Hui Tian

Orcid: 0000-0002-1591-656X

Affiliations:
  • National Huaqiao University, College of Computer Science and Technology, Xiamen, China
  • Huazhong University of Science and Technology, Wuhan National Lab for Optoelectronics, China (PhD 2010)


According to our database1, Hui Tian authored at least 94 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023

Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2023

STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022

Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data.
ACM Trans. Internet Techn., November, 2022

Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022

Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl., 2022

A Novel Global-Local Representations Network for Speech Steganalysis.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

2021
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension.
IEEE Trans. Circuits Syst. Video Technol., 2021

Detection of Covert Timing Channel Based on Time Series Symbolization.
IEEE Open J. Commun. Soc., 2021

Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network.
IEEE Open J. Comput. Soc., 2021

2020
Self-organizing neighborhood-based differential evolution for global optimization.
Swarm Evol. Comput., 2020

StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020

Data collection from WSNs to the cloud based on mobile Fog elements.
Future Gener. Comput. Syst., 2020

A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT.
IEEE Access, 2020

Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020

Data Auditing for the Internet of Things Environments Leveraging Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019

A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search.
Multim. Tools Appl., 2019

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay.
J. Univers. Comput. Sci., 2019

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing.
J. Netw. Comput. Appl., 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network.
Int. J. Netw. Secur., 2019

A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network.
Int. J. Netw. Secur., 2019

A collusion-resistant public auditing scheme for shared cloud data.
Int. J. Inf. Technol. Manag., 2019

Public Auditing for Trusted Cloud Storage Services.
IEEE Secur. Priv., 2019

Steganalysis of AMR Speech Based on Multiple Classifiers Combination.
IEEE Access, 2019

Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules.
IEEE Access, 2019

A Neighborhood-Assisted Framework for Differential Evolution.
IEEE Access, 2019

Multitasking differential evolution with difference vector sharing mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing.
Proceedings of the Provable Security, 2019

2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018

An Effective Authentication Scheme Using DCT for Mobile Devices.
Symmetry, 2018

StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018

Differential evolution with individual-dependent topology adaptation.
Inf. Sci., 2018

Social learning differential evolution.
Inf. Sci., 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018

Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Distributed steganalysis of compressed speech.
Soft Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Neighborhood guided differential evolution.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017

云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession).
计算机科学, 2017

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP.
KSII Trans. Internet Inf. Syst., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System.
IEEE Commun. Lett., 2017

Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017

Interoperable localization for mobile group users.
Comput. Commun., 2017

Neighborhood-adaptive differential evolution for global numerical optimization.
Appl. Soft Comput., 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017

Secure Logging and Public Audit for Operation Behavior in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Rumor restraining based on propagation prediction with limited observations in large-scale social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Cellular direction information based differential evolution for numerical optimization: an empirical study.
Soft Comput., 2016

Adaptive direction information in differential evolution for numerical optimization.
Soft Comput., 2016

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2016

一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol).
计算机科学, 2016

Neighbor-index-division steganography based on QIM method for G.723.1 speech streams.
J. Ambient Intell. Humaniz. Comput., 2016

Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Novel Connection Correlation Scheme Based on Threshold Secret Sharing.
IEEE Commun. Lett., 2016

Improving differential evolution with a new selection method of parents for mutation.
Frontiers Comput. Sci., 2016

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

Operational-Behavior Auditing in Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

BlueCat: An Infrastructure-Free System for Relative Mobile Localization.
Ad Hoc Sens. Wirel. Networks, 2015

Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
Improving security of quantization-index-modulation steganography in low bit-rate speech streams.
Multim. Syst., 2014

Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream.
Ann. des Télécommunications, 2014

Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014

Improving Differential Evolution with Ring Topology-Based Mutation Operators.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2012
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]
Comput. Commun., 2012

Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography.
Comput. J., 2012

State-based steganography in low bit rate speech.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Least-significant-digit steganography in low bitrate speech.
Proceedings of IEEE International Conference on Communications, 2012

2011
Adaptive partial-matching steganography for voice over IP using triple M sequences.
Comput. Commun., 2011

2009
Digital logic based encoding strategies for steganography on voice-over-IP.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009

2008
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...