Fengyong Li
Fengyong Li
Associate Professor, Shanghai University of Electric Power
Verified email at shiep.edu.cn
Title
Cited by
Cited by
Year
Steganalysis over large-scale social networks with high-order joint features and clustering ensembles
F Li, K Wu, J Lei, M Wen, Z Bi, C Gu
IEEE Transactions on Information Forensics and Security 11 (2), 344-357, 2015
452015
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016 (1), 1-9, 2016
392016
JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier
F Li, X Zhang, B Chen, G Feng
IEEE Signal Processing Letters 20 (3), 233-236, 2013
382013
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication
M Wen, K Lu, J Lei, F Li, J Li
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
222015
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
202016
Robust batch steganography in social networks with non-uniform payload and data decomposition
F Li, K Wu, X Zhang, J Yu, J Lei, M Wen
IEEE Access 6, 29912-29925, 2018
182018
Adaptive JPEG steganography with new distortion function
F Li, X Zhang, J Yu, W Shen
Annals of telecommunications-annales des telecommunications 69 (7), 431-440, 2014
182014
Image encryption algorithm based on Hash function and multiple chaotic systems
FY Li, JF Xu
Computer Engineering and Design 31 (1), 141-144, 2010
16*2010
Short-term load forecasting with clustering–regression model in distributed cluster
J Lei, T Jin, J Hao, F Li
Cluster Computing 22 (4), 10163-10173, 2019
132019
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
112016
Occupancy-aided energy disaggregation
G Tang, Z Ling, F Li, D Tang, J Tang
Computer Networks 117, 42-51, 2017
102017
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier
B Chen, G Feng, X Zhang, F Li
Signal, Image and Video Processing 8 (8), 1475-1482, 2014
102014
Data hiding in halftone images based on hamming code and slave pixels
ZP Ma, FY Li, XP Zhang
Journal Shanghai University (Natural Science Edition) 2, 003, 2013
102013
Anti-compression JPEG steganography over repetitive compression networks
F Li, K Wu, C Qin, J Lei
Signal Processing 170, 107454, 2020
72020
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift
F Li, H Wu, G Zhou, W Wei
Journal of Real-Time Image Processing 16 (3), 775-790, 2019
72019
Efficient steganographer detection over social networks with sampling reconstruction
F Li, M Wen, J Lei, Y Ren
Peer-to-Peer Networking and Applications 11 (5), 924-939, 2018
72018
How to extract image features based on co-occurrence matrix securely and efficiently in cloud computing
Y Ren, X Zhang, G Feng, Z Qian, F Li
IEEE Transactions on Cloud Computing 8 (1), 207-219, 2017
72017
Separable reversible data hiding in encrypted images based on scalable blocks
H Wu, F Li, C Qin, W Wei
Multimedia Tools and Applications 78 (18), 25349-25372, 2019
52019
Spatial steganalysis using redistributed residuals and diverse ensemble classifier
J Yu, X Zhang, F Li
Multimedia Tools and Applications 75 (21), 13613-13625, 2016
42016
自适应多像素信息隐藏
余江, 栗风永, 程航, 张新鹏
新型工业化, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20