Markov process-based retrieval for encrypted JPEG images H Cheng, X Zhang, J Yu, F Li EURASIP Journal on Information Security 2016, 1-9, 2016 | 81 | 2016 |
Steganalysis over large-scale social networks with high-order joint features and clustering ensembles F Li, K Wu, J Lei, M Wen, Z Bi, C Gu IEEE Transactions on Information Forensics and Security 11 (2), 344-357, 2015 | 66 | 2015 |
GAN-based spatial image steganography with cross feedback mechanism F Li, Z Yu, C Qin Signal Processing 190, 108341, 2022 | 51 | 2022 |
JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier F Li, X Zhang, B Chen, G Feng IEEE Signal Processing Letters 20 (3), 233-236, 2013 | 49 | 2013 |
JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation C Qin, J Hu, F Li, Z Qian, X Zhang IEEE Transactions on Multimedia 25, 2528-2542, 2022 | 36 | 2022 |
Robust batch steganography in social networks with non-uniform payload and data decomposition F Li, K Wu, X Zhang, J Yu, J Lei, M Wen IEEE Access 6, 29912-29925, 2018 | 36 | 2018 |
Anti-compression JPEG steganography over repetitive compression networks F Li, K Wu, C Qin, J Lei Signal Processing 170, 107454, 2020 | 34 | 2020 |
Spatial steganalysis using contrast of residuals J Yu, F Li, H Cheng, X Zhang IEEE Signal Processing Letters 23 (7), 989-992, 2016 | 32 | 2016 |
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication M Wen, K Lu, J Lei, F Li, J Li 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015 | 32 | 2015 |
Short-term load forecasting with clustering–regression model in distributed cluster J Lei, T Jin, J Hao, F Li Cluster Computing 22 (Suppl 4), 10163-10173, 2019 | 31 | 2019 |
Separable reversible data hiding in encrypted images based on scalable blocks H Wu, F Li, C Qin, W Wei Multimedia Tools and Applications 78, 25349-25372, 2019 | 25 | 2019 |
Reversible data hiding for JPEG images with minimum additive distortion F Li, L Zhang, C Qin, K Wu Information Sciences 595, 142-158, 2022 | 22 | 2022 |
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift F Li, H Wu, G Zhou, W Wei Journal of Real-Time Image Processing 16, 775-790, 2019 | 22 | 2019 |
Image manipulation localization using multi-scale feature fusion and adaptive edge supervision F Li, Z Pei, X Zhang, C Qin IEEE Transactions on Multimedia 25, 7851-7866, 2022 | 21 | 2022 |
Occupancy-aided energy disaggregation G Tang, Z Ling, F Li, D Tang, J Tang Computer Networks 117, 42-51, 2017 | 20 | 2017 |
Adaptive JPEG steganography with new distortion function F Li, X Zhang, J Yu, W Shen Annals of telecommunications-annales des telecommunications 69, 431-440, 2014 | 20 | 2014 |
Digital image steganalysis based on local textural features and double dimensionality reduction F Li, X Zhang, H Cheng, J Yu Security and Communication Networks 9 (8), 729-736, 2016 | 19 | 2016 |
Ensemble stego selection for enhancing image steganography F Li, Y Zeng, X Zhang, C Qin IEEE Signal Processing Letters 29, 702-706, 2022 | 17 | 2022 |
Double linear regression prediction based reversible data hiding in encrypted images F Li, H Zhu, J Yu, C Qin Multimedia Tools and Applications 80, 2141-2159, 2021 | 17 | 2021 |
Image encryption algorithm based on Hash function and multiple chaotic systems FY Li, JF Xu Computer Engineering and Design 31 (1), 141-144, 2010 | 16* | 2010 |