Yuewei Dai

According to our database1, Yuewei Dai authored at least 63 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors.
IEEE Trans. Information Forensics and Security, 2018

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Security and Communication Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Security and Communication Networks, 2018

Multi-dimensional quantum state sharing based on quantum Fourier transform.
Quantum Information Processing, 2018

A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model.
Journal of Circuits, Systems, and Computers, 2018

A Modified Quantum Bacterial Foraging Algorithm for Parameters Identification of Fractional-Order System.
IEEE Access, 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Improved ICS Honeypot Based on SNAP7 and IMUNES.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Dynamic quantum secret sharing by using d-dimensional GHZ state.
Quantum Information Processing, 2017

A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings.
Multimedia Tools Appl., 2017

Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Information Forensics and Security, 2016

Detecting JitterBug covert timing channel with sparse embedding.
Security and Communication Networks, 2016

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Security and Communication Networks, 2016

Efficient quantum secret sharing.
Quantum Information Processing, 2016

d-Dimensional quantum state sharing with adversary structure.
Quantum Information Processing, 2016

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
TIIS, 2016

Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state.
Inf. Process. Lett., 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Security and Communication Networks, 2015

(t, n) Threshold quantum secret sharing using the phase shift operation.
Quantum Information Processing, 2015

Proactive quantum secret sharing.
Quantum Information Processing, 2015

Designing snort rules to detect abnormal DNP3 network data.
Proceedings of the 2015 International Conference on Control, 2015

2014
Authenticating topological integrity of process plant models through digital watermarking.
Multimedia Tools Appl., 2014

Adaptive steganography based on block complexity and matrix embedding.
Multimedia Syst., 2014

Network Packet Length Covert Channel Based on Empirical Distribution Function.
JNW, 2014

Syndrome trellis codes based on minimal span generator matrix.
Annales des Télécommunications, 2014

Provably Secure Identity-Based Threshold Decryption on Access Structure.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Detection of TCP covert channel based on Markov model.
Telecommunication Systems, 2013

Detect image splicing with artificial blurred boundary.
Mathematical and Computer Modelling, 2013

An Improved Retransmission-based Network Steganography: Design and Detection.
JNW, 2013

Topology authentication for CAPD models based on Laplacian coordinates.
Computers & Graphics, 2013

Watermarking 3D CAPD models for topology verification.
Computer-Aided Design, 2013

2012
Network covert timing channel with distribution matching.
Telecommunication Systems, 2012

2011
Identity-based multi-receiver threshold signcryption scheme.
Security and Communication Networks, 2011

2010
Improved LSB-matching Steganography for Preserving Second-order Statistics.
Journal of Multimedia, 2010

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
JDCTA, 2010

Secure Multimedia Distribution Based on Watermarking and Encryption.
JCIT, 2010

Optimal Design for 2-DOF PID Regulator Based on PSO Algorithm.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

2009
A secret sharing scheme based on (t, n) threshold and adversary structure.
Int. J. Inf. Sec., 2009

A Model of Intrusion Tolerant System Based on Game Theory.
Computer and Information Science, 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Processing, 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Forgery-location highway monitoring systembased on video watermarking.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Robust Hashing Based on Persistent Points for Video Copy Detection.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A new adaptive watermarking for real-time MPEG videos.
Applied Mathematics and Computation, 2007

A RST-Resilient Watermarking Scheme Based on Invariant Features.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Image Steganography Based on Quantization-Embedders Combination.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Semi-Fragile Watermarking Authentication with Local and Global Watermarks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Feature-based watermarking scheme for MPEG-I/II video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A fast video encryption scheme based-on chaos.
Proceedings of the 8th International Conference on Control, 2004

A secure voice communication system based on DSP.
Proceedings of the 8th International Conference on Control, 2004

A fast motion segmentation based watermarking for MPEG-2 video.
Proceedings of the 8th International Conference on Control, 2004

2003
A Feature-Watermarking Scheme for JPEG Image Authentication.
Proceedings of the Digital Watermarking, Second International Workshop, 2003


  Loading...