default search action
Hui Tian 0002
Person information
- affiliation: National Huaqiao University, College of Computer Science and Technology, Xiamen, China
- affiliation (PhD 2010): Huazhong University of Science and Technology, Wuhan National Lab for Optoelectronics, China
Other persons with the same name
- Hui Tian — disambiguation page
- Hui Tian 0001 — Beijing Jiaotong University, School of Electronic and Information Engineering, China (and 3 more)
- Hui Tian 0003 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Hui Tian 0004 — PLA University of Science and Technology, China
- Hui Tian 0005 — National University of Defense Technology, College of Computer, Changsha, China
- Hui Tian 0006 — Chongqing University of Posts and Telecommunications, MoE 1Key Laboratory of Industrial Internet of Things and Networked Control, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j77]Xiaolong Zhuang, Yonghong Chen, Hui Tian:
A generalized detection framework for covert timing channels based on perceptual hashing. Trans. Emerg. Telecommun. Technol. 35(5) (2024) - [j76]Yangfu Li, Jiapan Gan, Xiaodan Lin, Yingqiang Qiu, Hongjian Zhan, Hui Tian:
DS-TDNN: Dual-Stream Time-Delay Neural Network With Global-Aware Filter for Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2814-2827 (2024) - [j75]Congcong Sun, Hui Tian, Peng Tian, Haizhou Li, Zhenxing Qian:
Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2957-2972 (2024) - [c25]Weizhi Liu, Yue Li, Dongdong Lin, Hui Tian, Haizhou Li:
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis. ACM Multimedia 2024: 3294-3302 - [i1]Weizhi Liu, Yue Li, Dongdong Lin, Hui Tian, Haizhou Li:
GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis. CoRR abs/2407.10471 (2024) - 2023
- [j74]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Hanyu Quan, Yonghong Chen:
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning. Comput. Electr. Eng. 111(Part A): 108909 (2023) - [j73]Hui Tian, Weiping Ye, Jia Wang, Hanyu Quan, Chin-Chen Chang:
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0. Int. J. Intell. Syst. 2023: 1-18 (2023) - [j72]Hui Tian, Yiqin Qiu, Wojciech Mazurczyk, Haizhou Li, Zhenxing Qian:
STFF-SM: Steganalysis Model Based on Spatial and Temporal Feature Fusion for Speech Streams. IEEE ACM Trans. Audio Speech Lang. Process. 31: 277-289 (2023) - [j71]Yiqin Qiu, Hui Tian, Haizhou Li, Chin-Chen Chang, Athanasios V. Vasilakos:
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis. IEEE Trans. Inf. Forensics Secur. 18: 2737-2750 (2023) - 2022
- [j70]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j69]Yiqin Qiu, Hui Tian, Lili Tang, Wojciech Mazurczyk, Chin-Chen Chang:
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords. J. Inf. Secur. Appl. 68: 103250 (2022) - [j68]Hui Tian, Junyan Wu, Hanyu Quan, Chin-Chen Chang:
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network. IEEE Signal Process. Lett. 29: 2462-2466 (2022) - [j67]Hui Tian, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. ACM Trans. Internet Techn. 22(4): 88:1-88:24 (2022) - [c24]Shulong Xu, Hui Tian, Hanyu Quan, Jing Lu:
A Novel Global-Local Representations Network for Speech Steganalysis. AIPR 2022: 945-949 - 2021
- [j66]Chonggao Sun, Yonghong Chen, Hui Tian, Shuhong Wu:
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network. IEEE Open J. Comput. Soc. 2: 407-418 (2021) - [j65]Shuhong Wu, Yonghong Chen, Hui Tian, Chonggao Sun:
Detection of Covert Timing Channel Based on Time Series Symbolization. IEEE Open J. Commun. Soc. 2: 2372-2382 (2021) - [j64]Yingqiang Qiu, Zhenxing Qian, Han He, Hui Tian, Xinpeng Zhang:
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension. IEEE Trans. Circuits Syst. Video Technol. 31(4): 1380-1394 (2021) - 2020
- [j63]Hui Tian, Jie Liu, Chin-Chen Chang, Yongfeng Huang, Yiqiao Cai:
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency. IEEE Access 8: 6117-6129 (2020) - [j62]Changli Zhou, Tian Wang, Hui Tian, Wenxian Jiang, Zhijian Wang:
A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT. IEEE Access 8: 81698-81710 (2020) - [j61]Tian Wang, Jiandian Zeng, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Data collection from WSNs to the cloud based on mobile Fog elements. Future Gener. Comput. Syst. 105: 864-872 (2020) - [j60]Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. Int. J. Netw. Secur. 22(1): 68-79 (2020) - [j59]Yiqiao Cai, Duanwei Wu, Ying Zhou, Shunkai Fu, Hui Tian, Yongqian Du:
Self-organizing neighborhood-based differential evolution for global optimization. Swarm Evol. Comput. 56: 100699 (2020) - [c23]Fang Peng, Hui Tian, Hanyu Quan, Jing Lu:
Data Auditing for the Internet of Things Environments Leveraging Smart Contract. FCS 2020: 133-149
2010 – 2019
- 2019
- [j58]Yiqiao Cai, Chi Shao, Huizhen Zhang, Shunkai Fu, Hui Tian, Yonghong Chen:
A Neighborhood-Assisted Framework for Differential Evolution. IEEE Access 7: 44338-44358 (2019) - [j57]Yiqiao Cai, Chi Shao, Ying Zhou, Shunkai Fu, Huizhen Zhang, Hui Tian:
Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules. IEEE Access 7: 58023-58040 (2019) - [j56]Hui Tian, Jie Liu, Chin-Chen Chang, Chih-Cheng Chen, Yongfeng Huang:
Steganalysis of AMR Speech Based on Multiple Classifiers Combination. IEEE Access 7: 140957-140968 (2019) - [j55]Hui Tian, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, Yonghong Chen:
Public Auditing for Trusted Cloud Storage Services. IEEE Secur. Priv. 17(1): 10-22 (2019) - [j54]Fulin Nan, Hui Tian, Tian Wang, Yiqiao Cai, Yonghong Chen:
A collusion-resistant public auditing scheme for shared cloud data. Int. J. Inf. Technol. Manag. 18(2/3): 195-212 (2019) - [j53]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang:
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network. Int. J. Netw. Secur. 21(2): 243-249 (2019) - [j52]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network. Int. J. Netw. Secur. 21(4): 648-660 (2019) - [j51]Hui Tian, Fulin Nan, Hong Jiang, Chin-Chen Chang, Jianting Ning, Yongfeng Huang:
Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472: 107-125 (2019) - [j50]Hui Tian, Fulin Nan, Chin-Chen Chang, Yongfeng Huang, Jing Lu, Yongqian Du:
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 127: 59-69 (2019) - [j49]Hui Tian, Meilun Huang, Chin-Chen Chang, Yongfeng Huang, Jing Lu, Yongqian Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay. J. Univers. Comput. Sci. 25(9): 1131-1150 (2019) - [j48]Xiaokang Liu, Hui Tian, Yongfeng Huang, Jing Lu:
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search. Multim. Tools Appl. 78(7): 8447-8461 (2019) - [j47]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen:
Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 23(11): 3779-3792 (2019) - [c22]Xiang Li, Hui Tian, Jianting Ning:
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing. ProvSec 2019: 347-354 - [c21]Yiqiao Cai, Deining Peng, Shunkai Fu, Hui Tian:
Multitasking differential evolution with difference vector sharing mechanism. SSCI 2019: 3039-3046 - 2018
- [j46]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Yonghong Chen, Yiqiao Cai, Hui Tian, Mande Xie:
Energy-efficient relay tracking with multiple mobile camera sensors. Comput. Networks 133: 130-140 (2018) - [j45]Hui Tian, Jun Sun, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen:
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication. IEEE Commun. Lett. 22(6): 1196-1199 (2018) - [j44]Yiqiao Cai, Jingliang Liao, Tian Wang, Yonghong Chen, Hui Tian:
Social learning differential evolution. Inf. Sci. 433-434: 464-509 (2018) - [j43]Guo Sun, Yiqiao Cai, Tian Wang, Hui Tian, Cheng Wang, Yonghong Chen:
Differential evolution with individual-dependent topology adaptation. Inf. Sci. 450: 1-38 (2018) - [j42]Zhao-Hua Zhu, Hui Tian, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai:
StegTab: Steganography in Guitar Tablatures. J. Inf. Hiding Multim. Signal Process. 9(4): 904-917 (2018) - [j41]Chin-Chen Chang, Tzu-Chuen Lu, Zhao-Hua Zhu, Hui Tian:
An Effective Authentication Scheme Using DCT for Mobile Devices. Symmetry 10(1): 13 (2018) - [j40]Jie Liu, Hui Tian, Chin-Chen Chang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry 10(8): 336 (2018) - [j39]Wenqi Chen, Hui Tian, Chin-Chen Chang, Fulin Nan, Jing Lu:
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 3471312:1-3471312:12 (2018) - [c20]Jing Lu, Yuxiang Chen, Hui Tian, Yonghong Chen, Tian Wang, Yiqiao Cai:
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. ICA3PP (Workshops) 2018: 185-191 - [c19]Changli Zhou, Tian Wang, Wenxian Jiang, Hui Tian:
Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks. TrustCom/BigDataSE 2018: 1316-1321 - [c18]Tian Wang, Hui Tian, Wenxian Jiang:
Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 828-833 - 2017
- [j38]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, Bineng Zhong:
Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access 5: 7692-7701 (2017) - [j37]Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang:
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc Sens. Wirel. Networks 37(1-4): 95-115 (2017) - [j36]Yiqiao Cai, Guo Sun, Tian Wang, Hui Tian, Yonghong Chen, Jiahai Wang:
Neighborhood-adaptive differential evolution for global numerical optimization. Appl. Soft Comput. 59: 659-706 (2017) - [j35]Tian Wang, Wenhua Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Interoperable localization for mobile group users. Comput. Commun. 105: 53-65 (2017) - [j34]Hui Tian, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen:
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation. IEEE Commun. Lett. 21(4): 749-752 (2017) - [j33]Tian Wang, Yang Li, Yonghong Chen, Hui Tian, Yiqiao Cai, Weijia Jia, Baowei Wang:
Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System. IEEE Commun. Lett. 21(11): 2532-2535 (2017) - [j32]Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 379: 160-176 (2017) - [j31]Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian:
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. KSII Trans. Internet Inf. Syst. 11(11): 5574-5591 (2017) - [j30]Hui Tian, Yuxiang Chen, Yongfeng Huang, Jing Lu:
云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession). 计算机科学 44(6): 8-16 (2017) - [j29]Hui Tian, Jun Sun, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate. Mob. Inf. Syst. 2017: 5418978:1-5418978:18 (2017) - [j28]Tian Wang, Qun Wu, Sheng Wen, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors 17(1): 139 (2017) - [j27]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu:
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134: 9-22 (2017) - [j26]Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu:
Distributed steganalysis of compressed speech. Soft Comput. 21(3): 795-804 (2017) - [j25]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang:
Enabling public auditability for operation behaviors in cloud storage. Soft Comput. 21(8): 2175-2187 (2017) - [j24]Yiqiao Cai, Meng Zhao, Jingliang Liao, Tian Wang, Hui Tian, Yonghong Chen:
Neighborhood guided differential evolution. Soft Comput. 21(16): 4769-4812 (2017) - [j23]Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu:
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 701-714 (2017) - [c17]Qun Wu, Tian Wang, Yiqiao Cai, Hui Tian, Yonghong Chen:
Rumor restraining based on propagation prediction with limited observations in large-scale social networks. ACSW 2017: 1:1-1:8 - [c16]Zhaoyi Chen, Hui Tian, Jing Lu, Wenqi Chen, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage. CSE/EUC (2) 2017: 51-57 - [c15]Zhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. CSE/EUC (1) 2017: 444-450 - 2016
- [j22]Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving differential evolution with a new selection method of parents for mutation. Frontiers Comput. Sci. 10(2): 246-269 (2016) - [j21]Yonghong Chen, Ning Zhang, Hui Tian, Tian Wang, Yiqiao Cai:
A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Commun. Lett. 20(12): 2414-2417 (2016) - [j20]Tian Wang, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen, Hui Tian, Junbin Liang, Bineng Zhong:
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(2): 5831471:1-5831471:11 (2016) - [j19]Jin Liu, Hui Tian, Jing Lu, Yonghong Chen:
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. J. Ambient Intell. Humaniz. Comput. 7(1): 139-147 (2016) - [j18]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks). 计算机科学 43(Z11): 393-397 (2016) - [j17]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol). 计算机科学 43(Z6): 353-356 (2016) - [j16]Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian:
Trends in modern information hiding: techniques, applications, and detection. Secur. Commun. Networks 9(8): 703-704 (2016) - [j15]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Networks 9(15): 2934-2944 (2016) - [j14]Yiqiao Cai, Jiahai Wang, Yonghong Chen, Tian Wang, Hui Tian, Wei Luo:
Adaptive direction information in differential evolution for numerical optimization. Soft Comput. 20(2): 465-494 (2016) - [j13]Jingliang Liao, Yiqiao Cai, Tian Wang, Hui Tian, Yonghong Chen:
Cellular direction information based differential evolution for numerical optimization: an empirical study. Soft Comput. 20(7): 2801-2827 (2016) - [c14]Zhaoyi Chen, Hui Tian, Jing Lu, Yiqiao Cai, Tian Wang, Yonghong Chen:
Operational-Behavior Auditing in Cloud Storage. CloudComp 2016: 162-172 - [c13]Xinling Kong, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen:
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. CyberC 2016: 42-45 - [c12]Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Hui Tian, Yonghong Chen:
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. SpaCCS Workshops 2016: 197-207 - 2015
- [j12]Tian Wang, Weijia Jia, Bineng Zhong, Hui Tian, Guoliang Zhang:
BlueCat: An Infrastructure-Free System for Relative Mobile Localization. Ad Hoc Sens. Wirel. Networks 29(1-4): 133-152 (2015) - [j11]Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j10]Hui Tian, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Improved adaptive partial-matching steganography for Voice over IP. Comput. Commun. 70: 95-108 (2015) - [j9]Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
A High-Capacity Covering Code for Voice-Over-IP Steganography. Int. J. Inf. Technol. Web Eng. 10(3): 46-63 (2015) - [j8]Hui Tian, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, Yiqiao Cai:
Optimal matrix embedding for Voice-over-IP steganography. Signal Process. 117: 33-43 (2015) - [c11]Jie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang:
An Efficient VoIP Steganography Based on Random Binary Matrix. 3PGCIC 2015: 462-465 - [c10]Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. ARES 2015: 455-460 - [c9]Tian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen, Hui Tian, Bineng Zhong:
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks. WASA 2015: 836-844 - 2014
- [j7]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian:
Network forensics and challenges for cybersecurity. Ann. des Télécommunications 69(7-8): 345-346 (2014) - [j6]Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai:
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. Ann. des Télécommunications 69(7-8): 461-473 (2014) - [j5]Hui Tian, Jin Liu, Songbin Li:
Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multim. Syst. 20(2): 143-154 (2014) - [c8]Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving Differential Evolution with Ring Topology-Based Mutation Operators. 3PGCIC 2014: 103-109 - [c7]Tian Wang, Zhen Peng, Yonghong Chen, Yiqiao Cai, Hui Tian:
Continuous tracking for mobile targets with mobility nodes in WSNs. SMARTCOMP 2014: 261-268 - 2013
- [j4]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian, Yali Liu:
Trends in modern information hiding: techniques, applications and detection. Secur. Commun. Networks 6(11): 1414-1415 (2013) - 2012
- [j3]Hui Tian, Hong Jiang, Ke Zhou, Dan Feng:
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography. Comput. J. 55(6): 702-716 (2012) - [j2]Hui Tian, Hong Jiang, Ke Zhou, Dan Feng:
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]. Comput. Commun. 35(2): 272 (2012) - [c6]Jin Liu, Ke Zhou, Hui Tian:
Least-significant-digit steganography in low bitrate speech. ICC 2012: 1133-1137 - [c5]Ke Zhou, Jin Liu, Hui Tian, Chun-hua Li:
State-based steganography in low bit rate speech. ACM Multimedia 2012: 1109-1112 - 2011
- [j1]Hui Tian, Hong Jiang, Ke Zhou, Dan Feng:
Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18): 2236-2247 (2011)
2000 – 2009
- 2009
- [c4]Hui Tian, Ke Zhou, Hong Jiang, Jin Liu, Yongfeng Huang, Dan Feng:
An M-Sequence Based Steganography Model for Voice over IP. ICC 2009: 1-5 - [c3]Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu, Dan Feng:
An Adaptive Steganography Scheme for Voice Over IP. ISCAS 2009: 2922-2925 - [c2]Hui Tian, Ke Zhou, Hong Jiang, Dan Feng:
Digital logic based encoding strategies for steganography on voice-over-IP. ACM Multimedia 2009: 777-780 - 2008
- [c1]Hui Tian, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu:
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. ICYCS 2008: 647-652
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint