Follow
Dengpan Ye
Dengpan Ye
Verified email at whu.edu.cn
Title
Cited by
Cited by
Year
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
1182019
Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT
M Aslam, D Ye, A Tariq, M Asad, M Hanif, D Ndzi, SA Chelloug, MA Elaziz, ...
Sensors 22 (7), 2697, 2022
1122022
Implicit identity driven deepfake face swapping detection
B Huang, Z Wang, J Yang, J Ai, Q Zou, Q Wang, D Ye
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2023
1112023
A novel image hashing scheme with perceptual robustness using block truncation coding
C Qin, X Chen, D Ye, J Wang, X Sun
Information Sciences 361, 84-99, 2016
1032016
Next: a neural network framework for next poi recommendation
Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo
Frontiers of Computer Science 14, 314-333, 2020
942020
Hierarchical recovery for tampered images based on watermark self-embedding
F Cao, B An, J Wang, D Ye, H Wang
Displays 46, 52-60, 2017
622017
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
582018
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application
S Jiang, D Ye, J Huang, Y Shang, Z Zheng
Journal of Network and Computer Applications 165, 102689, 2020
562020
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients
Y Zhang, X Luo, C Yang, D Ye, F Liu
2015 10th International Conference on Availability, Reliability and Security …, 2015
522015
A framework of adaptive steganography resisting JPEG compression and detection
Y Zhang, X Luo, C Yang, D Ye, F Liu
Security and Communication Networks 9 (15), 2957-2971, 2016
472016
Reversible data hiding with image enhancement using histogram shifting
Q Ying, Z Qian, X Zhang, D Ye
IEEE Access 7, 46506-46521, 2019
462019
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75, 13765-13778, 2016
452016
A new adaptive watermarking for real-time MPEG videos
D Ye, C Zou, Y Dai, Z Wang
Applied Mathematics and Computation 185 (2), 907-918, 2007
432007
Detecting backdoors during the inference stage based on corruption robustness consistency
X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
362023
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu
Journal of Real-Time Image Processing 16, 709-724, 2019
312019
Detection defense against adversarial attacks with saliency map
D Ye, C Chen, C Liu, H Wang, S Jiang
International Journal of Intelligent Systems 37 (12), 10193-10210, 2022
302022
Augmenting encrypted search: A decentralized service realization with enforced execution
S Hu, C Cai, Q Wang, C Wang, Z Wang, D Ye
IEEE Transactions on Dependable and Secure Computing 18 (6), 2569-2581, 2019
302019
Enhancing the security of deep learning steganography via adversarial examples
Y Shang, S Jiang, D Ye, J Huang
Mathematics 8 (9), 1446, 2020
292020
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection.
Y Zhang, D Ye, J Gan, Z Li, Q Cheng
Computers, Materials & Continua 56 (1), 2018
292018
Detection of electric network frequency in audio recordings–from theory to practical detectors
G Hua, H Liao, Q Wang, H Zhang, D Ye
ieee transactions on information forensics and security 16, 236-248, 2020
272020
The system can't perform the operation now. Try again later.
Articles 1–20