Image copy-move forgery detection based on SURF X Bo, W Junwen, L Guangjie, D Yuewei 2010 International conference on multimedia information networking and …, 2010 | 366 | 2010 |
A passive image authentication scheme for detecting region-duplication forgery with rotation G Liu, J Wang, S Lian, Z Wang Journal of Network and Computer Applications 34 (5), 1557-1565, 2011 | 165 | 2011 |
Detection of image region duplication forgery using model with circle block J Wang, G Liu, H Li, Y Dai, Z Wang 2009 International conference on multimedia information networking and …, 2009 | 146 | 2009 |
Fast and robust forensics for image region-duplication forgery J Wang, G Liu, Z Zhang, Y Dai, Z Wang Acta Automatica Sinica 35 (12), 1488-1495, 2009 | 135 | 2009 |
Designing S-boxes based on 3-D four-wing autonomous chaotic system G Liu, W Yang, W Liu, Y Dai Nonlinear dynamics 82, 1867-1877, 2015 | 99 | 2015 |
Locally optimum detection for Barni's multiplicative watermarking in DWT domain J Wang, G Liu, Y Dai, J Sun, Z Wang, S Lian Signal Processing 88 (1), 117-130, 2008 | 82 | 2008 |
Designing S-box based on 4D-4wing hyperchaotic system F Islam, G Liu 3D Research 8, 1-9, 2017 | 58 | 2017 |
Efficient video encryption scheme based on advanced video coding S Lian, J Sun, G Liu, Z Wang Multimedia Tools and Applications 38, 75-89, 2008 | 57 | 2008 |
Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game W Tian, M Du, X Ji, G Liu, Y Dai, Z Han IEEE Internet of Things Journal 8 (24), 17372-17381, 2021 | 47 | 2021 |
Detecting stealthy domain generation algorithms using heterogeneous deep neural network framework L Yang, G Liu, Y Dai, J Wang, J Zhai Ieee Access 8, 82876-82889, 2020 | 43 | 2020 |
A covert channel detection algorithm based on TCP Markov model J Zhai, G Liu, Y Dai 2010 International Conference on Multimedia Information Networking and …, 2010 | 42 | 2010 |
Detect image splicing with artificial blurred boundary G Liu, J Wang, S Lian, Y Dai Mathematical and Computer Modelling 57 (11-12), 2647-2659, 2013 | 41 | 2013 |
Network covert timing channel with distribution matching G Liu, J Zhai, Y Dai Telecommunication Systems 49, 199-205, 2012 | 41 | 2012 |
A wireless covert channel based on constellation shaping modulation P Cao, W Liu, G Liu, X Ji, J Zhai, Y Dai Security and Communication Networks 2018 (1), 1214681, 2018 | 38 | 2018 |
Image forgery forensics based on manual blurred edge detection J Wang, G Liu, B Xu, H Li, Y Dai, Z Wang 2010 International conference on multimedia information networking and …, 2010 | 37 | 2010 |
Image splicing detection based on convolutional neural network with weight combination strategy J Wang, Q Ni, G Liu, X Luo, SK Jha Journal of Information Security and Applications 54, 102523, 2020 | 34 | 2020 |
Designing snort rules to detect abnormal DNP3 network data H Li, G Liu, W Jiang, Y Dai 2015 International Conference on Control, Automation and Information …, 2015 | 33 | 2015 |
Adaptive steganography based on block complexity and matrix embedding G Liu, W Liu, Y Dai, S Lian Multimedia systems 20, 227-238, 2014 | 33 | 2014 |
Prospect theoretic study of honeypot defense against advanced persistent threats in power grid W Tian, X Ji, W Liu, G Liu, J Zhai, Y Dai, S Huang IEEE Access 8, 64075-64085, 2020 | 32 | 2020 |
An adaptive matrix embedding for image steganography G Liu, W Liu, Y Dai, S Lian 2011 Third International Conference on Multimedia Information Networking and …, 2011 | 31 | 2011 |