1 |
LIS, ZHANGX. Towards construction based data hiding: from secrets to fingerprint images[J]. IEEE Transactions on Image Processing, 2019, 28(3): 1482‑1497.
|
2 |
EVSUTINO O, MELMANA S, MESHCHERYAKOVR V. Digital steganography and watermarking for digital images: a review of current research directions[J]. IEEE Access, 2020, 8: 166589‑166611.
|
3 |
WANGZ, ZHANGX, YINZ. Joint cover-selection and payload-allocation by steganographic distortion optimization[J]. IEEE Signal Process Lett, 2018, 25(10): 1530‑1534.
|
4 |
DUTTAH, DASR K, NANDIS, et al. An overview of digital audio steganography[J]. IETE Technical Review, 2020, 37(6): 632‑650.
|
5 |
PANTICN, HUSAINM I. Covert botnet command and control using twitter[C]//Michael Ley. Proceedings of the 31st Annual Computer Security Applications Conference. Los Angeles: Associine for Computer Mair coolinghinery, 2015: 171‑180.
|
6 |
LIS, HOA T S, WANGZ, et al. Lost in the digital wild: hiding information in digital activities[C]//Shujun Li. Proceedings of the 2nd International Workshop on Multimedia Privacy and Security. Toronto, Canada: Associine for Computer Mair Coolinghinery, 2018: 27‑37.
|
7 |
ZHANGX. Behavior Ssteganography in Social Network[M]. Taiwan, China: Springer International Publishing, 2017: 21‑23.
|
8 |
HUF. A probabilistic solution discovery algorithm for solving 0-1 knapsack problem[J]. International Journal of Parallel, Emergent and Distributed Systems, 2018, 33(6) : 618‑626.
|
9 |
赵晓东, 程煜洋, 左磊, 方圆. 基于FPGA的CMI编解码设计[J]. 现代信息科技, 2020, 4(19): 35‑37.
|
|
ZHAOXiaodong, CHENGYuyang, ZUOLei, FANGYuan. Design of CMI CODEC based on FPGA[J]. Modern Information Technology, 2020, 4(19): 35‑37. ( in Chinese)
|
10 |
SUBRAMANIANB, YESUDHASH R, ENOCHG J. Channel-based encrypted binary arithmetic coding in wireless sensor networks[J]. Ingénierie des Systèmes d'Information, 2020, 25(2): 199‑206.
|
11 |
鄢莉.0-1背包问题的算法决策分析[J].电脑知识与技术, 2020, 16(04): 259‑264.
|
|
YANLi. Algorithmic decision analysis of 0-1 knapsack problem[J]. Computer Knowledge and Technology, 2020, 16(04): 259‑264. (in Chinese)
|
12 |
韩雪娟,李国东.动态猫变换和混沌映射的图像加密算法[J].计算机工程与设计, 2020, 41(08): 2381‑2387.
|
|
HANXue-juan, LIGuo-dong. Dynamic cat transformation and chaotic mapping image encryption algorithm[J]. Computer Engineering and Design, 2020, 41(08): 2381‑ 2387. (in Chinese)
|
13 |
张文金,覃仲宇,冯钊,刘嘉奇,刘纬,唐锡南.大数据下的web暴力破解攻击检测[J].深圳大学学报(理工版), 2020, 37(S1): 44‑49.
|
|
ZHANGWenjin, QINZhongyu, FENGZhao, LIUJiaqi, LIUWei, TANGXinan. Big data analysis for detection of web brute-force attack[J]. Journal of Shenzhen University Science and Engineering), 2020, 37(S1): 44‑49. ( in Chinese)
|
14 |
HUY, WANGZ, ZHANGX. Steganography in social networks based on behavioral correlation[J]. IETE Technical Review, 2020, 38(1): 93‑99.
|
15 |
KANTARTOPOULOSP, PITROPAKISN, MYLONASA, et al. Exploring adversarial attacks and defences for fake twitter account detection[J]. Technologies, 2020, 8(4): 64.
|