Lina Wang

Orcid: 0000-0001-8085-1312

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, Hubei, China
  • Northeastern University, Shenyang, China (PhD 1999)


According to our database1, Lina Wang authored at least 96 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

A novel immune detector training method for network anomaly detection.
Appl. Intell., 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A novel multi-objective immunization algorithm based on dynamic variation distance.
Swarm Evol. Comput., December, 2023

GANAD: A GAN-based method for network anomaly detection.
World Wide Web (WWW), September, 2023

Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023

Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey.
IEEE Trans. Knowl. Data Eng., March, 2023

<i>DF-UDetector</i>: An effective method towards robust deepfake detection via feature restoration.
Neural Networks, March, 2023

Capturing Invalid Input Manipulations for Memory Corruption Diagnosis.
IEEE Trans. Dependable Secur. Comput., 2023

A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet.
IEEE Trans. Dependable Secur. Comput., 2023

A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection.
Int. J. Intell. Syst., 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Dual-level Interaction for Domain Adaptive Semantic Segmentation.
CoRR, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

PatchFinger: A Model Fingerprinting Scheme Based on Adversarial Patch.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

BBAC: Blockchain-Based Access Control Scheme for EHRs with Data Sharing Support.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
<i>Ex</i><sup>2</sup>: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks.
Int. J. Intell. Syst., December, 2022

Multiperspective Progressive Structure Adaptation for JPEG Steganography Detection Across Domains.
IEEE Trans. Neural Networks Learn. Syst., 2022

An Effective Imbalanced JPEG Steganalysis Scheme Based on Adaptive Cost-Sensitive Feature Learning.
IEEE Trans. Knowl. Data Eng., 2022

Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022

Retrofitting LBR Profiling to Enhance Virtual Machine Introspection.
IEEE Trans. Inf. Forensics Secur., 2022

Progressive selection-channel networks for image steganalysis.
Int. J. Intell. Syst., 2022

JPEG steganalysis based on denoising network and attention module.
Int. J. Intell. Syst., 2022

Better constraints of imperceptibility, better adversarial examples in the text.
Int. J. Intell. Syst., 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks.
CoRR, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

DANCe: Dynamic Adaptive Neuron Coverage for Fuzzing Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2022

Combating Multi-level Adversarial Text with Pruning based Adversarial Training.
Proceedings of the International Joint Conference on Neural Networks, 2022

MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Efficient DNN Backdoor Detection Guided by Static Weight Analysis.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service Recommendation.
IEEE Trans. Serv. Comput., 2021

Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD).
J. Inf. Secur. Appl., 2021

RapidFuzz: Accelerating fuzzing via Generative Adversarial Networks.
Neurocomputing, 2021

Generalized Local Optimality for Video Steganalysis in Motion Vector Domain.
CoRR, 2021

An End-to-End Rumor Detection Model Based on Feature Aggregation.
Complex., 2021

TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification.
IEEE Access, 2021

Limited Times of Data Access Based on SGX in Cloud Storage.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Using Contrastive Learning to Improve the Performance of Steganalysis Schemes.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Annealing Attention Networks for User Feature-Based Rumor Early Detection on Weibo.
Proceedings of the International Joint Conference on Neural Networks, 2021

Recalibrated Bandpass Filtering On Temporal Waveform For Audio Spoof Detection.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Exposing DeepFakes via Localizing the Manipulated Artifacts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors.
IEEE Trans. Inf. Forensics Secur., 2020

Intraspectrum Discrimination and Interspectrum Correlation Analysis Deep Network for Multispectral Face Recognition.
IEEE Trans. Cybern., 2020

Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis.
Pattern Recognit., 2020

Learning selection channels for image steganalysis in spatial domain.
Neurocomputing, 2020

MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Deep Attention Model with Multiple Features for Rumor Identification.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A Secure Opus Pulse Steganographic Scheme Based on Message Transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model.
IEEE Trans. Inf. Forensics Secur., 2019

A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability.
Pattern Recognit., 2019

Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019

An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech.
Multim. Tools Appl., 2019

A survey on Adversarial Attacks and Defenses in Text.
CoRR, 2019

Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram.
CoRR, 2019

An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution.
IEEE Access, 2019

Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2018

An AMR adaptive steganography algorithm based on minimizing distortion.
Multim. Tools Appl., 2018

SILK Steganography Scheme Based on the Distribution of LSF Parameter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2017

AMR Steganalysis Based on Second-Order Difference of Pitch Delay.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Message-locked proof of ownership and retrievability with remote repairing in cloud.
Secur. Commun. Networks, 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multim. Tools Appl., 2016

面向软件错误定位与理解的测试执行离散特征筛选 (Discrete Characteristic-based Test Execution Selection for Software Fault Localization and Understanding).
计算机科学, 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016

Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016

Steganalysis of AAC using calibrated Markov model of adjacent codebook.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
AMR Steganalysis Based on the Probability of Same Pulse Position.
IEEE Trans. Inf. Forensics Secur., 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Regression Identification of Coincidental Correctness via Weighted Clustering.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Video steganalysis based on subtractive probability of optimal matching feature.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
A Fault Localization Framework to Alleviate the Impact of Execution Similarity.
Int. J. Softw. Eng. Knowl. Eng., 2013

2012
Learning Fine-Grained Structured Input for Memory Corruption Detection.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Context-Aware Fault Localization via Control Flow Analysis.
J. Softw., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

The Design of a Wireless Sensor Network for Seismic-Observation-Environment Surveillance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Statistical Fault Localization via Semi-dynamic Program Slicing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

2010
Execution-Aware Fault Localization Based on the Control Flow Analysis.
Proceedings of the Information Computing and Applications - First International Conference, 2010

2008
A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Study on the Internet Behavior's Activity Oriented to Network Survivability.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...