Dengpan Ye

According to our database1, Dengpan Ye authored at least 23 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Big Data Analytics for Information Security.
Security and Communication Networks, 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems.
IEEE Access, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
The Concept Drift Problem in Android Malware Detection and Its Solution.
Security and Communication Networks, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Security and Communication Networks, 2016

Cyber Crime.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

Mobile crowd-sensing context aware based fine-grained access control mode.
Multimedia Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multimedia Tools Appl., 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multimedia Tools Appl., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

2015
Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
IJDCF, 2014

2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.
Int. J. Comput. Intell. Syst., 2012

Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.
Int. J. Comput. Intell. Syst., 2012

2011
Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011


  Loading...