Dengpan Ye

According to our database1, Dengpan Ye authored at least 34 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multimedia Tools Appl., 2019

Faster and transferable deep learning steganalysis on GPU.
J. Real-Time Image Processing, 2019

Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.
J. Real-Time Image Processing, 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet of Things Journal, 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet of Things Journal, 2019

Multi-view coupled dictionary learning for person re-identification.
Neurocomputing, 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

Delay-Distance Correlation Study for IP Geolocation.
CoRR, 2019

Heard More Than Heard: An Audio Steganography Method Based on GAN.
CoRR, 2019

Reversible Data Hiding With Image Enhancement Using Histogram Shifting.
IEEE Access, 2019

2018
Big Data Analytics for Information Security.
Security and Communication Networks, 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems.
IEEE Access, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
The Concept Drift Problem in Android Malware Detection and Its Solution.
Security and Communication Networks, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

NEXT: A Neural Network Framework for Next POI Recommendation.
CoRR, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Security and Communication Networks, 2016

Cyber Crime.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

Mobile crowd-sensing context aware based fine-grained access control mode.
Multimedia Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multimedia Tools Appl., 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multimedia Tools Appl., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

2015
Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
IJDCF, 2014

2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.
Int. J. Comput. Intell. Syst., 2012

Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.
Int. J. Comput. Intell. Syst., 2012

2011
Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011


  Loading...