Dengpan Ye

According to our database1, Dengpan Ye authored at least 23 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Big Data Analytics for Information Security.
Security and Communication Networks, 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems.
IEEE Access, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The Concept Drift Problem in Android Malware Detection and Its Solution.
Security and Communication Networks, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A framework of adaptive steganography resisting JPEG compression and detection.
Security and Communication Networks, 2016

Cyber Crime.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

Mobile crowd-sensing context aware based fine-grained access control mode.
Multimedia Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multimedia Tools Appl., 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multimedia Tools Appl., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
IJDCF, 2014

Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.
Int. J. Comput. Intell. Syst., 2012

Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.
Int. J. Comput. Intell. Syst., 2012

Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011