Lina Wang
Orcid: 0000-0001-8085-1312Affiliations:
- Wuhan University, School of Cyber Science and Engineering, Hubei, China
- Northeastern University, Shenyang, China (PhD 1999)
According to our database1,
Lina Wang
authored at least 115 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A novel fusion feature imageization with improved extreme learning machine for network anomaly detection.
Appl. Intell., October, 2024
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Neural Networks, 2024
StreamliNet: Cost-aware layer-wise neural network linearization for fast and accurate private inference.
Inf. Sci., 2024
Personalized and privacy-enhanced federated learning framework via knowledge distillation.
Neurocomputing, 2024
Appl. Intell., 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Swarm Evol. Comput., December, 2023
World Wide Web (WWW), September, 2023
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023
IEEE Trans. Knowl. Data Eng., March, 2023
<i>DF-UDetector</i>: An effective method towards robust deepfake detection via feature restoration.
Neural Networks, March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet.
IEEE Trans. Dependable Secur. Comput., 2023
A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection.
Int. J. Intell. Syst., 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
<i>Ex</i><sup>2</sup>: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks.
Int. J. Intell. Syst., December, 2022
Multiperspective Progressive Structure Adaptation for JPEG Steganography Detection Across Domains.
IEEE Trans. Neural Networks Learn. Syst., 2022
An Effective Imbalanced JPEG Steganalysis Scheme Based on Adaptive Cost-Sensitive Feature Learning.
IEEE Trans. Knowl. Data Eng., 2022
Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
CoRR, 2022
Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks.
CoRR, 2022
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service Recommendation.
IEEE Trans. Serv. Comput., 2021
J. Inf. Secur. Appl., 2021
Neurocomputing, 2021
CoRR, 2021
IEEE Access, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IEEE Trans. Mob. Comput., 2020
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors.
IEEE Trans. Inf. Forensics Secur., 2020
Intraspectrum Discrimination and Interspectrum Correlation Analysis Deep Network for Multispectral Face Recognition.
IEEE Trans. Cybern., 2020
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis.
Pattern Recognit., 2020
Neurocomputing, 2020
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability.
Pattern Recognit., 2019
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019
Multim. Tools Appl., 2019
Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram.
CoRR, 2019
An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution.
IEEE Access, 2019
Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Serv. Comput., 2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Syst. J., 2018
Multim. Tools Appl., 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017
A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
2016
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
云环境下APT攻击的防御方法综述 (Review of Defense Methods Against Advanced Persistent Threat in Cloud Environment).
计算机科学, 2016
面向软件错误定位与理解的测试执行离散特征筛选 (Discrete Characteristic-based Test Execution Selection for Software Fault Localization and Understanding).
计算机科学, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
2013
Int. J. Softw. Eng. Knowl. Eng., 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011
The Design of a Wireless Sensor Network for Seismic-Observation-Environment Surveillance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
2010
Proceedings of the Information Computing and Applications - First International Conference, 2010
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008