Seguir
Guangjie Liu
Guangjie Liu
Nanjing University of Information Science and Technology
No hay ninguna dirección de correo electrónico verificada.
Título
Citado por
Citado por
Año
Image copy-move forgery detection based on SURF
X Bo, W Junwen, L Guangjie, D Yuewei
2010 International conference on multimedia information networking and …, 2010
3562010
A passive image authentication scheme for detecting region-duplication forgery with rotation
G Liu, J Wang, S Lian, Z Wang
Journal of Network and Computer Applications 34 (5), 1557-1565, 2011
1612011
Detection of image region duplication forgery using model with circle block
J Wang, G Liu, H Li, Y Dai, Z Wang
2009 International conference on multimedia information networking and …, 2009
1422009
Fast and robust forensics for image region-duplication forgery
J Wang, G Liu, Z Zhang, Y Dai, Z Wang
Acta Automatica Sinica 35 (12), 1488-1495, 2009
1332009
Designing S-boxes based on 3-D four-wing autonomous chaotic system
G Liu, W Yang, W Liu, Y Dai
Nonlinear dynamics 82, 1867-1877, 2015
972015
Locally optimum detection for Barni's multiplicative watermarking in DWT domain
J Wang, G Liu, Y Dai, J Sun, Z Wang, S Lian
Signal Processing 88 (1), 117-130, 2008
812008
Designing S-box based on 4D-4wing hyperchaotic system
F Islam, G Liu
3D Research 8, 1-9, 2017
572017
Efficient video encryption scheme based on advanced video coding
S Lian, J Sun, G Liu, Z Wang
Multimedia Tools and Applications 38, 75-89, 2008
572008
Network covert timing channel with distribution matching
G Liu, J Zhai, Y Dai
Telecommunication Systems 49, 199-205, 2012
422012
A covert channel detection algorithm based on TCP Markov model
J Zhai, G Liu, Y Dai
2010 International Conference on Multimedia Information Networking and …, 2010
422010
Detect image splicing with artificial blurred boundary
G Liu, J Wang, S Lian, Y Dai
Mathematical and Computer Modelling 57 (11-12), 2647-2659, 2013
412013
Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game
W Tian, M Du, X Ji, G Liu, Y Dai, Z Han
IEEE Internet of Things Journal 8 (24), 17372-17381, 2021
392021
Image forgery forensics based on manual blurred edge detection
J Wang, G Liu, B Xu, H Li, Y Dai, Z Wang
2010 International conference on multimedia information networking and …, 2010
372010
A wireless covert channel based on constellation shaping modulation
P Cao, W Liu, G Liu, X Ji, J Zhai, Y Dai
Security and Communication Networks 2018, 1-15, 2018
362018
Detecting stealthy domain generation algorithms using heterogeneous deep neural network framework
L Yang, G Liu, Y Dai, J Wang, J Zhai
Ieee Access 8, 82876-82889, 2020
352020
Image splicing detection based on convolutional neural network with weight combination strategy
J Wang, Q Ni, G Liu, X Luo, SK Jha
Journal of Information Security and Applications 54, 102523, 2020
332020
Adaptive steganography based on block complexity and matrix embedding
G Liu, W Liu, Y Dai, S Lian
Multimedia systems 20, 227-238, 2014
322014
Designing snort rules to detect abnormal DNP3 network data
H Li, G Liu, W Jiang, Y Dai
2015 International Conference on Control, Automation and Information …, 2015
312015
An adaptive matrix embedding for image steganography
G Liu, W Liu, Y Dai, S Lian
2011 Third International Conference on Multimedia Information Networking and …, 2011
312011
VoIP traffic detection in tunneled and anonymous networks using deep learning
FU Islam, G Liu, J Zhai, W Liu
IEEE Access 9, 59783-59799, 2021
262021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20