متابعة
jianyi liu
jianyi liu
بريد إلكتروني تم التحقق منه على bupt.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis
R Zhang, F Zhu, J Liu, G Liu
IEEE Transactions on Information Forensics and Security 15, 1138-1150, 2019
3052019
Invisible steganography via generative adversarial networks
R Zhang, S Dong, J Liu
Multimedia tools and applications 78 (7), 8559-8575, 2019
2322019
Keyword extraction based on pagerank
J Wang, J Liu, C Wang
Pacific-Asia conference on knowledge discovery and data mining, 857-864, 2007
1122007
Efficient feature learning and multi-size image steganalysis based on CNN
R Zhang, F Zhu, J Liu, G Liu
arXiv preprint arXiv:1807.11428, 2018
452018
An Android malware detection method based on AndroidManifest file
X Li, J Liu, Y Huo, R Zhang, Y Yao
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
442016
Constructing APT attack scenarios based on intrusion kill chain and fuzzy clustering
R Zhang, Y Huo, J Liu, F Weng
Security and Communication Networks 2017 (1), 7536381, 2017
382017
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting
R Zhang, C Lu, J Liu
Journal of Information Security and Applications 47, 199-207, 2019
352019
Underdetermined wideband DOA estimation for off-grid sources with coprime array using sparse Bayesian learning
Y Qin, Y Liu, J Liu, Z Yu
Sensors 18 (1), 253, 2018
282018
Keyword extraction using language network
J Liu, J Wang
2007 International Conference on Natural Language Processing and Knowledge …, 2007
272007
Invisible steganography via generative adversarial network
S Dong, R Zhang, J Liu
arXiv preprint arXiv:1807.08571 4 (3), 2018
232018
Analysis of message attacks in aviation data-link communication
R Zhang, G Liu, J Liu, JP Nees
IEEE Access 6, 455-463, 2017
232017
Multiple-file remote data checking for cloud storage
D Xiao, Y Yang, W Yao, C Wu, J Liu, Y Yang
Computers & Security 31 (2), 192-205, 2012
212012
Relation classification via BERT with piecewise convolution and focal loss
J Liu, X Duan, R Zhang, Y Sun, L Guan, B Lin
Plos one 16 (9), e0257092, 2021
162021
Research on the comprehensive anti-spam filter
Y Guo, Y Zhang, J Liu, C Wang
2006 4th IEEE International Conference on Industrial Informatics, 1069-1074, 2006
162006
Web document duplicate removal algorithm based on keyword sequences
W Li, JY Liu, C Wang
2005 International Conference on Natural Language Processing and Knowledge …, 2005
162005
Multi-step attack scenarios mining based on neural network and Bayesian network attack graph
J Liu, B Liu, R Zhang, C Wang
Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019
152019
Dynamic data integrity auditing for secure outsourcing in the cloud
J Wei, R Zhang, J Liu, J Li, X Niu, Y Yao
Concurrency and Computation: Practice and Experience 29 (12), e4096, 2017
142017
Phishing sites detection based on Url Correlation
Y Xue, Y Li, Y Yao, X Zhao, J Liu, R Zhang
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
142016
Keyword extraction using PageRank on synonym networks
Z Liu, J Liu, W Yao, C Wang
2010 International Conference on E-Product E-Service and E-Entertainment, 1-4, 2010
142010
A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction
J Liu, K Zhao, R Zhang
Circuits, Systems, and Signal Processing 39 (7), 3532-3552, 2020
132020
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20