Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Bingwen Feng"'
Publikováno v:
IET Image Processing. 17:2097-2112
Publikováno v:
IEEE Transactions on Communications. 71:370-380
Publikováno v:
Journal of Visual Communication and Image Representation. 93:103808
Publikováno v:
Journal of Computer and Communications. :35-56
Trajectory data set is the indispensable foundation for constructing reliable Internet of Vehicles (IoV) service and location-based service (LBS), while it is likely to be abused by malicious attackers to infer user’s privacy. In this paper, we pro
Publikováno v:
IEEE Internet of Things Journal. 7:4028-4048
Vehicular ad-hoc networks (VANETs) have recently attracted considerable attention from both industry and academia for improving road safety and traffic efficiency. Trust modeling plays a significant role in VANETs, however, the existing trust models
Publikováno v:
Signal Processing: Image Communication. 111:116894
Publikováno v:
Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications.
Publikováno v:
2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).
The explosive growth of video data application raises the risk of privacy leaks in the video big data environment. Compared with other data formats, video big data presents special characteristics including various representation, high dimension, com
Publikováno v:
IEEE Transactions on Circuits and Systems for Video Technology. 29:1608-1618
Some state-of-the-art binary image steganographic methods aim to generate stego images with good visual quality, while others focus more on the statistical security of the anti-steganalysis. This paper proposes a binary steganographic scheme that imp
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Software vulnerabilities are one of the important reasons for network intrusion. It is vital to detect and fix vulnerabilities in a timely manner. Existing vulnerability detection methods usually rely on single code models, which may miss some vulner