Zobrazeno 1 - 10
of 266
pro vyhledávání: '"Fenlin LIU"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract Message passing neural networks such as graph convolutional networks (GCN) can jointly consider various types of features for social bot detection. However, the expressive power of GCN is upper-bounded by the 1st-order Weisfeiler–Leman iso
Externí odkaz:
https://doaj.org/article/34656899a4e44c71b8789e1ca9f0fbf1
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-15 (2023)
Abstract Vital node discovery is a hotspot in network topology research. The key is using the Internet’s routing characteristics to remove noisy paths and accurately describe the network topology. In this manuscript, a vital regional routing nodes
Externí odkaz:
https://doaj.org/article/c5b2e05604764dcfb6e87ef5c7b953f6
Publikováno v:
网络与信息安全学报, Vol 9, Pp 38-48 (2023)
To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborho
Externí odkaz:
https://doaj.org/article/73ce4551700049408c9505da7b7f5caa
Publikováno v:
IET Image Processing, Vol 16, Iss 10, Pp 2652-2664 (2022)
Abstract To address the security risk caused by fixed offset mapping and the limited recoverability of random mapping used in image watermarking, a self‐embedding fragile image watermarking algorithm based on deneighbourhood mapping are proposed. F
Externí odkaz:
https://doaj.org/article/36175edb911a48f190ee8157c4e741ee
Publikováno v:
Digital Communications and Networks, Vol 8, Iss 4, Pp 455-465 (2022)
Privacy protection is the key to maintaining the Internet of Things (IoT) communication strategy. Steganography is an important way to achieve covert communication that protects user data privacy. Steganalysis technology is the key to checking stegan
Externí odkaz:
https://doaj.org/article/f437b8d0e2324db1b859e510e2232eed
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5341 (2023)
Worries about the increasing number of Sybils in online social networks (OSNs) are amplified by a range of security issues; thus, Sybil detection has become an urgent real-world problem. Lightweight and limited data-friendly, LBP (Loopy Belief Propag
Externí odkaz:
https://doaj.org/article/af88589926e946d5852bc2277e08f0e8
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2023, Iss 1, Pp 1-1 (2023)
Externí odkaz:
https://doaj.org/article/9fad811ad4ce42438362923b79f6d220
Publikováno v:
网络与信息安全学报, Vol 6, Pp 77-94 (2020)
In order to accurately and efficiently perform alias resolution on interface IP and support IP geolocation,a large-scale network alias resolution algorithm (MLAR) was proposed.Based on the statistical differences in delays,paths,Whois,etc.between ali
Externí odkaz:
https://doaj.org/article/cfe3ba37be104d95a1b5d97752b8b1ca
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2020, Iss 1, Pp 1-10 (2020)
Abstract Geolocation of covert communication entity is significantly important for the forensics of the crime but has significant challenges when the steganalyst locks the guilty actor IP and wants to know the physical location of the actor. This kin
Externí odkaz:
https://doaj.org/article/36a725c3d7c146f4b32bc697347d3768
Autor:
Zhaorui Ma, Xinhao Hu, Shicheng Zhang, Na Li, Fenlin Liu, Qinglei Zhou, Hongjian Wang, Guangwu Hu, Qilin Dong
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 754 (2023)
IPv6 geolocation is necessary for many location-based Internet services. However, the accuracy of the current IPv6 geolocation methods including machine-learning-based or deep-learning-based location algorithms are unsatisfactory for users. Strong ge
Externí odkaz:
https://doaj.org/article/d5b588e5fb7f447e9faed0f6ca7cb714