Παρακολούθηση
Fengyong Li
Fengyong Li
Associate Professor, Shanghai University of Electric Power
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα shiep.edu.cn
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016, 1-9, 2016
682016
Steganalysis over large-scale social networks with high-order joint features and clustering ensembles
F Li, K Wu, J Lei, M Wen, Z Bi, C Gu
IEEE Transactions on Information Forensics and Security 11 (2), 344-357, 2015
602015
JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier
F Li, X Zhang, B Chen, G Feng
IEEE Signal Processing Letters 20 (3), 233-236, 2013
472013
Robust batch steganography in social networks with non-uniform payload and data decomposition
F Li, K Wu, X Zhang, J Yu, J Lei, M Wen
IEEE Access 6, 29912-29925, 2018
342018
Anti-compression JPEG steganography over repetitive compression networks
F Li, K Wu, C Qin, J Lei
Signal Processing 170, 107454, 2020
302020
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
282016
Short-term load forecasting with clustering–regression model in distributed cluster
J Lei, T Jin, J Hao, F Li
Cluster Computing 22, 10163-10173, 2019
262019
GAN-based spatial image steganography with cross feedback mechanism
F Li, Z Yu, C Qin
Signal Processing 190, 108341, 2022
242022
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication
M Wen, K Lu, J Lei, F Li, J Li
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
232015
Separable reversible data hiding in encrypted images based on scalable blocks
H Wu, F Li, C Qin, W Wei
Multimedia Tools and Applications 78, 25349-25372, 2019
202019
Adaptive JPEG steganography with new distortion function
F Li, X Zhang, J Yu, W Shen
Annals of telecommunications-annales des telecommunications 69, 431-440, 2014
182014
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift
F Li, H Wu, G Zhou, W Wei
Journal of Real-Time Image Processing 16, 775-790, 2019
172019
Occupancy-aided energy disaggregation
G Tang, Z Ling, F Li, D Tang, J Tang
Computer Networks 117, 42-51, 2017
172017
Image encryption algorithm based on Hash function and multiple chaotic systems
FY Li, JF Xu
Computer Engineering and Design 31 (1), 141-144, 2010
17*2010
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
162016
How to extract image features based on co-occurrence matrix securely and efficiently in cloud computing
Y Ren, X Zhang, G Feng, Z Qian, F Li
IEEE Transactions on Cloud Computing 8 (1), 207-219, 2017
132017
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier
B Chen, G Feng, X Zhang, F Li
Signal, Image and Video Processing 8, 1475-1482, 2014
122014
Data hiding in halftone images based on hamming code and slave pixels
Z Ma, F Li, X Zhang
J Shanghai Univ (Nat Sci) 19 (2), 111-115, 2013
122013
Jpeg image encryption with adaptive dc coefficient prediction and rs pair permutation
C Qin, J Hu, F Li, Z Qian, X Zhang
IEEE Transactions on Multimedia, 2022
112022
Double linear regression prediction based reversible data hiding in encrypted images
F Li, H Zhu, J Yu, C Qin
Multimedia Tools and Applications 80, 2141-2159, 2021
112021
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20