[1] |
Fu Zhangjie, Li Enlu, Cheng Xu, Huang Yongfeng, Hu Yuting.
Recent Advances in Image Steganography Based on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(3): 548-568.
|
[2] |
Wu Junqi, Zhai Liming, Wang Lina, Fang Canming, Wu Tian.
Enhancing Spatial Steganographic Algorithm Based on Multi-Scale Filters
[J]. Journal of Computer Research and Development, 2020, 57(11): 2251-2259.
|
[3] |
Ding Xuyang, Xie Ying, Zhang Xiaosong.
Evolutionary Multi-Objective Optimization Image Steganography Based on Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(11): 2260-2270.
|
[4] |
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli.
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327.
|
[5] |
Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju.
Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network
[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261.
|
[6] |
Gao Zhanzhan, Tang Guangming, Wang Shuo.
A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding
[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863.
|
[7] |
Han Tao1,2, Zhu Yuefei1,2, Lin Sisi3, and Wu Yang1,2.
Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
[J]. 计算机研究与发展, 2014, 51(7): 1467-1475.
|
[8] |
Xiong Gang, Ping Xijian, Zhang Tao, and Li Kan.
Steganalysis of LSB Matching Based on the Measurement of the Region Randomness
[J]. , 2013, 50(5): 942-950.
|
[9] |
Qi Ke, and Xie Dongqing.
Steganalysis of Color Images Based on Noise Model and Channels Integration
[J]. , 2013, 50(2): 307-318.
|
[10] |
Huang Liang, Feng Dengguo, Lian Yifeng, and Chen Kai.
Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation
[J]. , 2013, 50(10): 2100-2108.
|
[11] |
Li Chao, Tian Xinguang, Xiao Xi, and Duan Miyi,.
Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
[J]. , 2012, 49(9): 1982-1990.
|
[12] |
Zhang Zhan, Liu Guangjie, Dai Yuewei, and Wang Zhiquan.
A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model
[J]. , 2012, 49(8): 1668-1675.
|
[13] |
Yang Chunfang, Liu Fenlin, and Luo Xiangyang.
Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy
[J]. , 2011, 48(8): 1563-1569.
|
[14] |
Qian Yuwen, Zhao Bangxin, Kong Jianshou, and Wang Zhiquan.
Robust Covert Timing Channel Based on Web
[J]. , 2011, 48(3): 423-431.
|
[15] |
Zhong Hua,Yang Xiaoming, and Jiao Licheng.
Texture Classification Based on Multiresolution Co-occurrence Matrix
[J]. , 2011, 48(11): 1991-1999.
|