zhili chen
Citata da
Citata da
Effective linguistic steganography detection
Z Chen, L Huang, Z Yu, X Zhao, X Zhao
Computer and Information Technology Workshops, 2008. CIT Workshops 2008 …, 2008
True-mcsa: A framework for truthful double multi-channel spectrum auctions
Z Chen, H Huang, Y Sun, L Huang
IEEE Transactions on Wireless Communications, 1-13, 2013
Linguistic steganography detection using statistical characteristics of correlations between words
Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao
Information Hiding, 224-235, 2008
A new scheme for covert communication via 3G encoded speech
H Miao, L Huang, Z Chen, W Yang, A Al-Hawbani
Computers & Electrical Engineering 38 (6), 1490-1501, 2012
A statistical attack on a kind of word-shift text-steganography
L Li, L Huang, X Zhao, W Yang, Z Chen
Intelligent Information Hiding and Multimedia Signal Processing, 2008 …, 2008
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions
Z Chen, L Huang, L Li, W Yang, H Miao, M Tian, F Wang
Proc of Infocom 2014, 2014
A statistical algorithm for linguistic steganography detection based on distribution of words
C Zhi-li, H Liu-sheng, Y Zhen-shan, L Ling-jun
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
Linguistic steganography detection based on perplexity
P Meng, L Huang, Z Chen, W Yang
MultiMedia and Information Technology, 2008. MMIT'08. International …, 2008
Detection of substitution-based linguistic steganography by relative frequency analysis
Z Chen, L Huang, W Yang
Digital investigation 8 (1), 68-77, 2011
Steganalysis of Compressed Speech Based on Markov and Entropy
H Miao, L Huang, Y Shen, X Lu, Z Chen
Digital-Forensics and Watermarking, 63-76, 2014
Steganalysis against substitution-based linguistic steganography based on context clusters
Z Chen, L Huang, H Miao, W Yang, P Meng
Computers & Electrical Engineering 37 (6), 1071-1081, 2011
STBS: A statistical algorithm for steganalysis of translation-based steganography
P Meng, L Hang, Z Chen, Y Hu, W Yang
Information Hiding, 208-220, 2010
Linguistic Steganography Detection Algorithm Using Statistical Language Model
P Meng, L Hang, W Yang, Z Chen, H Zheng
Information Technology and Computer Science, 2009. ITCS 2009. International …, 2009
A novel text steganography by context-based equivalent substitution
F Wang, L Huang, Z Chen, W Yang, H Miao
Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE …, 2013
Itsec: An information-theoretically secure framework for truthful spectrum auctions
Z Chen, L Huang, L Chen
Infocom, 2015
A 3 G Speech Data Hiding Method Based on Pitch Period
C Yu, LS Huang, W Yang, ZL Chen, HB Miao
Journal of Chinese Computer Systems 33 (7), 1445-1449, 2012
Blind linguistic steganalysis against translation based steganography
Z Chen, L Huang, P Meng, W Yang, H Miao
Digital Watermarking, 251-265, 2011
Hiding information by context-based synonym substitution
X Zheng, L Huang, Z Chen, Z Yu, W Yang
Digital Watermarking, 162-169, 2009
Detection of synonym-substitution modified articles using context information
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008
Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks
H Huang, Y Sun, XY Li, Z Chen, W Yang, H Xu
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20