Secure binary image steganography based on minimizing the distortion on the texture B Feng, W Lu, W Sun IEEE transactions on Information Forensics and Security 10 (2), 243-255, 2014 | 139 | 2014 |
TCEMD: A trust cascading-based emergency message dissemination model in VANETs Z Liu, J Weng, J Ma, J Guo, B Feng, Z Jiang, K Wei IEEE Internet of Things Journal 7 (5), 4028-4048, 2019 | 55 | 2019 |
Secure binary image steganography based on fused distortion measurement W Lu, L He, Y Yeung, Y Xue, H Liu, B Feng IEEE Transactions on Circuits and Systems for Video Technology 29 (6), 1608-1618, 2018 | 51 | 2018 |
Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography. Q Nie, X Xu, B Feng, L Yu Zhang Computers, Materials & Continua 55 (1), 2018 | 42 | 2018 |
Steganalysis of content-adaptive binary image data hiding B Feng, J Weng, W Lu, B Pei Journal of Visual Communication and Image Representation 46, 119-127, 2017 | 39 | 2017 |
Binary image steganalysis based on pixel mesh Markov transition matrix B Feng, W Lu, W Sun Journal of Visual Communication and Image Representation 26, 284-295, 2015 | 36 | 2015 |
Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation B Feng, W Lu, W Sun, J Huang, YQ Shi Signal Processing: Image Communication 41, 1-14, 2016 | 26 | 2016 |
Steganalysis with CNN using multi-channels filtered residuals Y Yuan, W Lu, B Feng, J Weng Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 22 | 2017 |
High capacity data hiding scheme for binary images based on minimizing flipping distortion B Feng, W Lu, W Sun Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014 | 17 | 2014 |
Lattice-based minimum-distortion data hiding J Lin, J Qin, S Lyu, B Feng, J Wang IEEE Communications Letters 25 (9), 2839-2843, 2021 | 10 | 2021 |
Improved algorithms for robust histogram shape-based image watermarking B Feng, J Weng, W Lu Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017 …, 2017 | 10 | 2017 |
Novel steganographic method based on generalized K-distance N-dimensional pixel matching B Feng, W Lu, W Sun Multimedia Tools and Applications 74, 9623-9646, 2015 | 10 | 2015 |
High-capacity coverless image steganographic scheme based on image synthesis G Li, B Feng, M He, J Weng, W Lu Signal Processing: Image Communication 111, 116894, 2023 | 8 | 2023 |
Android malware detection based on APK signature information feedback XY Liu, J Weng, Y Zhang, B Feng, J Weng Journal on Communications 38 (5), 190-198, 2017 | 7 | 2017 |
Multiple watermarking using multilevel quantization index modulation B Feng, J Weng, W Lu, B Pei Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 7 | 2017 |
小型无人机安全研究综述 刘炜, 冯丙文, 翁健 网络与信息安全学报 2 (3), 39-45, 2016 | 7 | 2016 |
A vulnerability detection system based on fusion of assembly code and source code X Li, B Feng, G Li, T Li, M He Security and Communication Networks 2021, 1-11, 2021 | 6 | 2021 |
Survey on research of mini-drones security W Liu, BW Feng, J WEN Chinese Journal of Network and Information Security 2 (3), 39-45, 2016 | 6 | 2016 |
Content-adaptive residual for steganalysis X Lin, B Feng, W Lu, W Sun Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014 …, 2015 | 6 | 2015 |
Secure transmission over multiple access wiretap channel by cross-time interference injection H He, S Lyu, B Feng IEEE Transactions on Communications 71 (1), 370-380, 2022 | 5 | 2022 |