Guangjie Liu

According to our database1, Guangjie Liu authored at least 45 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

An end-to-end generative network for environmental sound-based covert communication.
Multimedia Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
TIIS, 2019

2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Security and Communication Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Security and Communication Networks, 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Information Forensics and Security, 2016

Detecting JitterBug covert timing channel with sparse embedding.
Security and Communication Networks, 2016

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Security and Communication Networks, 2016

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
TIIS, 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Security and Communication Networks, 2015

Topology authentication for piping isometric drawings.
Computer-Aided Design, 2015

A hierarchical trust model for cluster-based wireless sensor network.
Proceedings of the 2015 International Conference on Control, 2015

Designing snort rules to detect abnormal DNP3 network data.
Proceedings of the 2015 International Conference on Control, 2015

Bionic camouflage underwater acoustic communication based on sea lion sounds.
Proceedings of the 2015 International Conference on Control, 2015

Research on extraction method of urban impervious surface information.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Authenticating topological integrity of process plant models through digital watermarking.
Multimedia Tools Appl., 2014

Adaptive steganography based on block complexity and matrix embedding.
Multimedia Syst., 2014

Network Packet Length Covert Channel Based on Empirical Distribution Function.
JNW, 2014

Syndrome trellis codes based on minimal span generator matrix.
Annales des Télécommunications, 2014

2013
Detection of TCP covert channel based on Markov model.
Telecommunication Systems, 2013

Detect image splicing with artificial blurred boundary.
Mathematical and Computer Modelling, 2013

An Improved Retransmission-based Network Steganography: Design and Detection.
JNW, 2013

2012
Network covert timing channel with distribution matching.
Telecommunication Systems, 2012

2011
A passive image authentication scheme for detecting region-duplication forgery with rotation.
J. Network and Computer Applications, 2011

An adaptive matrix embedding based on LSB matching for grey-scale images.
IJMIS, 2011

2010
Improved LSB-matching Steganography for Preserving Second-order Statistics.
Journal of Multimedia, 2010

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
JDCTA, 2010

Secure Multimedia Distribution Based on Watermarking and Encryption.
JCIT, 2010

2009
On the Design of Secure Multimedia Authentication.
J. UCS, 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Processing, 2008

Efficient video encryption scheme based on advanced video coding.
Multimedia Tools Appl., 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Forgery-location highway monitoring systembased on video watermarking.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Image Steganography Based on Quantization-Embedders Combination.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...