Enping Li

Orcid: 0009-0008-9073-5567

According to our database1, Enping Li authored at least 14 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Robust data hiding for JPEG images with invertible neural network.
Neural Networks, 2023

Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Robust Image Steganography: Hiding Messages in Frequency Coefficients.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2021
A Hands-On Mobile Device Forensics Course in Cybersecurity Education.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

2019
Enhancing Teaching Effectiveness in Mobile Application Development with Structured Practice.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

2017
A Forensic Mobile Application Designed for both Steganalysis and Steganography in Digital Images.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2017, Burlingame, CA, USA, January 29, 2017

2016
Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test.
Proceedings of the Media Watermarking, 2016

2015
Capacity Limits of Pseudorandom Channels in Deception Problems.
IEEE Trans. Inf. Forensics Secur., 2015

2011
A square-root law for active wardens.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Toward the identification of DSLR lenses by chromatic aberration.
Proceedings of the Media Forensics and Security III, 2011

2009
A supraliminal channel in a wireless phone application.
Proceedings of the Multimedia and Security Workshop, 2009

Protocols for data hiding in pseudo-random state.
Proceedings of the Media Forensics and Security I, 2009

2008
A Supraliminal Channel in a Videoconferencing Application.
Proceedings of the Information Hiding, 10th International Workshop, 2008


  Loading...