default search action
Fengyong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j51]Lin Huang
, Fengyong Li, Heng Yao
, Chuan Qin
, Xinpeng Zhang:
Soft integrity authentication for neural network models. Expert Syst. Appl. 267: 126172 (2025) - [j50]Fengyong Li
, Longwei Li, Yishu Zeng, Jiang Yu, Chuan Qin:
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement. Multim. Tools Appl. 84(9): 5793-5823 (2025) - [j49]Fengyong Li
, Qiankuan Wang, Xinpeng Zhang, Chuan Qin
:
Adaptive three-dimensional histogram modification for JPEG reversible data hiding. Signal Process. 229: 109786 (2025) - [j48]Yun Chen
, Hang Cheng
, Haichou Wang
, Ximeng Liu
, Fei Chen
, Fengyong Li
, Xinpeng Zhang
, Meiqing Wang
:
EAN: Edge-Aware Network for Image Manipulation Localization. IEEE Trans. Circuits Syst. Video Technol. 35(2): 1591-1601 (2025) - 2024
- [j47]Daidou Guo, Xuan Zhu, Fengyong Li, Heng Yao, Chuan Qin
:
DoBMark: A double-branch network for screen-shooting resilient image watermarking. Expert Syst. Appl. 246: 123159 (2024) - [j46]Fang Cao, Jing Chen, Fengyong Li
:
Texture driven adaptive multi-level block selection based reversible data hiding in encrypted image. Multim. Tools Appl. 83(15): 44857-44878 (2024) - [j45]Hang Cheng
, Xibin Li
, Huaxiong Wang
, Xinpeng Zhang
, Ximeng Liu
, Meiqing Wang
, Fengyong Li
:
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models. IEEE Trans. Circuits Syst. Video Technol. 34(1): 97-109 (2024) - [j44]Fengyong Li
, Zhen Qi, Xinpeng Zhang
, Chuan Qin
:
Progressive Histogram Modification for JPEG Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 34(2): 1241-1254 (2024) - [j43]Jiang Yu
, Fengyong Li
, Zichi Wang
, Wen Si
, Xinpeng Zhang
:
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7785-7800 (2024) - [j42]Jiang Yu
, Jing Zhang, Zichi Wang
, Fengyong Li
, Xinpeng Zhang
:
Cover Selection in Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13626-13641 (2024) - [j41]Fengyong Li
, Zongliang Yu
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. IEEE Trans. Dependable Secur. Comput. 21(4): 1557-1571 (2024) - [j40]Fengyong Li
, Yang Sheng
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. IEEE Trans. Inf. Forensics Secur. 19: 8817-8831 (2024) - [j39]Fengyong Li
, Huajun Zhai
, Xinpeng Zhang
, Chuan Qin
:
Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j38]Chuan Qin
, Xiaomeng Li, Zhenyi Zhang, Fengyong Li
, Xinpeng Zhang
, Guorui Feng
:
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Trans. Multim. 26: 2164-2177 (2024) - [j37]Fengyong Li
, Yang Sheng
, Xinpeng Zhang
, Chuan Qin
:
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography. IEEE Trans. Multim. 26: 3137-3152 (2024) - [j36]Fengyong Li
, Huajun Zhai
, Teng Liu
, Xinpeng Zhang
, Chuan Qin
:
Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network. ACM Trans. Multim. Comput. Commun. Appl. 20(10): 315:1-315:23 (2024) - [j35]Xiangjing Su
, Chao Deng
, Jiajia Yang
, Fengyong Li
, Chaojie Li
, Yang Fu
, Zhao Yang Dong
:
DAMGAT-Based Interpretable Detection of False Data Injection Attacks in Smart Grids. IEEE Trans. Smart Grid 15(4): 4182-4195 (2024) - 2023
- [j34]Gejian Zhao, Fengyong Li, Heng Yao, Chuan Qin
:
TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication. J. Vis. Commun. Image Represent. 96: 103913 (2023) - [j33]Fengyong Li
, Hengjie Zhu, Chuan Qin
:
Reversible data hiding in encrypted images using median prediction and bit plane cycling-XOR. Multim. Tools Appl. 82(4): 6013-6032 (2023) - [j32]Jiang Yu, Xiaoyi Zhou, Wen Si, Fengyong Li
, Cong Liu, Xinpeng Zhang:
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2. Symmetry 15(5): 979 (2023) - [j31]Yi Wu
, Qiankuan Wang, Naiwang Guo, Yingjie Tian, Fengyong Li
, Xiangjing Su:
Efficient Multi-Source Self-Attention Data Fusion for FDIA Detection in Smart Grid. Symmetry 15(5): 1019 (2023) - [j30]Yi Wu
, Tong Zu, Naiwang Guo, Zheng Zhu, Fengyong Li
:
Laplace-Domain Hybrid Distribution Model Based FDIA Attack Sample Generation in Smart Grids. Symmetry 15(9): 1669 (2023) - [j29]Chuan Qin
, Jinchuan Hu
, Fengyong Li
, Zhenxing Qian
, Xinpeng Zhang
:
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation. IEEE Trans. Multim. 25: 2528-2542 (2023) - [j28]Fengyong Li
, Zhenjia Pei, Xinpeng Zhang
, Chuan Qin
:
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision. IEEE Trans. Multim. 25: 7851-7866 (2023) - [c7]Jing Li, Jufeng Sun, Fengyong Li, Xingkai Yang, Yuwei Wang:
BIFLC: A Blockchain and IPFS-Based Multi-Consensus Federated Learning Framework. CSCWD 2023: 1409-1414 - 2022
- [j27]Fengyong Li, Lianming Zhang, Chuan Qin
, Kui Wu:
Reversible data hiding for JPEG images with minimum additive distortion. Inf. Sci. 595: 142-158 (2022) - [j26]Lianming Zhang, Fengyong Li
, Chuan Qin
:
Efficient reversible data hiding in encrypted binary image with Huffman encoding and weight prediction. Multim. Tools Appl. 81(20): 29347-29365 (2022) - [j25]Fengyong Li, Zongliang Yu, Chuan Qin
:
GAN-based spatial image steganography with cross feedback mechanism. Signal Process. 190: 108341 (2022) - [j24]Fengyong Li
, Yishu Zeng
, Xinpeng Zhang
, Chuan Qin
:
Ensemble Stego Selection for Enhancing Image Steganography. IEEE Signal Process. Lett. 29: 702-706 (2022) - [j23]Fengyong Li
, Zhen Qi, Xinpeng Zhang
, Chuan Qin
:
JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8849-8863 (2022) - [c6]Xuan Zhu
, Qun Mo, Fengyong Li
, Lei Zhang, Chuan Qin
:
Behavior Steganography in Social Network via Secret Sharing. ICAIS (3) 2022: 299-308 - 2021
- [j22]Fengyong Li
, Hengjie Zhu, Jiang Yu, Chuan Qin
:
Double linear regression prediction based reversible data hiding in encrypted images. Multim. Tools Appl. 80(2): 2141-2159 (2021) - 2020
- [j21]Fengyong Li
, Lianming Zhang, Weimin Wei:
Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression. EURASIP J. Image Video Process. 2020(1): 33 (2020) - [j20]Fengyong Li
, Kui Wu, Chuan Qin
, Jingsheng Lei:
Anti-compression JPEG steganography over repetitive compression networks. Signal Process. 170: 107454 (2020) - [j19]Yanli Ren
, Xinpeng Zhang
, Guorui Feng
, Zhenxing Qian
, Fengyong Li
:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020)
2010 – 2019
- 2019
- [j18]Jingsheng Lei, Ting Jin, Jiawei Hao
, Fengyong Li:
Short-term load forecasting with clustering-regression model in distributed cluster. Clust. Comput. 22(Supplement): 10163-10173 (2019) - [j17]Fengyong Li, Haibin Wu
, Gang Zhou, Weimin Wei:
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J. Real Time Image Process. 16(3): 775-790 (2019) - [j16]Haibin Wu
, Fengyong Li
, Chuan Qin
, Weimin Wei:
Separable reversible data hiding in encrypted images based on scalable blocks. Multim. Tools Appl. 78(18): 25349-25372 (2019) - [j15]Jinguo Li
, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li:
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. Peer-to-Peer Netw. Appl. 12(4): 893-911 (2019) - [c5]Haibin Wu, Fengyong Li, Xinpeng Zhang, Kui Wu:
GAN-Based Steganography with the Concatenation of Multiple Feature Maps. IWDW 2019: 3-17 - 2018
- [j14]Fengyong Li
, Kui Wu, Xinpeng Zhang, Jiang Yu, Jingsheng Lei, Mi Wen:
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. IEEE Access 6: 29912-29925 (2018) - [j13]Jingsheng Lei, Wenbin Shi
, Zhichao Lei, Fengyong Li:
Efficient power component identification with long short-term memory and deep neural network. EURASIP J. Image Video Process. 2018: 122 (2018) - [j12]Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Yanli Ren:
Unsupervised steganalysis over social networks based on multi-reference sub-image sets. Multim. Tools Appl. 77(14): 17953-17971 (2018) - [j11]Fengyong Li, Mi Wen, Jingsheng Lei, Yanli Ren:
Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Netw. Appl. 11(5): 924-939 (2018) - [j10]Fengyong Li
, Kui Wu, Xinpeng Zhang, Jingsheng Lei, Mi Wen:
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles. Symmetry 10(5): 128 (2018) - 2017
- [j9]Guoming Tang, Zhen Ling, Fengyong Li, Daquan Tang, Jiuyang Tang:
Occupancy-aided energy disaggregation. Comput. Networks 117: 42-51 (2017) - [c4]Fengyong Li, Mingquan Xin, Jinguo Li, Jiang Yu:
Improved detection for copy-move forgery with multi-scale sliding windows. ISPACS 2017: 231-236 - 2016
- [j8]Hang Cheng
, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016: 1 (2016) - [j7]Jiang Yu
, Xinpeng Zhang, Fengyong Li:
Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multim. Tools Appl. 75(21): 13613-13625 (2016) - [j6]Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:
Digital image steganalysis based on local textural features and double dimensionality reduction. Secur. Commun. Networks 9(8): 729-736 (2016) - [j5]Jiang Yu
, Fengyong Li, Hang Cheng, Xinpeng Zhang:
Spatial Steganalysis Using Contrast of Residuals. IEEE Signal Process. Lett. 23(7): 989-992 (2016) - [j4]Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Zhongqin Bi, Chunhua Gu:
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles. IEEE Trans. Inf. Forensics Secur. 11(2): 344-357 (2016) - 2015
- [c3]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov Process Based Retrieval for Encrypted JPEG Images. ARES 2015: 417-421 - [c2]Mi Wen, Kejie Lu, Jingsheng Lei, Fengyong Li, Jing Li:
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication. INFOCOM Workshops 2015: 214-219 - 2014
- [j3]Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. Ann. des Télécommunications 69(7-8): 431-440 (2014) - [j2]Bin Chen, Guorui Feng, Xinpeng Zhang, Fengyong Li:
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier. Signal Image Video Process. 8(8): 1475-1482 (2014) - 2013
- [j1]Fengyong Li, Xinpeng Zhang, Bin Chen, Guorui Feng:
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Process. Lett. 20(3): 233-236 (2013) - 2012
- [c1]Bin Chen, Guorui Feng, Fengyong Li:
Steganalysis in High-Dimensional Feature Space Using Selective Ensemble Classifiers. IFTC 2012: 9-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint