팔로우
jianyi liu
jianyi liu
bupt.edu.cn의 이메일 확인됨
제목
인용
인용
연도
Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis
R Zhang, F Zhu, J Liu, G Liu
IEEE Transactions on Information Forensics and Security 15, 1138-1150, 2019
3162019
Invisible steganography via generative adversarial networks
R Zhang, S Dong, J Liu
Multimedia tools and applications 78 (7), 8559-8575, 2019
2352019
Keyword extraction based on pagerank
J Wang, J Liu, C Wang
Pacific-Asia conference on knowledge discovery and data mining, 857-864, 2007
1132007
Efficient feature learning and multi-size image steganalysis based on CNN
R Zhang, F Zhu, J Liu, G Liu
arXiv preprint arXiv:1807.11428, 2018
472018
An Android malware detection method based on AndroidManifest file
X Li, J Liu, Y Huo, R Zhang, Y Yao
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
462016
Constructing APT attack scenarios based on intrusion kill chain and fuzzy clustering
R Zhang, Y Huo, J Liu, F Weng
Security and Communication Networks 2017 (1), 7536381, 2017
382017
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting
R Zhang, C Lu, J Liu
Journal of Information Security and Applications 47, 199-207, 2019
352019
Underdetermined wideband DOA estimation for off-grid sources with coprime array using sparse Bayesian learning
Y Qin, Y Liu, J Liu, Z Yu
Sensors 18 (1), 253, 2018
282018
Keyword extraction using language network
J Liu, J Wang
2007 International Conference on Natural Language Processing and Knowledge …, 2007
282007
Invisible steganography via generative adversarial network
S Dong, R Zhang, J Liu
arXiv preprint arXiv:1807.08571 4 (3), 2018
232018
Analysis of message attacks in aviation data-link communication
R Zhang, G Liu, J Liu, JP Nees
IEEE Access 6, 455-463, 2017
232017
Multiple-file remote data checking for cloud storage
D Xiao, Y Yang, W Yao, C Wu, J Liu, Y Yang
Computers & Security 31 (2), 192-205, 2012
222012
Research on the comprehensive anti-spam filter
Y Guo, Y Zhang, J Liu, C Wang
2006 4th IEEE International Conference on Industrial Informatics, 1069-1074, 2006
162006
Web document duplicate removal algorithm based on keyword sequences
W Li, JY Liu, C Wang
2005 International Conference on Natural Language Processing and Knowledge …, 2005
162005
Multi-step attack scenarios mining based on neural network and Bayesian network attack graph
J Liu, B Liu, R Zhang, C Wang
Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019
152019
Relation classification via BERT with piecewise convolution and focal loss
J Liu, X Duan, R Zhang, Y Sun, L Guan, B Lin
Plos one 16 (9), e0257092, 2021
142021
Dynamic data integrity auditing for secure outsourcing in the cloud
J Wei, R Zhang, J Liu, J Li, X Niu, Y Yao
Concurrency and Computation: Practice and Experience 29 (12), e4096, 2017
142017
Phishing sites detection based on Url Correlation
Y Xue, Y Li, Y Yao, X Zhao, J Liu, R Zhang
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
142016
A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction
J Liu, K Zhao, R Zhang
Circuits, Systems, and Signal Processing 39 (7), 3532-3552, 2020
132020
Efficient dynamic replicated data possession checking in distributed cloud storage systems
J Wei, J Liu, R Zhang, X Niu
International Journal of Distributed Sensor Networks 12 (1), 1894713, 2016
132016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20