Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis R Zhang, F Zhu, J Liu, G Liu IEEE Transactions on Information Forensics and Security 15, 1138-1150, 2019 | 316 | 2019 |
Invisible steganography via generative adversarial networks R Zhang, S Dong, J Liu Multimedia tools and applications 78 (7), 8559-8575, 2019 | 235 | 2019 |
Keyword extraction based on pagerank J Wang, J Liu, C Wang Pacific-Asia conference on knowledge discovery and data mining, 857-864, 2007 | 113 | 2007 |
Efficient feature learning and multi-size image steganalysis based on CNN R Zhang, F Zhu, J Liu, G Liu arXiv preprint arXiv:1807.11428, 2018 | 47 | 2018 |
An Android malware detection method based on AndroidManifest file X Li, J Liu, Y Huo, R Zhang, Y Yao 2016 4th International Conference on Cloud Computing and Intelligence …, 2016 | 46 | 2016 |
Constructing APT attack scenarios based on intrusion kill chain and fuzzy clustering R Zhang, Y Huo, J Liu, F Weng Security and Communication Networks 2017 (1), 7536381, 2017 | 38 | 2017 |
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting R Zhang, C Lu, J Liu Journal of Information Security and Applications 47, 199-207, 2019 | 35 | 2019 |
Underdetermined wideband DOA estimation for off-grid sources with coprime array using sparse Bayesian learning Y Qin, Y Liu, J Liu, Z Yu Sensors 18 (1), 253, 2018 | 28 | 2018 |
Keyword extraction using language network J Liu, J Wang 2007 International Conference on Natural Language Processing and Knowledge …, 2007 | 28 | 2007 |
Invisible steganography via generative adversarial network S Dong, R Zhang, J Liu arXiv preprint arXiv:1807.08571 4 (3), 2018 | 23 | 2018 |
Analysis of message attacks in aviation data-link communication R Zhang, G Liu, J Liu, JP Nees IEEE Access 6, 455-463, 2017 | 23 | 2017 |
Multiple-file remote data checking for cloud storage D Xiao, Y Yang, W Yao, C Wu, J Liu, Y Yang Computers & Security 31 (2), 192-205, 2012 | 22 | 2012 |
Research on the comprehensive anti-spam filter Y Guo, Y Zhang, J Liu, C Wang 2006 4th IEEE International Conference on Industrial Informatics, 1069-1074, 2006 | 16 | 2006 |
Web document duplicate removal algorithm based on keyword sequences W Li, JY Liu, C Wang 2005 International Conference on Natural Language Processing and Knowledge …, 2005 | 16 | 2005 |
Multi-step attack scenarios mining based on neural network and Bayesian network attack graph J Liu, B Liu, R Zhang, C Wang Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019 | 15 | 2019 |
Relation classification via BERT with piecewise convolution and focal loss J Liu, X Duan, R Zhang, Y Sun, L Guan, B Lin Plos one 16 (9), e0257092, 2021 | 14 | 2021 |
Dynamic data integrity auditing for secure outsourcing in the cloud J Wei, R Zhang, J Liu, J Li, X Niu, Y Yao Concurrency and Computation: Practice and Experience 29 (12), e4096, 2017 | 14 | 2017 |
Phishing sites detection based on Url Correlation Y Xue, Y Li, Y Yao, X Zhao, J Liu, R Zhang 2016 4th International Conference on Cloud Computing and Intelligence …, 2016 | 14 | 2016 |
A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction J Liu, K Zhao, R Zhang Circuits, Systems, and Signal Processing 39 (7), 3532-3552, 2020 | 13 | 2020 |
Efficient dynamic replicated data possession checking in distributed cloud storage systems J Wei, J Liu, R Zhang, X Niu International Journal of Distributed Sensor Networks 12 (1), 1894713, 2016 | 13 | 2016 |