process.}, volume = {134}, pages = {9--22}, year = {2017}, url = {https://doi.org/10.1016/j.sigpro.2016.11.013}, doi = {10.1016/J.SIGPRO.2016.11.013}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/TianWCHCWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianWCHLWCL17, author = {Hui Tian and Yanpeng Wu and Yiqiao Cai and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Jing Lu}, title = {Distributed steganalysis of compressed speech}, journal = {Soft Comput.}, volume = {21}, number = {3}, pages = {795--804}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1816-0}, doi = {10.1007/S00500-015-1816-0}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/TianWCHLWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianCCKHCCW17, author = {Hui Tian and Zhaoyi Chen and Chin{-}Chen Chang and Minoru Kuribayashi and Yongfeng Huang and Yiqiao Cai and Yonghong Chen and Tian Wang}, title = {Enabling public auditability for operation behaviors in cloud storage}, journal = {Soft Comput.}, volume = {21}, number = {8}, pages = {2175--2187}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2311-y}, doi = {10.1007/S00500-016-2311-Y}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/TianCCKHCCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CaiZLWTC17, author = {Yiqiao Cai and Meng Zhao and Jingliang Liao and Tian Wang and Hui Tian and Yonghong Chen}, title = {Neighborhood guided differential evolution}, journal = {Soft Comput.}, volume = {21}, number = {16}, pages = {4769--4812}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2088-z}, doi = {10.1007/S00500-016-2088-Z}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/CaiZLWTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/TianCCJHCL17, author = {Hui Tian and Yuxiang Chen and Chin{-}Chen Chang and Hong Jiang and Yongfeng Huang and Yonghong Chen and Jin Liu}, title = {Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {5}, pages = {701--714}, year = {2017}, url = {https://doi.org/10.1109/TSC.2015.2512589}, doi = {10.1109/TSC.2015.2512589}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/TianCCJHCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/WuWCTC17, author = {Qun Wu and Tian Wang and Yiqiao Cai and Hui Tian and Yonghong Chen}, title = {Rumor restraining based on propagation prediction with limited observations in large-scale social networks}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3014812.3014813}, doi = {10.1145/3014812.3014813}, timestamp = {Tue, 06 Nov 2018 11:06:53 +0100}, biburl = {https://dblp.org/rec/conf/acsw/WuWCTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ChenTLCCWC17, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Wenqi Chen and Yiqiao Cai and Tian Wang and Yonghong Chen}, title = {Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 2}, pages = {51--57}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.195}, doi = {10.1109/CSE-EUC.2017.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ChenTLCCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ChenTLNCWC17, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Fulin Nan and Yiqiao Cai and Tian Wang and Yonghong Chen}, title = {Secure Logging and Public Audit for Operation Behavior in Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {444--450}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.85}, doi = {10.1109/CSE-EUC.2017.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ChenTLNCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/CaiCWT16, author = {Yiqiao Cai and Yonghong Chen and Tian Wang and Hui Tian}, title = {Improving differential evolution with a new selection method of parents for mutation}, journal = {Frontiers Comput. Sci.}, volume = {10}, number = {2}, pages = {246--269}, year = {2016}, url = {https://doi.org/10.1007/s11704-015-4480-8}, doi = {10.1007/S11704-015-4480-8}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/CaiCWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ChenZTWC16, author = {Yonghong Chen and Ning Zhang and Hui Tian and Tian Wang and Yiqiao Cai}, title = {A Novel Connection Correlation Scheme Based on Threshold Secret Sharing}, journal = {{IEEE} Commun. Lett.}, volume = {20}, number = {12}, pages = {2414--2417}, year = {2016}, url = {https://doi.org/10.1109/LCOMM.2016.2604390}, doi = {10.1109/LCOMM.2016.2604390}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ChenZTWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WangPWCCTLZ16, author = {Tian Wang and Zhen Peng and Cheng Wang and Yiqiao Cai and Yonghong Chen and Hui Tian and Junbin Liang and Bineng Zhong}, title = {Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {2}, pages = {5831471:1--5831471:11}, year = {2016}, url = {https://doi.org/10.1155/2016/5831471}, doi = {10.1155/2016/5831471}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WangPWCCTLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/LiuTLC16, author = {Jin Liu and Hui Tian and Jing Lu and Yonghong Chen}, title = {Neighbor-index-division steganography based on {QIM} method for {G.723.1} speech streams}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {7}, number = {1}, pages = {139--147}, year = {2016}, url = {https://doi.org/10.1007/s12652-015-0315-6}, doi = {10.1007/S12652-015-0315-6}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/LiuTLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuC00C16a, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {{\unicode{20004}}{\unicode{23618}}{\unicode{26080}}{\unicode{32447}}{\unicode{20256}}{\unicode{24863}}{\unicode{32593}}{\unicode{20013}}{\unicode{33410}}{\unicode{33021}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{33539}}{\unicode{22260}}{\unicode{26597}}{\unicode{35810}}{\unicode{26041}}{\unicode{27861}} (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {{Z11}}, pages = {393--397}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.11A.090}, doi = {10.11896/J.ISSN.1002-137X.2016.11A.090}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuC00C16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuC00C16, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{21487}}{\unicode{26816}}{\unicode{27979}}{\unicode{25968}}{\unicode{25454}}{\unicode{23436}}{\unicode{25972}}{\unicode{24615}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{25968}}{\unicode{25454}}{\unicode{32858}}{\unicode{21512}}{\unicode{21327}}{\unicode{35758}} (Integrity-checking Security Data Aggregation Protocol)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {{Z6}}, pages = {353--356}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.6A.084}, doi = {10.11896/J.ISSN.1002-137X.2016.6A.084}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuC00C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSJT16, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Artur Janicki and Hui Tian}, title = {Trends in modern information hiding: techniques, applications, and detection}, journal = {Secur. Commun. Networks}, volume = {9}, number = {8}, pages = {703--704}, year = {2016}, url = {https://doi.org/10.1002/sec.1469}, doi = {10.1002/SEC.1469}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianWCHLWCC16, author = {Hui Tian and Yanpeng Wu and Chin{-}Chen Chang and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2934--2944}, year = {2016}, url = {https://doi.org/10.1002/sec.1443}, doi = {10.1002/SEC.1443}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TianWCHLWCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CaiWCWTL16, author = {Yiqiao Cai and Jiahai Wang and Yonghong Chen and Tian Wang and Hui Tian and Wei Luo}, title = {Adaptive direction information in differential evolution for numerical optimization}, journal = {Soft Comput.}, volume = {20}, number = {2}, pages = {465--494}, year = {2016}, url = {https://doi.org/10.1007/s00500-014-1517-0}, doi = {10.1007/S00500-014-1517-0}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/CaiWCWTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiaoCWTC16, author = {Jingliang Liao and Yiqiao Cai and Tian Wang and Hui Tian and Yonghong Chen}, title = {Cellular direction information based differential evolution for numerical optimization: an empirical study}, journal = {Soft Comput.}, volume = {20}, number = {7}, pages = {2801--2827}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1682-9}, doi = {10.1007/S00500-015-1682-9}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiaoCWTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcomp/Chen0LC0C16, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Yiqiao Cai and Tian Wang and Yonghong Chen}, editor = {Jiafu Wan and Kai Lin and Delu Zeng and Jin Li and Yang Xiang and Xiaofeng Liao and Jiwu Huang and Zheli Liu}, title = {Operational-Behavior Auditing in Cloud Storage}, booktitle = {Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {197}, pages = {162--172}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69605-8\_15}, doi = {10.1007/978-3-319-69605-8\_15}, timestamp = {Sat, 29 Aug 2020 18:19:26 +0200}, biburl = {https://dblp.org/rec/conf/cloudcomp/Chen0LC0C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/KongCTWCC16, author = {Xinling Kong and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai and Xin Chen}, editor = {Bin Xie and Xiaolong Xu}, title = {A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering}, booktitle = {International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2016, Chengdu, China, October 13-15, 2016}, pages = {42--45}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberC.2016.16}, doi = {10.1109/CYBERC.2016.16}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cyberc/KongCTWCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangWBCTC16, author = {Wenhua Wang and Tian Wang and Md. Zakirul Alam Bhuiyan and Yiqiao Cai and Hui Tian and Yonghong Chen}, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {Improving the Localization Probability and Decreasing Communication Cost for Mobile Users}, booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, pages = {197--207}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5\_20}, doi = {10.1007/978-3-319-49145-5\_20}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/WangWBCTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/WangJZTZ15, author = {Tian Wang and Weijia Jia and Bineng Zhong and Hui Tian and Guoliang Zhang}, title = {BlueCat: An Infrastructure-Free System for Relative Mobile Localization}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {29}, number = {1-4}, pages = {133--152}, year = {2015}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-29-number-1-4-2015/ahswn-29-1-4-p-133-152/}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ahswn/WangJZTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangCJWWTCZ15, author = {Tian Wang and Yiqiao Cai and Weijia Jia and Sheng Wen and Guojun Wang and Hui Tian and Yonghong Chen and Bineng Zhong}, title = {Maximizing real-time streaming services based on a multi-servers networking framework}, journal = {Comput. Networks}, volume = {93}, pages = {199--212}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.10.019}, doi = {10.1016/J.COMNET.2015.10.019}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangCJWWTCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TianQGHLWCC15, author = {Hui Tian and Jie Qin and Shuting Guo and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Improved adaptive partial-matching steganography for Voice over {IP}}, journal = {Comput. Commun.}, volume = {70}, pages = {95--108}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.08.011}, doi = {10.1016/J.COMCOM.2015.08.011}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/TianQGHLWCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/TianQHWLCWC15, author = {Hui Tian and Jie Qin and Yongfeng Huang and Xu An Wang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {A High-Capacity Covering Code for Voice-Over-IP Steganography}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {10}, number = {3}, pages = {46--63}, year = {2015}, url = {https://doi.org/10.4018/IJITWE.2015070104}, doi = {10.4018/IJITWE.2015070104}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/TianQHWLCWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/TianQHCWLC15, author = {Hui Tian and Jie Qin and Yongfeng Huang and Yonghong Chen and Tian Wang and Jin Liu and Yiqiao Cai}, title = {Optimal matrix embedding for Voice-over-IP steganography}, journal = {Signal Process.}, volume = {117}, pages = {33--43}, year = {2015}, url = {https://doi.org/10.1016/j.sigpro.2015.05.001}, doi = {10.1016/J.SIGPRO.2015.05.001}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/TianQHCWLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/QinTHLCWCW15, author = {Jie Qin and Hui Tian and Yongfeng Huang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai and Xu An Wang}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {An Efficient VoIP Steganography Based on Random Binary Matrix}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {462--465}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.65}, doi = {10.1109/3PGCIC.2015.65}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/QinTHLCWCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TianWHLCWC15, author = {Hui Tian and Yanpeng Wu and Yongfeng Huang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {455--460}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.21}, doi = {10.1109/ARES.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TianWHLCWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WangPLCCTZ15, author = {Tian Wang and Zhen Peng and Junbin Liang and Yiqiao Cai and Yonghong Chen and Hui Tian and Bineng Zhong}, editor = {Kuai Xu and Haojin Zhu}, title = {Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {836--844}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_82}, doi = {10.1007/978-3-319-21837-3\_82}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WangPLCCTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MazurczykST14, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Hui Tian}, title = {Network forensics and challenges for cybersecurity}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {7-8}, pages = {345--346}, year = {2014}, url = {https://doi.org/10.1007/s12243-014-0434-7}, doi = {10.1007/S12243-014-0434-7}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/MazurczykST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/LiDTD14, author = {Songbin Li and Haojiang Deng and Hui Tian and Qiongxing Dai}, title = {Steganalysis of prediction mode modulated data-hiding algorithms in {H.264/AVC} video stream}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {7-8}, pages = {461--473}, year = {2014}, url = {https://doi.org/10.1007/s12243-013-0381-8}, doi = {10.1007/S12243-013-0381-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/LiDTD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/TianLL14, author = {Hui Tian and Jin Liu and Songbin Li}, title = {Improving security of quantization-index-modulation steganography in low bit-rate speech streams}, journal = {Multim. Syst.}, volume = {20}, number = {2}, pages = {143--154}, year = {2014}, url = {https://doi.org/10.1007/s00530-013-0302-8}, doi = {10.1007/S00530-013-0302-8}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/TianLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/LiaoCCWT14, author = {Jingliang Liao and Yiqiao Cai and Yonghong Chen and Tian Wang and Hui Tian}, title = {Improving Differential Evolution with Ring Topology-Based Mutation Operators}, booktitle = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014}, pages = {103--109}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/3PGCIC.2014.43}, doi = {10.1109/3PGCIC.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/LiaoCCWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/WangPCCT14, author = {Tian Wang and Zhen Peng and Yonghong Chen and Yiqiao Cai and Hui Tian}, title = {Continuous tracking for mobile targets with mobility nodes in WSNs}, booktitle = {International Conference on Smart Computing, {SMARTCOMP} 2014, Hong Kong, China, November 3-5, 2014}, pages = {261--268}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SMARTCOMP.2014.7043867}, doi = {10.1109/SMARTCOMP.2014.7043867}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcomp/WangPCCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSTL13, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Hui Tian and Yali Liu}, title = {Trends in modern information hiding: techniques, applications and detection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1414--1415}, year = {2013}, url = {https://doi.org/10.1002/sec.919}, doi = {10.1002/SEC.919}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TianJZF12, author = {Hui Tian and Hong Jiang and Ke Zhou and Dan Feng}, title = {Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography}, journal = {Comput. J.}, volume = {55}, number = {6}, pages = {702--716}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr111}, doi = {10.1093/COMJNL/BXR111}, timestamp = {Mon, 25 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TianJZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TianJZF12, author = {Hui Tian and Hong Jiang and Ke Zhou and Dan Feng}, title = {Erratum to "Adaptive partial-matching steganography for voice over {IP} using triple {M} sequences" [Comput. Commun. 34 {(2011)} 2236-2247]}, journal = {Comput. Commun.}, volume = {35}, number = {2}, pages = {272}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2011.11.005}, doi = {10.1016/J.COMCOM.2011.11.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/TianJZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiuZT12, author = {Jin Liu and Ke Zhou and Hui Tian}, title = {Least-significant-digit steganography in low bitrate speech}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {1133--1137}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363997}, doi = {10.1109/ICC.2012.6363997}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/LiuZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhouLTL12, author = {Ke Zhou and Jin Liu and Hui Tian and Chun{-}hua Li}, editor = {Noboru Babaguchi and Kiyoharu Aizawa and John R. Smith and Shin'ichi Satoh and Thomas Plagemann and Xian{-}Sheng Hua and Rong Yan}, title = {State-based steganography in low bit rate speech}, booktitle = {Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara, Japan, October 29 - November 02, 2012}, pages = {1109--1112}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393347.2396395}, doi = {10.1145/2393347.2396395}, timestamp = {Tue, 20 Jul 2021 15:36:10 +0200}, biburl = {https://dblp.org/rec/conf/mm/ZhouLTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TianJZF11, author = {Hui Tian and Hong Jiang and Ke Zhou and Dan Feng}, title = {Adaptive partial-matching steganography for voice over {IP} using triple {M} sequences}, journal = {Comput. Commun.}, volume = {34}, number = {18}, pages = {2236--2247}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2011.07.003}, doi = {10.1016/J.COMCOM.2011.07.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/TianJZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TianZJLHF09, author = {Hui Tian and Ke Zhou and Hong Jiang and Jin Liu and Yongfeng Huang and Dan Feng}, title = {An M-Sequence Based Steganography Model for Voice over {IP}}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198737}, doi = {10.1109/ICC.2009.5198737}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/TianZJLHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/TianZJHLF09, author = {Hui Tian and Ke Zhou and Hong Jiang and Yongfeng Huang and Jin Liu and Dan Feng}, title = {An Adaptive Steganography Scheme for Voice Over {IP}}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17 May 2009, Taipei, Taiwan}, pages = {2922--2925}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISCAS.2009.5118414}, doi = {10.1109/ISCAS.2009.5118414}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/TianZJHLF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/TianZJF09, author = {Hui Tian and Ke Zhou and Hong Jiang and Dan Feng}, editor = {Wen Gao and Yong Rui and Alan Hanjalic and Changsheng Xu and Eckehard G. Steinbach and Abdulmotaleb El{-}Saddik and Michelle X. Zhou}, title = {Digital logic based encoding strategies for steganography on voice-over-IP}, booktitle = {Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009}, pages = {777--780}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1631272.1631412}, doi = {10.1145/1631272.1631412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/TianZJF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/TianZHFL08, author = {Hui Tian and Ke Zhou and Yongfeng Huang and Dan Feng and Jin Liu}, title = {A Covert Communication Model Based on Least Significant Bits Steganography in Voice over {IP}}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {647--652}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.394}, doi = {10.1109/ICYCS.2008.394}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/TianZHFL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.