计算机类国家网络安全学院,武汉大学国家网络安全学院

本文精选了多篇信息技术领域的高质量学术论文,涵盖了物联网、信息安全、多媒体处理等多个方面,展示了近年来该领域内的研究成果和技术进展。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

部分学术论文情况如下:

[1]Yongdong Wu,Dengpan Ye,Zhuo Wei, Qian Wang, William Tan, Robert H. Deng: Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.IEEE Internet of Things Journal,6(2): 1617-1627 (2019)(中科院1区)

[2]Guang Hua, Han Liao, Qingyi Wang,Haijian Zhang, andDengpan Ye:Detection of Electric Network Frequency in AudioRecordings-From Theory to Practical Detectors,IEEE Transactions on Information Forensics and Security, 16: 236-248, 2021 (10.1109/TIFS.2020.3009579) (CCF A类期刊)

[3]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye: Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution,IEEE Transactions on Dependable and Secure Computing,2019 (10.1109/TDSC.2019.2957091)(CCF A类期刊)

[4]Shunzhi Jiang,Dengpan Ye, Jiaqing Huang, Yueyun Shang:SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application.Journal of Networking and Computer Applications, 165 (doi.org/10.1016/j.jnca.2020.102689) (2020)(中科院2区)

[5]Tao Lei, Zhan Qin, Zhibo Wang, Qi Li,Dengpan Ye: EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.IEEE Internet of Things Journal,6(4): 6668-6680 (2019)(中科院1区)

[6]Chuan Qin, Xueqin Chen,Dengpan Ye, Jinwei Wang, Xingming Sun: A novel image hashing scheme with perceptual robustness using block truncation coding.Information Science,361-362: 84-99 (2016)(中科院1区)

[7]Dengpan Ye,Changfu Zou, Yuewei Dai, Zhiquan Wang: A New Adaptive Watermarking for Real-time MPEG Videos,Applied Mathematics and Computation,185(2): 907-918 (2007)(中科院1区)

[8]Fei Ma, Xiaoke Zhu, Qinglong Liu, Chengfang Song, Xiao-Yuan Jing,Dengpan Ye: Multi-view coupled dictionary learning for person re-identification.Neurocomputing,348: 16-26 (2019)(中科院2区)

[9]Xiaoguang Niu, Qiongzan Ye, Yihao Zhang,Dengpan Ye: A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems.IEEE Access,6: 15457-15467 (2018)(中科院2区)

[10]Yueyun Shang, Shunzhi Jiang,Dengpan Ye, and Jiaqing Huang: Enhancing the Security of Deep Learning Steganography via Adversarial Examples.Mathematics, 2020, 8(9):1446.(2020)(中科院3区)

[11]Yuan Mei,Dengpan Ye, Shunzhi Jiang, Jiarui Liu: A Particular Character Speech Synthesis System Based on Deep Learning,IETE Technical Review, 2020 (中科院4区)

[12]Shiyu Li,Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo: Anti-Steganalysis for Image on Convolutional Neural Networks,Multimedia Tools and Applications,79(7): 4315–4331(2020)(CCF C类)

[13]Changrui Liu,Dengpan Ye, Yueyun Shang, et al. Defend Against Adversarial Samples by Using Perceptual Hash:Defend Against Adversarial Samples by Using Perceptual Hash.CMC - Computers, Materials & Continua,62(3): 1365–1386 (2020) (中科院3区)

[14]Dengpan Ye, Shunzhi Jiang, Shiyu Li, Changrui Liu: Faster and transferable deep learning steganalysis on GPU.J. Real-Time Image Processing,16(3): 623-633 (2019).(中科院3区)

[15]Dengpan Ye, Yuan Mei, Yueyun Shang, Jixiang Zhu, Kun Ouyang: Mobile crowd-sensing context aware based fine-grained access control mode.Multimedia Tools and Applications,75(21): 13977-13993 (2016)(CCF C类)

[16]Ayesha Shafique, Guo Cao, Muhammad Aslam, Muhammad Asad andDengpan Ye: Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT).Sensors,20, 3521(2020) (doi:10.3390/s20123521)(中科院2区)

[17]Lv Chen,Dengpan Yeand Shunzhi Jiang. High Accuracy Perceptual video hashing via Low-Rank decomposition and DWT. International Conference on Multimedia Modeling(MMM) 2020, in Daejeon, Korea, Lecture Notes in Computer Science, 11961: 802-812 (2020)(CCF C类)

[18]DengpanYe, ShiguoLian : Novel encryption model for multimedia data.Journal of Systems Engineering and Electronics20(5): 1081-1085 (2009)(中国科技期刊卓越行动计划入选期刊,中科院4区)

[19]Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng: Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.InternationalJournalofComputational Intelligence Systems,4(5): 777-787 (2011)(中科院4区)

[20]Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng: Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.International JournalofComputational Intelligence Systems,5(5): 953-963 (2012)(中科院4区)

[21]Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun,Dengpan Ye, Xiangyang Luo: NEXT: a neural network framework for next POI recommendation.Frontiers of Computer Science, 14(2): 314-333 (2020) (中科院3区)

[22]Qichao Ying, Zhenxing Qian, Xinpeng Zhang,Dengpan Ye: Reversible Data Hiding With Image Enhancement Using Histogram Shifting.IEEE Access,7: 46506-46521 (2019)(中科院2区)

[23]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Min Yang,Dengpan Ye: On Improving Distortion Functions for JPEG Steganography.IEEE Access,6: 74917-74930 (2018)(中科院2区)

[24]Zhenjun Tang, Shijie Xu,Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu: Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.JournalofReal-Time Image Processing,16(3): 709-724 (2019)(中科院3区)

[25]Yue Zhang,Dengpan Ye, Junjun Gan, Zhenyu Li, Qingfeng Cheng: An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection,CMC - Computers Materials & Continua, 56(1): 151-167, 2018 (中科院4区)

[26]Donghui Hu, Zhongjin Ma, Yuqi Fan, Shuli Zheng, Dengpan Ye, Lina Wang: Study on the interaction between the cover source mismatch and texture complexity in steganalysis.Multimedia Tools and Applications,78(6): 7643-7666 (2019)(CCF C类)

[27]Jun Chen, Xiangyang Luo, Jianwei Hu,Dengpan Ye,Daofu Gong:An Attack on Hollow CAPTCHA Using Accurate Filling and Nonredundant Merging,IETE Technical Review,35(S1):106-118(2018)(中科院4区)

[28]Donghui Hu, Zhongjin Ma, Xiaotian Zhang, Peipei Li,Dengpan Ye, Baohong Ling: The Concept Drift Problem in Android Malware Detection and Its Solution.Security and Communication Networks,2017: 4956386:1-4956386:13 (2017)(CCF C类)

[29]Fang Cao, Bowen An, Jinwei Wang,Dengpan Ye, Huili Wang: Hierarchical recovery for tampered images based on watermark self-embedding.Displays, 46: 52–60 (2017)(中科院4区)

[30]Donghui Hu, Lina Wang, Xiaqiu Jiang,Dengpan Ye, Shiguo Lian. A Specific Steganalysis Approach to Effective Attacking the MB1.Chinese Journal of Electronics,18(4):610-614 (2009)(国内权威)(中科院4区)

[31]Yueyun Shang,Dengpan Ye, Zhuo Wei, Yajuan Xie: GPU-Based MPEG-2 to Secure Scalable Video Transcoding.International Journal of Digital Crime and Forensics,6(2): 52-69 (2014)(SCI源刊)

[32]Lingyu Yan, Hefei Ling,Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen: Feature Fusion based Hashing for Large Scale Image Copy Detection.InternationalJournalofComputational Intelligence Systems,8(4): 725-734 (2015)(中科院4区)

[33]Yanzhen Ren, Mengdi Fan,Dengpan Ye, Jing Yang, Lina Wang: Detection of double MP3 compression Based on Difference of Calibration Histogram.Multimedia Tools and Application,75:13855–13870(2016)(CCF C类)

[34]Shuli Zheng, Dandan Li, Donghui Hu,Dengpan Ye, Lina Wang, Jinwei Wang. Lossless data hiding algorithm for encrypted images with high capacity.Multimedia Tools and Application75:13765–13778(2016)(CCF C类)

[35]Shiguo Lian, Xi Chen,Dengpan Ye. Secure fractal image coding based on fractal parameter encryption.Fractals-complex Geometry Patterns & Scaling in Nature & Society, 17(2):149-160 (2009)(中科院3区)

[36]Yi Zhang, Xiangyang Luo, Chunfang Yang,Dengpan Ye, Fenlin Liu: A Framework of Adaptive Steganography Resisting JPEG Compression and Detection,Security and Communication Networks,9(15): 2957-2971 (2016)(CCF C类)

[37]Lina Wang, Xiaqiu Jiang, Shiguo Lian, Donghui Hu,Dengpan Ye: Image authentication based on perceptual hash using Gabor filters.Soft Computing,15(3): 493-504 (2011)(中科院3区)

[38]Yajuan Xie, Shanzhen Yi, Zhongqian Tang,Dengpan Ye: Uncertainty Multisource Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.InternationalJournalofComputational Intelligence Systems,5(5): 975-984 (2012)(中科院4区)

[39]Shiyu Li,Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo: Attack on Deep Steganalysis Neural Networks,ICCCS2018 (4): 265-276(2018)(EI)

[40]Dengpan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang: A Multi-feature Based Invertible Authentication Watermarking for JPEG Images.IWDW2004: 152-162 (EI)

[41]Shichang Ding, Xiangyang Luo,Dengpan Ye,Fenlin Liu:Delay-Distance Correlation Study for IP Geolocation.武汉大学学报(自然科学英文版), 2017 , 22 (2) :157-164(中文核心)

[42]叶登攀,尚月赟:基于多特征的MPEG视频认证方案.通信学报,29(02):59-65 (2008)(CCF中文B类)(中国科技期刊卓越行动计划入选期刊,EI)

[43]叶登攀:用于压缩视频/图像的无损信息隐藏方法.通信学报,28(11A):64-69 (2007)(CCF中文B类)(中国科技期刊卓越行动计划入选期刊,EI)

[44]梅园,叶登攀,刘昌瑞:加密域图像检索技术综述.华南理工大学学报(自然科学版), 2018, 46(5) (EI期刊)

[45]叶登攀,马方方,梅园:基于迁移学习的隐写分析.网络与信息安全学报,2017,3(1):23-30(中国网络空间安全协会会刊)

[46]尚月赟,李成蹊,叶登攀:基于DCT排序特征加密的人脸图像安全检索系统.武汉大学学报(理学版),60(6):531-536(2014)(中文核心)

[47]尚月赟,马龙飞,叶登攀:基于熵特征融合的拷贝检测方法研究.计算机工程与应用, 48(16):80-84(2012)(中文核心)

[48]刘光杰,戴跃伟,叶登攀,顾霞,王执铨:对一种基于IP标识协议隐写的分析.计算机工程, 33(24):136-137(2007)(中文核心)

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值