EveDroid: Event-aware Android malware detection against model degrading for IoT devices T Lei, Z Qin, Z Wang, Q Li, D Ye IEEE Internet of Things Journal 6 (4), 6668-6680, 2019 | 118 | 2019 |
Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT M Aslam, D Ye, A Tariq, M Asad, M Hanif, D Ndzi, SA Chelloug, MA Elaziz, ... Sensors 22 (7), 2697, 2022 | 112 | 2022 |
Implicit identity driven deepfake face swapping detection B Huang, Z Wang, J Yang, J Ai, Q Zou, Q Wang, D Ye Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2023 | 111 | 2023 |
A novel image hashing scheme with perceptual robustness using block truncation coding C Qin, X Chen, D Ye, J Wang, X Sun Information Sciences 361, 84-99, 2016 | 103 | 2016 |
Next: a neural network framework for next poi recommendation Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo Frontiers of Computer Science 14, 314-333, 2020 | 94 | 2020 |
Hierarchical recovery for tampered images based on watermark self-embedding F Cao, B An, J Wang, D Ye, H Wang Displays 46, 52-60, 2017 | 62 | 2017 |
On improving distortion functions for JPEG steganography Z Wang, Z Qian, X Zhang, M Yang, D Ye IEEE Access 6, 74917-74930, 2018 | 58 | 2018 |
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application S Jiang, D Ye, J Huang, Y Shang, Z Zheng Journal of Network and Computer Applications 165, 102689, 2020 | 56 | 2020 |
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients Y Zhang, X Luo, C Yang, D Ye, F Liu 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 52 | 2015 |
A framework of adaptive steganography resisting JPEG compression and detection Y Zhang, X Luo, C Yang, D Ye, F Liu Security and Communication Networks 9 (15), 2957-2971, 2016 | 47 | 2016 |
Reversible data hiding with image enhancement using histogram shifting Q Ying, Z Qian, X Zhang, D Ye IEEE Access 7, 46506-46521, 2019 | 46 | 2019 |
Lossless data hiding algorithm for encrypted images with high capacity S Zheng, D Li, D Hu, D Ye, L Wang, J Wang Multimedia Tools and Applications 75, 13765-13778, 2016 | 45 | 2016 |
A new adaptive watermarking for real-time MPEG videos D Ye, C Zou, Y Dai, Z Wang Applied Mathematics and Computation 185 (2), 907-918, 2007 | 43 | 2007 |
Detecting backdoors during the inference stage based on corruption robustness consistency X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 36 | 2023 |
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu Journal of Real-Time Image Processing 16, 709-724, 2019 | 31 | 2019 |
Detection defense against adversarial attacks with saliency map D Ye, C Chen, C Liu, H Wang, S Jiang International Journal of Intelligent Systems 37 (12), 10193-10210, 2022 | 30 | 2022 |
Augmenting encrypted search: A decentralized service realization with enforced execution S Hu, C Cai, Q Wang, C Wang, Z Wang, D Ye IEEE Transactions on Dependable and Secure Computing 18 (6), 2569-2581, 2019 | 30 | 2019 |
Enhancing the security of deep learning steganography via adversarial examples Y Shang, S Jiang, D Ye, J Huang Mathematics 8 (9), 1446, 2020 | 29 | 2020 |
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection. Y Zhang, D Ye, J Gan, Z Li, Q Cheng Computers, Materials & Continua 56 (1), 2018 | 29 | 2018 |
Detection of electric network frequency in audio recordings–from theory to practical detectors G Hua, H Liao, Q Wang, H Zhang, D Ye ieee transactions on information forensics and security 16, 236-248, 2020 | 27 | 2020 |