关注
Guangjie Liu
Guangjie Liu
在 nuist.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Image copy-move forgery detection based on SURF
X Bo, W Junwen, L Guangjie, D Yuewei
2010 International conference on multimedia information networking and …, 2010
3662010
A passive image authentication scheme for detecting region-duplication forgery with rotation
G Liu, J Wang, S Lian, Z Wang
Journal of Network and Computer Applications 34 (5), 1557-1565, 2011
1652011
Detection of image region duplication forgery using model with circle block
J Wang, G Liu, H Li, Y Dai, Z Wang
2009 International conference on multimedia information networking and …, 2009
1462009
Fast and robust forensics for image region-duplication forgery
J Wang, G Liu, Z Zhang, Y Dai, Z Wang
Acta Automatica Sinica 35 (12), 1488-1495, 2009
1352009
Designing S-boxes based on 3-D four-wing autonomous chaotic system
G Liu, W Yang, W Liu, Y Dai
Nonlinear dynamics 82, 1867-1877, 2015
992015
Locally optimum detection for Barni's multiplicative watermarking in DWT domain
J Wang, G Liu, Y Dai, J Sun, Z Wang, S Lian
Signal Processing 88 (1), 117-130, 2008
822008
Designing S-box based on 4D-4wing hyperchaotic system
F Islam, G Liu
3D Research 8, 1-9, 2017
582017
Efficient video encryption scheme based on advanced video coding
S Lian, J Sun, G Liu, Z Wang
Multimedia Tools and Applications 38, 75-89, 2008
572008
Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game
W Tian, M Du, X Ji, G Liu, Y Dai, Z Han
IEEE Internet of Things Journal 8 (24), 17372-17381, 2021
472021
Detecting stealthy domain generation algorithms using heterogeneous deep neural network framework
L Yang, G Liu, Y Dai, J Wang, J Zhai
Ieee Access 8, 82876-82889, 2020
432020
A covert channel detection algorithm based on TCP Markov model
J Zhai, G Liu, Y Dai
2010 International Conference on Multimedia Information Networking and …, 2010
422010
Detect image splicing with artificial blurred boundary
G Liu, J Wang, S Lian, Y Dai
Mathematical and Computer Modelling 57 (11-12), 2647-2659, 2013
412013
Network covert timing channel with distribution matching
G Liu, J Zhai, Y Dai
Telecommunication Systems 49, 199-205, 2012
412012
A wireless covert channel based on constellation shaping modulation
P Cao, W Liu, G Liu, X Ji, J Zhai, Y Dai
Security and Communication Networks 2018 (1), 1214681, 2018
382018
Image forgery forensics based on manual blurred edge detection
J Wang, G Liu, B Xu, H Li, Y Dai, Z Wang
2010 International conference on multimedia information networking and …, 2010
372010
Image splicing detection based on convolutional neural network with weight combination strategy
J Wang, Q Ni, G Liu, X Luo, SK Jha
Journal of Information Security and Applications 54, 102523, 2020
342020
Designing snort rules to detect abnormal DNP3 network data
H Li, G Liu, W Jiang, Y Dai
2015 International Conference on Control, Automation and Information …, 2015
332015
Adaptive steganography based on block complexity and matrix embedding
G Liu, W Liu, Y Dai, S Lian
Multimedia systems 20, 227-238, 2014
332014
Prospect theoretic study of honeypot defense against advanced persistent threats in power grid
W Tian, X Ji, W Liu, G Liu, J Zhai, Y Dai, S Huang
IEEE Access 8, 64075-64085, 2020
322020
An adaptive matrix embedding for image steganography
G Liu, W Liu, Y Dai, S Lian
2011 Third International Conference on Multimedia Information Networking and …, 2011
312011
系统目前无法执行此操作,请稍后再试。
文章 1–20