Steganalysis over large-scale social networks with high-order joint features and clustering ensembles F Li, K Wu, J Lei, M Wen, Z Bi, C Gu IEEE Transactions on Information Forensics and Security 11 (2), 344-357, 2015 | 45 | 2015 |
Markov process-based retrieval for encrypted JPEG images H Cheng, X Zhang, J Yu, F Li EURASIP Journal on Information Security 2016 (1), 1-9, 2016 | 39 | 2016 |
JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier F Li, X Zhang, B Chen, G Feng IEEE Signal Processing Letters 20 (3), 233-236, 2013 | 38 | 2013 |
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication M Wen, K Lu, J Lei, F Li, J Li 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015 | 22 | 2015 |
Spatial steganalysis using contrast of residuals J Yu, F Li, H Cheng, X Zhang IEEE Signal Processing Letters 23 (7), 989-992, 2016 | 20 | 2016 |
Robust batch steganography in social networks with non-uniform payload and data decomposition F Li, K Wu, X Zhang, J Yu, J Lei, M Wen IEEE Access 6, 29912-29925, 2018 | 18 | 2018 |
Adaptive JPEG steganography with new distortion function F Li, X Zhang, J Yu, W Shen Annals of telecommunications-annales des telecommunications 69 (7), 431-440, 2014 | 18 | 2014 |
Image encryption algorithm based on Hash function and multiple chaotic systems FY Li, JF Xu Computer Engineering and Design 31 (1), 141-144, 2010 | 16* | 2010 |
Short-term load forecasting with clustering–regression model in distributed cluster J Lei, T Jin, J Hao, F Li Cluster Computing 22 (4), 10163-10173, 2019 | 13 | 2019 |
Digital image steganalysis based on local textural features and double dimensionality reduction F Li, X Zhang, H Cheng, J Yu Security and Communication Networks 9 (8), 729-736, 2016 | 11 | 2016 |
Occupancy-aided energy disaggregation G Tang, Z Ling, F Li, D Tang, J Tang Computer Networks 117, 42-51, 2017 | 10 | 2017 |
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier B Chen, G Feng, X Zhang, F Li Signal, Image and Video Processing 8 (8), 1475-1482, 2014 | 10 | 2014 |
Data hiding in halftone images based on hamming code and slave pixels ZP Ma, FY Li, XP Zhang Journal Shanghai University (Natural Science Edition) 2, 003, 2013 | 10 | 2013 |
Anti-compression JPEG steganography over repetitive compression networks F Li, K Wu, C Qin, J Lei Signal Processing 170, 107454, 2020 | 7 | 2020 |
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift F Li, H Wu, G Zhou, W Wei Journal of Real-Time Image Processing 16 (3), 775-790, 2019 | 7 | 2019 |
Efficient steganographer detection over social networks with sampling reconstruction F Li, M Wen, J Lei, Y Ren Peer-to-Peer Networking and Applications 11 (5), 924-939, 2018 | 7 | 2018 |
How to extract image features based on co-occurrence matrix securely and efficiently in cloud computing Y Ren, X Zhang, G Feng, Z Qian, F Li IEEE Transactions on Cloud Computing 8 (1), 207-219, 2017 | 7 | 2017 |
Separable reversible data hiding in encrypted images based on scalable blocks H Wu, F Li, C Qin, W Wei Multimedia Tools and Applications 78 (18), 25349-25372, 2019 | 5 | 2019 |
Spatial steganalysis using redistributed residuals and diverse ensemble classifier J Yu, X Zhang, F Li Multimedia Tools and Applications 75 (21), 13613-13625, 2016 | 4 | 2016 |
自适应多像素信息隐藏 余江, 栗风永, 程航, 张新鹏 新型工业化, 2013 | 4 | 2013 |