Yuliang Lu

Orcid: 0000-0002-8502-9907

According to our database1, Yuliang Lu authored at least 68 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing.
IEEE Trans. Inf. Forensics Secur., 2024

MGE: A Training-Free and Efficient Model Generation and Enhancement Scheme.
CoRR, 2024

2023
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Wet Paper Coding-Based Deep Neural Network Watermarking.
Sensors, 2022

An Internet-Oriented Multilayer Network Model Characterization and Robustness Analysis Method.
Entropy, 2022

MTS-Stega: Linguistic Steganography Based on Multi-Time-Step.
Entropy, 2022

Generative Text Steganography via Multiple Social Network Channels Based on Transformers.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

2021
Robust Secret Image Sharing Resistant to Noise in Shares.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Common Method of Share Authentication in Image Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2021

BAT: real-time inaudible sound capture with smartphones.
Multim. Tools Appl., 2021

A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets.
J. Vis. Commun. Image Represent., 2021

BEDetector: A Two-Channel Encoding Method to Detect Vulnerabilities Based on Binary Similarity.
IEEE Access, 2021

Robust Secret Image Sharing Scheme Against Noise in Shadow Images.
IEEE Access, 2021

2020
Reversible Image Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2020

Adaptive Partial Image Secret Sharing.
Symmetry, 2020

Secret image sharing with separate shadow authentication ability.
Signal Process. Image Commun., 2020

On the Value of Order Number and Power in Secret Image Sharing.
Secur. Commun. Networks, 2020

Penrose tiling for visual secret sharing.
Multim. Tools Appl., 2020

Weighted visual cryptographic scheme with improved image quality.
Multim. Tools Appl., 2020

Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020

XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes.
Multim. Tools Appl., 2020

A Common General Access Structure Construction Approach in Secret Image Sharing.
Int. J. Digit. Crime Forensics, 2020

Application of random elements in ISS.
IET Image Process., 2020

Scalable Static Detection of Use-After-Free Vulnerabilities in Binary Code.
IEEE Access, 2020

Feature Selection for Image Steganalysis Using Binary Bat Algorithm.
IEEE Access, 2020

Improved wavelet domain centroid-based adaptive audio steganography.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

2019
A general progressive secret image sharing construction method.
Signal Process. Image Commun., 2019

Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers.
Multim. Tools Appl., 2019

Generalized general access structure in secret image sharing.
J. Vis. Commun. Image Represent., 2019

Security analysis and classification of image secret sharing.
J. Inf. Secur. Appl., 2019

Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019

Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019

Destructive Method with High Quality and Speed to Counter Information Hiding.
Proceedings of the Data Science, 2019

2018
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size.
Symmetry, 2018

Robust Visual Secret Sharing Scheme Applying to QR Code.
Secur. Commun. Networks, 2018

Progressive visual secret sharing for general access structure with multiple decryptions.
Multim. Tools Appl., 2018

Greyscale-images-oriented progressive secret sharing based on the linear congruence equation.
Multim. Tools Appl., 2018

Partial secret image sharing for (k, n) threshold based on image inpainting.
J. Vis. Commun. Image Represent., 2018

基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model).
计算机科学, 2018

基于符号执行技术的网络程序漏洞检测系统 (Symbolic Execution Technology Based Defect Detection System for Network Programs).
计算机科学, 2018

Participants increasing for threshold random grids-based visual secret sharing.
J. Real Time Image Process., 2018

Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions.
J. Real Time Image Process., 2018

Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018

General Meaningful Shadow Construction in Secret Image Sharing.
IEEE Access, 2018

2017
基于MapReduce的互联网拓扑特征参数算法研究 (Study on Calculation Method for Internet Topological Parameters Based on MapReduce).
计算机科学, 2017

分布式环境下的路由器级互联网抗毁性研究 (Study on Invulnerability of Router-level Internet Based on MapReduce).
计算机科学, 2017

Exploiting the Homomorphic Property of Visual Cryptography.
Int. J. Digit. Crime Forensics, 2017

A Novel Visual Secret Sharing Scheme Based on QR Codes.
Int. J. Digit. Crime Forensics, 2017

A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean.
Int. J. Digit. Crime Forensics, 2017

Feature Selection Based on Modified Bat Algorithm.
IEICE Trans. Inf. Syst., 2017

Contrast-improved visual secret sharing based on random grid for general access structure.
Digit. Signal Process., 2017

Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics.
Proceedings of the Image and Video Technology - 8th Pacific-Rim Symposium, 2017

Security Analysis of Secret Image Sharing.
Proceedings of the Data Science, 2017

Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes.
Proceedings of the Data Science, 2017

A Novel Progressive Secret Image Sharing Method with Better Robustness.
Proceedings of the Data Science, 2017

Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
基于时序距离的AS级Internet动态性测量方法 (Measurement of AS-level Internet Evolution Based on Temporal Distance).
计算机科学, 2016

基于频繁闭图关联规则的AS级Internet链路预测方法 (Link Prediction of AS Level Internet Based on Association Rule of Frequent Closed Graphs).
计算机科学, 2016

Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids.
Proceedings of the Wireless Internet - 9th International Conference, 2016

High Capacity Embedding Methods of QR Code Error Correction.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Contrast-Improved Visual Cryptography for General Access Structure.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Clarity Corresponding to Contrast in Visual Cryptography.
Proceedings of the Social Computing, 2016

2007
An Ensemble Text Classification Model Combining Strong Rules and N-Gram.
Proceedings of the Third International Conference on Natural Computation, 2007


  Loading...