


default search action
Guangjie Liu 0001
Person information
- affiliation: Nanjing University of Information Science and Technology, School of Electronics and Information Engineering, China
- affiliation (2016-2017): University of California at Davis (UCD), Department of Computer Science, CA, USA
- affiliation (PhD 2007): Nanjing University of Science and Technology, China
Other persons with the same name
- Guangjie Liu — disambiguation page
- Guangjie Liu 0002
— Yunnan Agricultural University, Kunming, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j75]Kai Chen, Jiangtao Zhai, Guangjie Liu, Li Yang, Yuewei Dai:
SSH-Pulse: Detecting SSH communication in tunneled traffic. Comput. Networks 275: 111897 (2026)
[j74]Fengyuan Nie
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Jianan Huang
, Chau Yuen
:
IoT-TSO: An Unsupervised Method for Classifying Malicious IoT Traffic via Tensor Self-Optimization. IEEE Trans. Netw. Sci. Eng. 13: 966-979 (2026)- 2025
[j73]Fengyuan Nie
, Guangjie Liu
, Weiwei Liu
, Jianan Huang
, Bo Gao
:
IoT-AMLHP: Aligned multimodal learning of header-payload representations for resource-efficient malicious IoT traffic classification. Ad Hoc Networks 178: 103916 (2025)
[j72]James Msughter Adeke
, Guangjie Liu
, Lord Amoah
, Ogonna Joshua Nwali
:
Investigating the impact of feature selection on adversarial transferability in intrusion detection system. Comput. Secur. 151: 104327 (2025)
[j71]Fengyuan Nie
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Jianan Huang
, Wen Tian
, Chau Yuen
:
Empowering Anomaly Detection in IoT Traffic Through Multiview Subspace Learning. IEEE Internet Things J. 12(11): 15911-15925 (2025)
[j70]Fengyuan Nie
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Jianan Huang
, Chau Yuen
:
Lightweight Identification of Malicious IoT Traffic via Cross-View Knowledge Distillation. IEEE Internet Things J. 12(20): 42337-42351 (2025)
[j69]Guangjie Liu, Yuqing Liu, Daming Cao, Huihui Ding:
Segmented RIS-assisted covert communication: Joint optimization of beamforming and phase configuration. Phys. Commun. 73: 102907 (2025)
[j68]Xin Sun
, Yining Xu
, Wen Tian
, Guangjie Liu
, Cunhua Pan
, Jinsheng Sun
:
Auction-Based Jammer Selection Strategy and Power Control in Vehicular Covert Communication. IEEE Trans. Commun. 73(12): 15942-15954 (2025)
[j67]Jianan Huang
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
:
QuicCourier: Leveraging the Dynamics of QUIC- Based Website Browsing Behaviors Through Proxy for Covert Communication. IEEE Trans. Dependable Secur. Comput. 22(5): 4516-4533 (2025)
[j66]Bo Gao
, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
, Jianan Huang
:
Multi-Level Resource-Coherented Graph Learning for Website Fingerprinting Attacks. IEEE Trans. Inf. Forensics Secur. 20: 693-708 (2025)
[j65]Jianan Huang
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
:
WF-A2D: Enhancing Privacy With Asymmetric Adversarial Defense Against Website Fingerprinting. IEEE Trans. Inf. Forensics Secur. 20: 4739-4754 (2025)
[j64]Jianan Huang
, Weiwei Liu
, Guangjie Liu
, Bo Gao
, Fengyuan Nie
, Marco Mellia
:
STAP: Leveraging State-Transition Adversarial Perturbations for Asymmetric Website Fingerprinting Defenses. IEEE Trans. Netw. Serv. Manag. 22(6): 6200-6214 (2025)
[j63]Wen Tian
, Hao Fan
, Guangjie Liu
, Miao Du
, Yinqiu Liu
, Dusit Niyato
, Zhu Han
:
Contract-Based Incentive Mechanisms for UAV Networks in Covert Communications. IEEE Trans. Veh. Technol. 74(5): 7378-7391 (2025)
[j62]Xin Sun
, Shihong Yin
, Wen Tian
, Guangjie Liu
, Shihao Yan
, Eduard A. Jorswieck
, Marco Di Renzo
:
Joint Transmit Probabilities Optimization for AoI-Constrained Covert Communications With Multiple Friendly Jammers. IEEE Wirel. Commun. Lett. 14(12): 3907-3911 (2025)
[i2]Fengyuan Nie, Guangjie Liu, Weiwei Liu, Jianan Huang, Bo Gao:
IoT-AMLHP: Aligned Multimodal Learning of Header-Payload Representations for Resource-Efficient Malicious IoT Traffic Classification. CoRR abs/2504.14833 (2025)- 2024
[j61]Jie Cheng
, Guangjie Liu
, Shen Gao, Ahmed Raza, Jiming Li, Wu Juan:
Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest. IEEE Access 12: 95196-95208 (2024)
[j60]Fengyuan Nie
, Weiwei Liu, Guangjie Liu, Bo Gao
:
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system. Internet Things 25: 101102 (2024)
[j59]Yunxiang Li
, Wen Tian
, Xiaopeng Ji
, Guangjie Liu
, Yuewei Dai
:
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures. IEEE Syst. J. 18(1): 692-701 (2024)
[j58]Bo Gao
, Weiwei Liu
, Guangjie Liu
, Fengyuan Nie
:
Resource Knowledge-Driven Heterogeneous Graph Learning for Website Fingerprinting. IEEE Trans. Cogn. Commun. Netw. 10(3): 968-981 (2024)
[j57]Wen Tian
, Jifei Du
, Xiaopeng Ji
, Miao Du
, Guangjie Liu
, Zhu Han
:
UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information. IEEE Trans. Wirel. Commun. 23(7): 6921-6937 (2024)
[c17]Junjie Zhao
, Sen Qiao
, Jinwei Wang
, Guangjie Liu
:
Generating Image Adversarial Example by Modifying JPEG Stream. CVDL 2024: 55:1-55:8
[c16]Hang Yang
, Youwen Li
, Tongqing Sun
, Shi Chen
, Jiangtao Zhai
, Guangjie Liu
:
A New Design of the Intelligent Lintel System for Platform Screen Doors. ICBAR 2024: 590-596- 2023
[j56]Faiz Ul Islam
, Guangjie Liu
, Weiwei Liu
, Qazi Mazhar ul Haq
:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. IET Inf. Secur. 17(2): 294-308 (2023)
[j55]Xufei Ding, Wen Tian, Guangjie Liu, Xiaopeng Ji
:
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks. Sensors 23(23): 9411 (2023)
[j54]Wen Tian
, Xufei Ding, Guangjie Liu
, Yuewei Dai, Zhu Han
:
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things. IEEE Trans. Green Commun. Netw. 7(4): 2025-2037 (2023)
[j53]Sen Qiao
, Daming Cao
, Qiaosheng Eric Zhang
, Yinfei Xu
, Guangjie Liu
:
Covert Communication Gains From Adversary's Uncertainty of Phase Angles. IEEE Trans. Inf. Forensics Secur. 18: 2899-2912 (2023)
[j52]Jifei Du
, Wen Tian
, Xiaopeng Ji
, Miao Du
, Guangjie Liu
, Yuewei Dai, Zhu Han
:
Strategic UAV-Assisted Game Model for Detection in Covert Communication. IEEE Trans. Veh. Technol. 72(6): 7426-7438 (2023)- 2022
[j51]Luhui Yang
, Guangjie Liu
, Jinwei Wang, Jiangtao Zhai, Yuewei Dai:
A semantic element representation model for malicious domain name detection. J. Inf. Secur. Appl. 66: 103148 (2022)
[i1]Sen Qiao, Daming Cao, Qiaosheng Eric Zhang, Yinfei Xu, Guangjie Liu:
Covert Communication Gains from Adversary's Uncertainty of Phase Angles. CoRR abs/2210.05084 (2022)- 2021
[j50]Faiz Ul Islam
, Guangjie Liu
, Jiangtao Zhai
, Weiwei Liu
:
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning. IEEE Access 9: 59783-59799 (2021)
[j49]Huiwen Bai
, Weiwei Liu
, Guangjie Liu
, Yuewei Dai
, Shuhua Huang
:
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information. IEEE Access 9: 80639-80653 (2021)
[j48]Shuhua Huang
, Weiwei Liu, Guangjie Liu
, Yuewei Dai, Huiwen Bai:
A correlation-based approach to detecting wireless physical covert channels. Comput. Commun. 176: 31-39 (2021)
[j47]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji
, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. Int. J. Digit. Crime Forensics 13(2): 115-133 (2021)
[j46]Wen Tian
, Miao Du
, Xiaopeng Ji
, Guangjie Liu
, Yuewei Dai
, Zhu Han
:
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game. IEEE Internet Things J. 8(24): 17372-17381 (2021)
[j45]Luhui Yang
, Guangjie Liu
, Jinwei Wang, Huiwen Bai
, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. J. Inf. Secur. Appl. 61: 102933 (2021)
[j44]Xiaopeng Ji
, Wen Tian, Weiwei Liu, Guangjie Liu:
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model. J. Ambient Intell. Humaniz. Comput. 12(9): 8859-8866 (2021)
[j43]Luhui Yang
, Guangjie Liu
, Weiwei Liu, Huiwen Bai
, Jiangtao Zhai
, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. Secur. Commun. Networks 2021: 5567635:1-5567635:20 (2021)
[j42]Huiwen Bai
, Guangjie Liu
, Weiwei Liu, Yingxue Quan, Shuhua Huang:
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection. Secur. Commun. Networks 2021: 5599556:1-5599556:17 (2021)
[j41]Wen Tian
, Miao Du
, Xiaopeng Ji
, Guangjie Liu
, Yuewei Dai
, Zhu Han
:
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure. IEEE Trans. Smart Grid 12(5): 4259-4268 (2021)- 2020
[j40]Wen Tian
, Xiaopeng Ji
, Weiwei Liu
, Guangjie Liu
, Jiangtao Zhai
, Yuewei Dai
, Shuhua Huang
:
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid. IEEE Access 8: 64075-64085 (2020)
[j39]Luhui Yang
, Guangjie Liu
, Yuewei Dai
, Jinwei Wang, Jiangtao Zhai
:
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework. IEEE Access 8: 82876-82889 (2020)
[j38]Shuhua Huang
, Xiaogeng Hou
, Weiwei Liu
, Guangjie Liu
, Yuewei Dai
, Wen Tian
:
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication. IEEE Access 8: 180341-180351 (2020)
[j37]Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Exploiting Correlation Characteristics to Detect Covert digital communication. KSII Trans. Internet Inf. Syst. 14(8): 3550-3566 (2020)
2010 – 2019
- 2019
[j36]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. KSII Trans. Internet Inf. Syst. 13(4): 1866-1883 (2019)
[j35]Yuewei Dai, Weiwei Liu
, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai:
An end-to-end generative network for environmental sound-based covert communication. Multim. Tools Appl. 78(7): 8635-8653 (2019)
[j34]Luhui Yang
, Jiangtao Zhai
, Weiwei Liu, Xiaopeng Ji
, Huiwen Bai
, Guangjie Liu, Yuewei Dai:
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis. Symmetry 11(2): 176 (2019)- 2018
[j33]Weiwei Liu
, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network. IEEE Access 6: 48030-48041 (2018)
[j32]Pengcheng Cao, Weiwei Liu
, Guangjie Liu
, Xiaopeng Ji
, Jiangtao Zhai
, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Networks 2018: 1214681:1-1214681:15 (2018)
[j31]Weiwei Liu
, Guangjie Liu
, Yang Xia, Xiaopeng Ji, Jiangtao Zhai
, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. Secur. Commun. Networks 2018: 5051270:1-5051270:16 (2018)
[c15]Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
A Comprehensive Analysis of Interval Based Network Flow Watermarking. ICCCS (4) 2018: 72-84
[c14]Luhui Yang
, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483- 2017
[c13]Hao Wang, Guangjie Liu, Weiwei Liu
, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. ICCCS (2) 2017: 357-368- 2016
[j30]Hao Wang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation. KSII Trans. Internet Inf. Syst. 10(4): 1927-1943 (2016)
[j29]Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. J. Inf. Hiding Multim. Signal Process. 7(5): 1041-1051 (2016)
[j28]Weiwei Liu
, Guangjie Liu, Yuewei Dai:
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy. Secur. Commun. Networks 9(8): 791-802 (2016)
[j27]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
Detecting JitterBug covert timing channel with sparse embedding. Secur. Commun. Networks 9(11): 1509-1519 (2016)
[j26]Weiwei Liu
, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Dipak Ghosal:
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation. IEEE Trans. Inf. Forensics Secur. 11(4): 677-690 (2016)
[c12]Weiwei Liu
, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. ICCCS (1) 2016: 166-177- 2015
[j25]Zhiyong Su
, Xin Yang, Guangjie Liu, Weiqing Li, Weiqing Tang:
Topology authentication for piping isometric drawings. Comput. Aided Des. 66: 33-44 (2015)
[j24]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
SkyLen: a Skype-based length covert channel. J. Inf. Hiding Multim. Signal Process. 6(3): 473-481 (2015)
[j23]Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Improving Reliability of Covert Timing Channel to Packet Loss. J. Inf. Hiding Multim. Signal Process. 6(3): 544-553 (2015)
[j22]Hao Wang, Guangjie Liu, Yuewei Dai, Jin Shi:
A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size. J. Inf. Hiding Multim. Signal Process. 6(4): 750-759 (2015)
[j21]Weiwei Jiang, Guangjie Liu, Yuewei Dai:
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort). 计算机科学 42(11): 212-216 (2015)
[j20]Yongfei Yang, Guangjie Liu, Yuewei Dai:
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network). 计算机科学 42(Z6): 388-392 (2015)
[j19]Weiwei Liu
, Guangjie Liu, Yuewei Dai:
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur. Commun. Networks 8(9): 1636-1647 (2015)
[c11]Hao Li, Guangjie Liu, Weiwei Jiang, Yuewei Dai:
Designing snort rules to detect abnormal DNP3 network data. ICCAIS 2015: 343-348- 2014
[j18]Weiwei Liu
, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. Ann. des Télécommunications 69(7-8): 403-416 (2014)
[j17]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity. J. Inf. Hiding Multim. Signal Process. 5(4): 769-777 (2014)
[j16]Lihua Zhang, Guangjie Liu, Yuewei Dai:
Network Packet Length Covert Channel Based on Empirical Distribution Function. J. Networks 9(6): 1440-1446 (2014)
[j15]Guangjie Liu, Weiwei Liu
, Yuewei Dai, Shiguo Lian:
Adaptive steganography based on block complexity and matrix embedding. Multim. Syst. 20(2): 227-238 (2014)
[j14]Zhiyong Su
, Lang Zhou, Guangjie Liu, Jianshou Kong, Yuewei Dai:
Authenticating topological integrity of process plant models through digital watermarking. Multim. Tools Appl. 73(3): 1687-1707 (2014)- 2013
[j13]Jiangtao Zhai
, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. J. Networks 8(1): 182-188 (2013)
[j12]Guangjie Liu, Junwen Wang, Shiguo Lian, Yuewei Dai:
Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57(11-12): 2647-2659 (2013)
[j11]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
Detection of TCP covert channel based on Markov model. Telecommun. Syst. 54(3): 333-343 (2013)- 2012
[j10]Guangjie Liu, Jiangtao Zhai
, Yuewei Dai:
Network covert timing channel with distribution matching. Telecommun. Syst. 49(2): 199-205 (2012)- 2011
[j9]Guangjie Liu, Weiwei Liu:
An adaptive matrix embedding based on LSB matching for grey-scale images. Int. J. Multim. Intell. Secur. 2(3/4): 238-251 (2011)
[j8]Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang:
A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 34(5): 1557-1565 (2011)- 2010
[j7]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Secure Multimedia Distribution Based on Watermarking and Encryption. J. Convergence Inf. Technol. 5(9): 279-286 (2010)
[j6]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. J. Digit. Content Technol. its Appl. 4(8): 34-42 (2010)
[j5]Guangjie Liu, Zhan Zhang, Yuewei Dai, Shiguo Lian:
Improved LSB-matching Steganography for Preserving Second-order Statistics. J. Multim. 5(5): 458-463 (2010)
2000 – 2009
- 2009
[j4]Jianwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu:
On the Design of Secure Multimedia Authentication. J. Univers. Comput. Sci. 15(2): 426-443 (2009)- 2008
[j3]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren:
Secure multimedia watermarking authentication in wavelet domain. J. Electronic Imaging 17(3): 033010 (2008)
[j2]Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang:
Efficient video encryption scheme based on advanced video coding. Multim. Tools Appl. 38(1): 75-89 (2008)
[j1]Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian:
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Process. 88(1): 117-130 (2008)
[c10]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Robust Hashing Based on Persistent Points for Video Copy Detection. CIS (1) 2008: 305-308
[c9]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao:
Forgery-location highway monitoring systembased on video watermarking. ICNSC 2008: 625-629
[c8]Yuewei Dai, Jinwei Wang, Guangjie Liu:
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion. ICNSC 2008: 911-915
[c7]Ming Bao, Yuewei Dai, Guangjie Liu:
Assessment of Integrated Electronic Information System survivability based on u-function. ICNSC 2008: 1837-1841- 2007
[c6]Guangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118
[c5]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
A RST-Resilient Watermarking Scheme Based on Invariant Features. SITIS 2007: 927-933- 2006
[c4]Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian:
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474
[c3]Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang:
Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278- 2005
[c2]Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang:
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979
[c1]Guangjie Liu, Yuewei Dai, Jinwei Wang, Zhiquan Wang, Shiguo Lian:
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming. MMSP 2005: 1-4
Coauthor Index
aka: Wen Tian

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-18 23:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







