Lina Wang

According to our database1, Lina Wang authored at least 127 papers between 2000 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model.
IEEE Trans. Information Forensics and Security, 2019

A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability.
Pattern Recognition, 2019

Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Network, 2019

An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech.
Multimedia Tools Appl., 2019

Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multimedia Tools Appl., 2019

A procedural texture generation framework based on semantic descriptions.
Knowl.-Based Syst., 2019

Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System.
TIIS, 2019

Local outlier detection based on information entropy weighting.
IJSNet, 2019

The interval-valued hesitant Pythagorean fuzzy set and its applications with extended TOPSIS and Choquet integral-based method.
Int. J. Intell. Syst., 2019

Optimal defense strategy based on the mean field game model for cyber security.
IJDSN, 2019

A survey on Adversarial Attacks and Defenses in Text.
CoRR, 2019

Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram.
CoRR, 2019

Exploring the intention-behavior gap in the technology acceptance model: A mixed-methods study in the context of foreign-language teaching in China.
BJET, 2019

S-Boxes Construction Based on the Cayley Graph of the Symmetric Group for UASNs.
IEEE Access, 2019

An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution.
IEEE Access, 2019

Feature Fusion-Based Multi-Task ConvNet for Simultaneous Optical Performance Monitoring and Bit-Rate/Modulation Format Identification.
IEEE Access, 2019

Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Fog Computing-Based Differential Positioning Method for BDS.
Wireless Communications and Mobile Computing, 2018

Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wireless Communications and Mobile Computing, 2018

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems.
IEEE Trans. Services Computing, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Sec. Comput., 2018

Fine-grained entity type classification with adaptive context.
Soft Comput., 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

A Simplified Hollow-Core Photonic Crystal Fiber SERS Probe with a Fully Filled Photoreduction Silver Nanoprism.
Sensors, 2018

An AMR adaptive steganography algorithm based on minimizing distortion.
Multimedia Tools Appl., 2018

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.
Multimedia Tools Appl., 2018

Methods for System Selection Based on Sequential Mean-Variance Analysis.
INFORMS Journal on Computing, 2018

Perception-driven procedural texture generation from examples.
Neurocomputing, 2018

Epileptic Seizure Detection Based on Time-Frequency Images of EEG Signals Using Gaussian Mixture Model and Gray Level Co-Occurrence Matrix Features.
Int. J. Neural Syst., 2018

Automatic recognition of lactating sow postures from depth images by deep learning detector.
Computers and Electronics in Agriculture, 2018

An adaptive fuzzy hierarchical control for maintaining solar greenhouse temperature.
Computers and Electronics in Agriculture, 2018

ProAcePred: prokaryote lysine acetylation sites prediction based on elastic net feature optimization.
Bioinformatics, 2018

Deep Gabor Scattering Network for Image Classification.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Controlled Channel Attack Detection Based on Hardware Virtualization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Partitioning Algorithm of Social Network Based on Dimensionality Reduction.
Proceedings of the Fuzzy Systems and Data Mining IV, 2018

SILK Steganography Scheme Based on the Distribution of LSF Parameter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2017

AMR Steganalysis Based on Second-Order Difference of Pitch Delay.
IEEE Trans. Information Forensics and Security, 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks.
Security and Communication Networks, 2017

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
Journal of Systems and Software, 2017

Parallel task scheduling under multi-Clouds.
TIIS, 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

High-resolution time-frequency representation of EEG data using multi-scale wavelets.
Int. J. Systems Science, 2017

Automatic Epileptic Seizure Detection in EEG Signals Using Multi-Domain Feature Extraction and Nonlinear Analysis.
Entropy, 2017

A Procedural Texture Generation Framework Based on Semantic Descriptions.
CoRR, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

An h-p version of the continuous Petrov-Galerkin method for Volterra delay-integro-differential equations.
Adv. Comput. Math., 2017

A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

An online optimal reference flux searching approach for direct torque control of interior permanent magnet synchronous machines.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Unwanted turn-on of SiC JFET bi-directional switches under influence of parasitic parameters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A high-bandwidth PV source simulator using a sliding mode controlled interleaved buck converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

An Empirical Case of Applying MFA on Company Level.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

Aspect Based Sentiment Analysis for Online Reviews.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

cNV SRAM: CMOS Technology Compatible Non-Volatile SRAM Based Ultra-Low Leakage Energy Hybrid Memory System.
IEEE Trans. Computers, 2016

An Improved K-Nearest-Neighbor Indoor Localization Method Based on Spearman Distance.
IEEE Signal Process. Lett., 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Security and Communication Networks, 2016

Message-locked proof of ownership and retrievability with remote repairing in cloud.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multimedia Tools Appl., 2016

An adaptive algorithm for scheduling parallel jobs in meteorological Cloud.
Knowl.-Based Syst., 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Communication Systems, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Communications, 2016

An Overview on Data Representation Learning: From Traditional Feature Learning to Recent Deep Learning.
CoRR, 2016

Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Computer Networks, 2016

On digital image trustworthiness.
Appl. Soft Comput., 2016

Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Person re-identification based on deep spatio-temporal features and transfer learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Novel Time-Frequency Analysis in Nonstationary Signals Based Multiscale Radial Basis Functions and Forward Orthogonal Regression.
Proceedings of the Cognitive Systems and Signal Processing, 2016

Research on How to Use OUC Cloud Classroom to Assist Education Development in Tibet.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

Steganalysis of AAC using calibrated Markov model of adjacent codebook.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

AMR Steganalysis Based on the Probability of Same Pulse Position.
IEEE Trans. Information Forensics and Security, 2015

Parallelization of a color-entropy preprocessed Chan-Vese model for face contour detection on multi-core CPU and GPU.
Parallel Computing, 2015

One Construction of Multireceiver Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields.
Ars Comb., 2015

Dynamic 3D Reconstruction of Tongue Surface Based on Photometric Stereo Technique.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Regression Identification of Coincidental Correctness via Weighted Clustering.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Image Reconstruction Algorithm for Modified SART Based on PM Model.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

A new method based on hough transform for quick line and circle detection.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

An OpenCL micro-benchmark suite for GPUs and CPUs.
The Journal of Supercomputing, 2014

Performance Analysis and Improvement of LT Codes over AWGN Channels.
JCP, 2014

vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Video steganalysis based on subtractive probability of optimal matching feature.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A simulation based system for manufacturing process optimisation.
Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, 2014

The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Fault Localization Framework to Alleviate the Impact of Execution Similarity.
International Journal of Software Engineering and Knowledge Engineering, 2013

polynomial selection for the number field sieve in geometric view.
IACR Cryptology ePrint Archive, 2013

UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Robust Real-Time Tracking Method of Fast Video Object Based on Gaussian Kernel and Random Projection.
Proceedings of the Intelligence Science and Big Data Engineering, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Research of Detection Method of Mine Motor Vehicle Pedestrian Based on Image Processing.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

Object Tracking With Particle Filtering in Fluorescence Microscopy Images: Application to the Motion of Neurofilaments in Axons.
IEEE Trans. Med. Imaging, 2012

Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets.
IJPRAI, 2012

Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy.
IEICE Transactions, 2012

Learning Fine-Grained Structured Input for Memory Corruption Detection.
Proceedings of the Information Security - 15th International Conference, 2012

Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Context-Aware Fault Localization via Control Flow Analysis.
JSW, 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

The Design of a Wireless Sensor Network for Seismic-Observation-Environment Surveillance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Statistical Fault Localization via Semi-dynamic Program Slicing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines.
Proceedings of the Security and Privacy in Communication Networks, 2011

A UML approach for the design of reconfigurable manufacturing simulation models.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

The Foundation of the Mathematical Model of Economic Impact and the Analysis of the Effect on the Economy of Shanghai World Expo.
Proceedings of the Information Computing and Applications, 2011

Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains.
JNW, 2010

Execution-Aware Fault Localization Based on the Control Flow Analysis.
Proceedings of the Information Computing and Applications - First International Conference, 2010

Using Game Theory to Reveal Vulnerability for Complex Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

An Optimized Anonymous Attestation Protocol from Bilinear Pairing.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Loss of Genetic Variation in Hatchery Produced Haliotis Asinina Using AFLP and Allozyme Markers.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Empirical Research and Design of M-Learning System for College English.
Proceedings of the Learning by Playing. Game-based Education System Design and Development, 2009

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Analysis of ERP II Implementing Option Problem with Asymmetric Information.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

A Novel Alternative Weighted Fuzzy C-Means Algorithm and Cluster Validity Analysis.
Proceedings of the PACIIA 2008, 2008

Reconstruction of 3D Digital Image of Weeping for Sythia Pollen.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 1, 2008

A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Scientific Theme Emergence Detection Approach Based on Citation Graph Analysis.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Research on Evaluation of Trust Model.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Detecting the MB1 with Higher-Order Statistics.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Study on the Internet Behavior's Activity Oriented to Network Survivability.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

Computational Stability and Adaptive Strategies - An Experimental Study of ODE Software.
PhD thesis, 2003

A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Virtual Private Network for Virtual Enterprise Information Systems.
Proceedings of the Web-Age Information Management, First International Conference, 2000