default search action
Lina Wang 0001
Person information
- affiliation: Wuhan University, School of Cyber Science and Engineering, Hubei, China
- affiliation (PhD 1999): Northeastern University, Shenyang, China
Other persons with the same name
- Lina Wang — disambiguation page
- Lina Wang 0002 — University of Science and Technology, School of Computer and Communication Engineering, Beijing, China (and 1 more)
- Lina Wang 0003 — Beijing Aerospace Automatic Control Institute, National Key Laboratory of Science and Technology on Aerospace Intelligence Control, China
- Lina Wang 0004 — Southeast University, Nanjing, School of Economics and Management, Jiangsu, China
- Lina Wang 0005 — Hebei Finance University, School of Financial Technology, Baoding, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Xiaowen Liu, Geying Yang, Lina Wang, Jie Fu, Qinghao Wang:
A novel immune detector training method for network anomaly detection. Appl. Intell. 54(2): 2009-2030 (2024) - [j61]Geying Yang, Jinyu Wu, Lina Wang, Qinghao Wang, Xiaowen Liu, Jie Fu:
A novel fusion feature imageization with improved extreme learning machine for network anomaly detection. Appl. Intell. 54(19): 9313-9329 (2024) - [j60]Fangchao Yu, Lina Wang, Bo Zeng, Kai Zhao, Rongwei Yu:
Personalized and privacy-enhanced federated learning framework via knowledge distillation. Neurocomputing 575: 127290 (2024) - [j59]Zhi Pang, Lina Wang, Fangchao Yu, Kai Zhao, Bo Zeng:
StreamliNet: Cost-aware layer-wise neural network linearization for fast and accurate private inference. Inf. Sci. 667: 120463 (2024) - [j58]Fangchao Yu, Lina Wang, Bo Zeng, Kai Zhao, Tian Wu, Zhi Pang:
SIA: A sustainable inference attack framework in split learning. Neural Networks 171: 396-409 (2024) - [j57]Ju Jia, Siqi Ma, Lina Wang, Yang Liu, Robert H. Deng:
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services. IEEE Trans. Computers 73(1): 58-72 (2024) - [j56]Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 59-73 (2024) - [c46]Fangchao Yu, Bo Zeng, Kai Zhao, Zhi Pang, Lina Wang:
Chronic Poisoning: Backdoor Attack against Split Learning. AAAI 2024: 16531-16538 - [c45]Mengjie Wu, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang, Lina Wang:
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. AAAI 2024: 19965-19973 - [c44]Yifei Zeng, Kai Zhao, Fangchao Yu, Bo Zeng, Zhi Pang, Lina Wang:
FedGR: Genetic Algorithm and Relay Strategy Based Federated Learning. CSCWD 2024: 2203-2208 - [c43]Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, Lina Wang:
AdvShadow: Evading DeepFake Detection via Adversarial Shadow Attack. ICASSP 2024: 4640-4644 - [c42]Yizhan Li, Rongwei Yu, Junjie Shi, Lina Wang:
Diff-HOD: Diffusion Model for Object Detection in Hazy Weather Conditions. ICASSP 2024: 6285-6289 - 2023
- [j55]Geying Yang, Lina Wang, Rongwei Yu, Junjiang He, Bo Zeng, Tian Wu:
A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection. Int. J. Intell. Syst. 2023: 1-23 (2023) - [j54]Jianpeng Ke, Lina Wang:
DF-UDetector: An effective method towards robust deepfake detection via feature restoration. Neural Networks 160: 216-226 (2023) - [j53]Fangchao Yu, Lina Wang, Bo Zeng, Kai Zhao, Zhi Pang, Tian Wu:
How to backdoor split learning. Neural Networks 168: 326-336 (2023) - [j52]Geying Yang, Junjiang He, Lina Wang, Bo Zeng, Tian Wu:
A novel multi-objective immunization algorithm based on dynamic variation distance. Swarm Evol. Comput. 83: 101391 (2023) - [j51]Yanzhen Ren, Dengkai Liu, Chenyu Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. IEEE Trans. Dependable Secur. Comput. 20(1): 665-679 (2023) - [j50]Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming:
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis. IEEE Trans. Dependable Secur. Comput. 20(2): 917-930 (2023) - [j49]Wenqi Wang, Run Wang, Lina Wang, Zhibo Wang, Aoshuang Ye:
Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey. IEEE Trans. Knowl. Data Eng. 35(3): 3159-3179 (2023) - [j48]Ju Jia, Meng Luo, Siqi Ma, Lina Wang, Yang Liu:
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis. IEEE Trans. Knowl. Data Eng. 35(6): 5665-5679 (2023) - [j47]Jie Fu, Lina Wang, Jianpeng Ke, Kang Yang, Rongwei Yu:
GANAD: A GAN-based method for network anomaly detection. World Wide Web (WWW) 26(5): 2727-2748 (2023) - [c41]Peng Qin, Tong Zhang, Canming Fang, Lina Wang:
BBAC: Blockchain-Based Access Control Scheme for EHRs with Data Sharing Support. ADMA (5) 2023: 482-494 - [c40]Sida Luo, Fangchao Yu, Lina Wang, Bo Zeng, Zhi Pang, Kai Zhao:
Feature Sniffer: A Stealthy Inference Attacks Framework on Split Learning. ICANN (7) 2023: 66-77 - [c39]Qinghao Wang, Geying Yang, Lina Wang, Jie Fu, Xiaowen Liu:
SR-IDS: A Novel Network Intrusion Detection System Based on Self-taught Learning and Representation Learning. ICANN (3) 2023: 554-565 - [c38]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks. ICCV 2023: 4986-4996 - [c37]Bo Zeng, Kunhao Lai, Jianpeng Ke, Fangchao Yu, Lina Wang:
PatchFinger: A Model Fingerprinting Scheme Based on Adversarial Patch. ICONIP (2) 2023: 68-80 - [c36]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Wenhui Zhang, Liming Fang, Jing Chen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. ACM Multimedia 2023: 8463-8474 - [c35]Yanzhen Ren, Hongcheng Zhu, Liming Zhai, Zongkun Sun, Rubing Shen, Lina Wang:
Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion. ACM Multimedia 2023: 8674-8685 - [i11]Yanzhen Ren, Hongcheng Zhu, Liming Zhai, Zongkun Sun, Rubing Shen, Lina Wang:
Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion. CoRR abs/2305.05152 (2023) - [i10]Dongyu Yao, Boheng Li, Run Wang, Lina Wang:
Dual-level Interaction for Domain Adaptive Semantic Segmentation. CoRR abs/2307.07972 (2023) - [i9]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network. CoRR abs/2307.15860 (2023) - 2022
- [j46]Wenqi Wang, Lina Wang, Run Wang, Aoshuang Ye, Jianpeng Ke:
Better constraints of imperceptibility, better adversarial examples in the text. Int. J. Intell. Syst. 37(6): 3440-3459 (2022) - [j45]Tian Wu, Weixiang Ren, Dewei Li, Lina Wang, Ju Jia:
JPEG steganalysis based on denoising network and attention module. Int. J. Intell. Syst. 37(8): 5011-5030 (2022) - [j44]Tian Wu, Lina Wang, Liming Zhai, Canming Fang, Mingcheng Zhang:
Progressive selection-channel networks for image steganalysis. Int. J. Intell. Syst. 37(10): 7444-7458 (2022) - [j43]Aoshuang Ye, Lina Wang, Lei Zhao, Jianpeng Ke:
Ex2: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks. Int. J. Intell. Syst. 37(12): 11966-11984 (2022) - [j42]Weijie Liu, Ximeng Liu, Zhi Li, Bin Liu, Rongwei Yu, Lina Wang:
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection. IEEE Trans. Inf. Forensics Secur. 17: 2311-2323 (2022) - [j41]Ju Jia, Meng Luo, Siqi Ma, Lina Wang:
Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning. IEEE Trans. Ind. Informatics 18(11): 7463-7474 (2022) - [j40]Ju Jia, Liming Zhai, Weixiang Ren, Lina Wang, Yanzhen Ren:
An Effective Imbalanced JPEG Steganalysis Scheme Based on Adaptive Cost-Sensitive Feature Learning. IEEE Trans. Knowl. Data Eng. 34(3): 1038-1052 (2022) - [j39]Ju Jia, Meng Luo, Jinshuo Liu, Weixiang Ren, Lina Wang:
Multiperspective Progressive Structure Adaptation for JPEG Steganography Detection Across Domains. IEEE Trans. Neural Networks Learn. Syst. 33(8): 3660-3674 (2022) - [c34]Qi Wang, Wenxin Li, Kang Yang, Yiru Zhao, Lei Zhao, Lina Wang:
Efficient DNN Backdoor Detection Guided by Static Weight Analysis. Inscrypt 2022: 408-428 - [c33]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. IJCAI 2022: 761-767 - [c32]Kang Yang, Run Wang, Lina Wang:
MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training. IJCAI 2022: 776-782 - [c31]Jianpeng Ke, Lina Wang, Aoshuang Ye, Jie Fu:
Combating Multi-level Adversarial Text with Pruning based Adversarial Training. IJCNN 2022: 1-8 - [c30]Zhengwu Luo, Lina Wang, Run Wang, Kang Yang, Aoshuang Ye:
Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization. IJCNN 2022: 1-8 - [c29]Aoshuang Ye, Lina Wang, Lei Zhao, Jianpeng Ke:
DANCe: Dynamic Adaptive Neuron Coverage for Fuzzing Deep Neural Networks. IJCNN 2022: 1-8 - [c28]Run Wang, Haoxuan Li, Lingzhou Mu, Jixing Ren, Shangwei Guo, Li Liu, Liming Fang, Jing Chen, Lina Wang:
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations? ACM Multimedia 2022: 1808-1818 - [i8]Yanzhen Ren, Ting Liu, Liming Zhai, Lina Wang:
Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks. CoRR abs/2201.07444 (2022) - [i7]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. CoRR abs/2206.00477 (2022) - [i6]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - 2021
- [j38]Wenqi Wang, Run Wang, Jianpeng Ke, Lina Wang:
TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification. IEEE Access 9: 27467-27475 (2021) - [j37]Aoshuang Ye, Lina Wang, Run Wang, Wenqi Wang, Jianpeng Ke, Danlei Wang:
An End-to-End Rumor Detection Model Based on Feature Aggregation. Complex. 2021: 6659430:1-6659430:16 (2021) - [j36]Aoshuang Ye, Lina Wang, Lei Zhao, Jianpeng Ke, Wenqi Wang, Qinliang Liu:
RapidFuzz: Accelerating fuzzing via Generative Adversarial Networks. Neurocomputing 460: 195-204 (2021) - [j35]Yanzhen Ren, Sen Cai, Lina Wang:
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD). J. Inf. Secur. Appl. 59: 102863 (2021) - [j34]Xiaoke Zhu, Xiao-Yuan Jing, Di Wu, Zhenyu He, Jicheng Cao, Dong Yue, Lina Wang:
Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service Recommendation. IEEE Trans. Serv. Comput. 14(3): 889-902 (2021) - [c27]Wenxin Li, Qi Wang, Run Wang, Lei Zhao, Lina Wang:
Exposing DeepFakes via Localizing the Manipulated Artifacts. ICICS (2) 2021: 3-20 - [c26]Yanzhen Ren, Wuyang Liu, Dengkai Liu, Lina Wang:
Recalibrated Bandpass Filtering On Temporal Waveform For Audio Spoof Detection. ICIP 2021: 3907-3911 - [c25]Zhengwu Luo, Lina Wang, Wenqi Wang, Aoshuang Ye:
Annealing Attention Networks for User Feature-Based Rumor Early Detection on Weibo. IJCNN 2021: 1-8 - [c24]Yanzhen Ren, Yiwen Liu, Lina Wang:
Using Contrastive Learning to Improve the Performance of Steganalysis Schemes. IWDW 2021: 212-226 - [c23]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. ACM Multimedia 2021: 3546-3555 - [c22]Zhengwei Ren, Xiaoshuang Chen, Jinshan Tang, Lina Wang, Yan Tong, Shiwei Xu:
Limited Times of Data Access Based on SGX in Cloud Storage. SMC 2021: 3146-3151 - [i5]Yanzhen Ren, Yiwen Liu, Lina Wang:
Using contrastive learning to improve the performance of steganalysis schemes. CoRR abs/2103.00891 (2021) - [i4]Liming Zhai, Lina Wang, Yanzhen Ren, Yang Liu:
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain. CoRR abs/2112.11729 (2021) - 2020
- [j33]Weixiang Ren, Liming Zhai, Ju Jia, Lina Wang, Lefei Zhang:
Learning selection channels for image steganalysis in spatial domain. Neurocomputing 401: 78-90 (2020) - [j32]Ju Jia, Liming Zhai, Weixiang Ren, Lina Wang, Yanzhen Ren, Lefei Zhang:
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis. Pattern Recognit. 100: 107105 (2020) - [j31]Fei Wu, Xiao-Yuan Jing, Xiwei Dong, Ruimin Hu, Dong Yue, Lina Wang, Yi-mu Ji, Ruchuan Wang, Guoliang Chen:
Intraspectrum Discrimination and Interspectrum Correlation Analysis Deep Network for Multispectral Face Recognition. IEEE Trans. Cybern. 50(3): 1009-1022 (2020) - [j30]Liming Zhai, Lina Wang, Yanzhen Ren:
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. IEEE Trans. Inf. Forensics Secur. 15: 1762-1777 (2020) - [j29]Run Wang, Zhibo Wang, Benxiao Tang, Lei Zhao, Lina Wang:
SmartPI: Understanding Permission Implications of Android Apps from User Reviews. IEEE Trans. Mob. Comput. 19(12): 2933-2945 (2020) - [c21]Yanzhen Ren, Shan Zhong, Weiping Tu, Lina Wang:
A Secure Opus Pulse Steganographic Scheme Based on Message Transform. APSIPA 2020: 1331-1339 - [c20]Lina Wang, Wenqi Wang, Tong Chen, Jianpeng Ke, Benxiao Tang:
Deep Attention Model with Multiple Features for Rumor Identification. FCS 2020: 65-82 - [c19]Lina Wang, Kang Yang, Wenqi Wang, Run Wang, Aoshuang Ye:
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm. ACM Multimedia 2020: 2229-2236 - [i3]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. CoRR abs/2009.09869 (2020)
2010 – 2019
- 2019
- [j28]Ju Jia, Zhaoxia Xiang, Lina Wang, Yan Xu:
An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution. IEEE Access 7: 119506-119518 (2019) - [j27]Yanzhen Ren, Dengkai Liu, Jing Yang, Lina Wang:
An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech. Multim. Tools Appl. 78(7): 8091-8111 (2019) - [j26]Cheng Tan, Qian Wang, Lina Wang, Lei Zhao:
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions. IEEE Netw. 33(2): 174-180 (2019) - [j25]Lina Wang, Yibo Xu, Liming Zhai, Yanzhen Ren, Bo Du:
A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability. Pattern Recognit. 87: 106-117 (2019) - [j24]Yanzhen Ren, Hanyi Yang, Hongxia Wu, Weiping Tu, Lina Wang:
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model. IEEE Trans. Inf. Forensics Secur. 14(10): 2649-2661 (2019) - [c18]Liming Zhai, Lina Wang, Yanzhen Ren:
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors. ICME 2019: 1402-1407 - [c17]Yubo Lu, Liming Zhai, Lina Wang:
Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction. IWDW 2019: 268-280 - [i2]Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram. CoRR abs/1901.06838 (2019) - [i1]Wenqi Wang, Benxiao Tang, Run Wang, Lina Wang, Aoshuang Ye:
A survey on Adversarial Attacks and Defenses in Text. CoRR abs/1902.07285 (2019) - 2018
- [j23]Yanzhen Ren, Hongxia Wu, Lina Wang:
An AMR adaptive steganography algorithm based on minimizing distortion. Multim. Tools Appl. 77(10): 12095-12110 (2018) - [j22]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen:
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 1621-1631 (2018) - [j21]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Trans. Dependable Secur. Comput. 15(4): 633-645 (2018) - [j20]Zhengwei Ren, Lina Wang, Qian Wang, Mingdi Xu:
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems. IEEE Trans. Serv. Comput. 11(4): 685-698 (2018) - [j19]Benxiao Tang, Zhibo Wang, Run Wang, Lei Zhao, Lina Wang:
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference. Wirel. Commun. Mob. Comput. 2018: 4627108:1-4627108:19 (2018) - [c16]Yanzhen Ren, Weiman Zheng, Lina Wang:
SILK Steganography Scheme Based on the Distribution of LSF Parameter. APSIPA 2018: 539-548 - [c15]Chenyi Qiang, Weijie Liu, Lina Wang, Rongwei Yu:
Controlled Channel Attack Detection Based on Hardware Virtualization. ICA3PP (1) 2018: 406-420 - 2017
- [j18]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo:
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314: 31-43 (2017) - [j17]Debiao He, Huaqun Wang, Jianhong Zhang, Lina Wang:
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 375: 48-53 (2017) - [j16]Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang:
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. J. Syst. Softw. 124: 153-168 (2017) - [j15]Debiao He, Huaqun Wang, Lina Wang, Jian Shen, Xianzhao Yang:
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput. 21(22): 6801-6810 (2017) - [j14]Yanzhen Ren, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. IEEE Trans. Inf. Forensics Secur. 12(6): 1345-1357 (2017) - [j13]Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang:
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 16(6): 1530-1543 (2017) - [c14]Liming Zhai, Lina Wang, Yanzhen Ren:
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC. IH&MMSec 2017: 135-146 - [c13]Yanzhen Ren, Qiaochu Xiong, Lina Wang:
A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. IWDW 2017: 217-231 - 2016
- [j12]Jing Chen, Kun He, Quan Yuan, Ruiying Du, Lina Wang, Jie Wu:
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks. Comput. Networks 105: 194-206 (2016) - [j11]Debiao He, Huaqun Wang, Muhammad Khurram Khan, Lina Wang:
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14): 1795-1802 (2016) - [j10]Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. Int. J. Commun. Syst. 29(1): 155-169 (2016) - [j9]Hao Zhang, Lina Wang, Cheng Tan, Weijie Liu:
云环境下APT攻击的防御方法综述 (Review of Defense Methods Against Advanced Persistent Threat in Cloud Environment). 计算机科学 43(3): 1-7 (2016) - [j8]Mengleng Liu, Xiaoshuang Yang, Lei Zhao, Lina Wang:
面向软件错误定位与理解的测试执行离散特征筛选 (Discrete Characteristic-based Test Execution Selection for Software Fault Localization and Understanding). 计算机科学 43(3): 179-187 (2016) - [j7]Yanzhen Ren, Mengdi Fan, Dengpan Ye, Jing Yang, Lina Wang:
Detection of double MP3 compression Based on Difference of Calibration Histogram. Multim. Tools Appl. 75(21): 13855-13870 (2016) - [j6]Jing Chen, Lihong Zhang, Kun He, Min Chen, Ruiying Du, Lina Wang:
Message-locked proof of ownership and retrievability with remote repairing in cloud. Secur. Commun. Networks 9(16): 3452-3466 (2016) - [j5]Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao:
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Secur. Commun. Networks 9(16): 3543-3557 (2016) - [c12]Yanzhen Ren, Qiaochu Xiong, Lina Wang:
Steganalysis of AAC using calibrated Markov model of adjacent codebook. ICASSP 2016: 2139-2143 - 2015
- [j4]Yanzhen Ren, Tingting Cai, Ming Tang, Lina Wang:
AMR Steganalysis Based on the Probability of Same Pulse Position. IEEE Trans. Inf. Forensics Secur. 10(9): 1801-1811 (2015) - [c11]Xiaoshuang Yang, Mengleng Liu, Ming Cao, Lei Zhao, Lina Wang:
Regression Identification of Coincidental Correctness via Weighted Clustering. COMPSAC 2015: 115-120 - [c10]Lei Zhao, Run Wang, Lina Wang, Yueqiang Cheng:
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis. COMPSAC 2015: 434-443 - 2014
- [c9]Yanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu:
Video steganalysis based on subtractive probability of optimal matching feature. IH&MMSec 2014: 83-90 - [c8]Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu:
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud. TrustCom 2014: 943-948 - 2013
- [j3]Lei Zhao, Zhenyu Zhang, Lina Wang, Xiaodan Yin:
A Fault Localization Framework to Alleviate the Impact of Execution Similarity. Int. J. Softw. Eng. Knowl. Eng. 23(7): 963-998 (2013) - 2012
- [c7]Lei Zhao, Debin Gao, Lina Wang:
Learning Fine-Grained Structured Input for Memory Corruption Detection. ISC 2012: 151-167 - 2011
- [j2]Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng:
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method. Int. J. Comput. Intell. Syst. 4(5): 777-787 (2011) - [j1]Lei Zhao, Lina Wang, Xiaodan Yin:
Context-Aware Fault Localization via Control Flow Analysis. J. Softw. 6(10): 1977-1984 (2011) - [c6]Lei Zhao, Zhenyu Zhang, Lina Wang, Xiaodan Yin:
PAFL: Fault Localization via Noise Reduction on Coverage Vector. SEKE 2011: 203-206 - [c5]Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin:
Statistical Fault Localization via Semi-dynamic Program Slicing. TrustCom 2011: 695-700 - [c4]Xiaoguang Niu, Chuanbo Wei, Lina Wang:
The Design of a Wireless Sensor Network for Seismic-Observation-Environment Surveillance. WASA 2011: 157-167 - 2010
- [c3]Lei Zhao, Lina Wang, Zuoting Xiong, Dongming Gao:
Execution-Aware Fault Localization Based on the Control Flow Analysis. ICICA (LNCS) 2010: 158-165
2000 – 2009
- 2008
- [c2]Chi Guo, Lina Wang, Lainv Huang, Lei Zhao:
Study on the Internet Behavior's Activity Oriented to Network Survivability. CIS (1) 2008: 432-435 - [c1]Chi Guo, Lei Zhao, Lina Wang, Zhejun Fang:
A Secure Network Admission and Routing Model Based on Trust Theory. ICYCS 2008: 2216-2221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint