Bin Lu

Affiliations:
  • PLA Information Engineering University, State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China


According to our database1, Bin Lu authored at least 15 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Exception Handling-Based Dynamic Software Watermarking.
IEEE Access, 2018

Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
An Image Encryption Algorithm Based on Information Hiding.
Int. J. Bifurc. Chaos, 2016

Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016

2015
基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes).
计算机科学, 2015

2014
A Data Obfuscation Based on State Transition Graph of Mealy Automata.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Embedding change rate estimation based on ensemble learning.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Operand stack dependence based Java static software birthmark.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

2011
A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2008
Feature n-gram Set Based Software Zero-Watermarking.
Proceedings of the International Symposium on Information Processing, 2008

Hiding Informationin in Java Class File.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
A Software Birthmark Based on Dynamic Opcode n-gram.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

2006
Real-Time Steganography in Compressed Video.
Proceedings of the Multimedia Content Representation, 2006

A Chaos-Based Robust Software Watermarking.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...