发表论文
部分学术论文情况如下:
[1] Yongdong Wu,Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng: Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.IEEE Internet of Things Journal, 6(2): 1617-1627 (2019)(中科院1区)
[2] Guang Hua, Han Liao, Qingyi Wang, Haijian Zhang, andDengpan Ye:Detection of Electric Network Frequency in Audio Recordings -From Theory to Practical Detectors,IEEE Transactions on Information Forensics and Security, 16: 236-248, 2021 (10.1109/TIFS.2020.3009579)(CCF A类期刊)
[3] Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang,Dengpan Ye: Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution,IEEE Transactions on Dependable and Secure Computing,2019 (10.1109/TDSC.2019.2957091) (CCF A类期刊)
[4] Shunzhi Jiang,Dengpan Ye, Jiaqing Huang, Yueyun Shang:Smart Steganogaphy: Light-weight generative audio steganography model for smart embedding application.Journal of Networking and Computer Applications, 165 (doi.org/10.1016/j.jnca.2020.102689) (2020)(中科院2区)
[5] Tao Lei, Zhan Qin, Zhibo Wang, Qi Li,Dengpan Ye: EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.IEEE Internet of Things Journal, 6(4): 6668-6680 (2019)(中科院1区)
[6] Chuan Qin, Xueqin Chen,Dengpan Ye, Jinwei Wang, Xingming Sun: A novel image hashing scheme with perceptual robustness using block truncation coding.Information Science, 361-362: 84-99 (2016)(中科院1区)
[7] Dengpan Ye,Changfu Zou, Yuewei Dai, Zhiquan Wang: A New Adaptive Watermarking for Real-time MPEG Videos,Applied Mathematics and Computation, 185(2): 907-918 (2007)(中科院1区)
[8] Fei Ma, Xiaoke Zhu, Qinglong Liu, Chengfang Song, Xiao-Yuan Jing,Dengpan Ye: Multi-view coupled dictionary learning for person re-identification.Neurocomputing, 348: 16-26 (2019)(中科院2区)
[9] Xiaoguang Niu, Qiongzan Ye, Yihao Zhang,Dengpan Ye: A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems. IEEE Access, 6: 15457-15467 (2018)(中科院2区)
[10] Yueyun Shang, Shunzhi Jiang,Dengpan Ye, and Jiaqing Huang: Enhancing the Security of Deep Learning Steganography via Adversarial Examples.Mathematics, 2020, 8(9):1446.(2020)(中科院3区)
[11] Yuan Mei,Dengpan Ye, Shunzhi Jiang, Jiarui Liu: A Particular Character Speech Synthesis System Based on Deep Learning,IETE Technical Review, 2020 (中科院4区)
[12] Shiyu Li,Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo: Anti-Steganalysis for Image on Convolutional Neural Networks,Multimedia Tools and Applications, 79(7): 4315–4331(2020)(CCF C类)
[13] Changrui Liu, Dengpan Ye, Yueyun Shang, et al. Defend Against Adversarial Samples by Using Perceptual Hash: Defend Against Adversarial Samples by Using Perceptual Hash.CMC - Computers, Materials & Continua, 62(3): 1365–1386 (2020) (中科院3区)
[14] Dengpan Ye, Shunzhi Jiang, Shiyu Li, Changrui Liu: Faster and transferable deep learning steganalysis on GPU. J. Real-Time Image Processing, 16(3): 623-633 (2019).(中科院3区)
[15] Dengpan Ye, Yuan Mei, Yueyun Shang, Jixiang Zhu, Kun Ouyang: Mobile crowd-sensing context aware based fine-grained access control mode.Multimedia Tools and Applications, 75(21): 13977-13993 (2016)(CCF C类)
[16] Ayesha Shafique, Guo Cao, Muhammad Aslam, Muhammad Asad andDengpan Ye: Application-Aware SDN-Based Iterative Reconfigurable Routing Protocol for Internet of Things (IoT).Sensors,20, 3521(2020) (doi:10.3390/s20123521)(中科院2区)
[17] Lv Chen,Dengpan Ye and Shunzhi Jiang. High Accuracy Perceptual video hashing via Low-Rank decomposition and DWT. International Conference on Multimedia Modeling(MMM) 2020, in Daejeon, Korea, Lecture Notes in Computer Science, 11961: 802-812 (2020)(CCF C类)
[18] Dengpan Ye, Shiguo Lian : Novel encryption model for multimedia data.Journal of Systems Engineering and Electronics 20(5): 1081-1085 (2009)(中国科技期刊卓越行动计划入选期刊,中科院4区)
[19] Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng: Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.International Journal of Computational Intelligence Systems, 4(5): 777-787 (2011)(中科院4区)
[20] Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng: Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.International Journal of Computational Intelligence Systems, 5(5): 953-963 (2012)(中科院4区)
[21] Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun,Dengpan Ye, Xiangyang Luo: NEXT: a neural network framework for next POI recommendation.Frontiers of Computer Science, 14(2): 314-333 (2020) (中科院3区)
[22] Qichao Ying, Zhenxing Qian, Xinpeng Zhang,Dengpan Ye: Reversible Data Hiding With Image Enhancement Using Histogram Shifting.IEEE Access, 7: 46506-46521 (2019)(中科院2区)
[23] Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Min Yang,Dengpan Ye: On Improving Distortion Functions for JPEG Steganography.IEEE Access, 6: 74917-74930 (2018)(中科院2区)
[24] Zhenjun Tang, Shijie Xu,Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu: Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.Journal of Real-Time Image Processing, 16(3): 709-724 (2019)(中科院3区)
[25] Yue Zhang,Dengpan Ye, Junjun Gan, Zhenyu Li, Qingfeng Cheng: An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection,CMC - Computers Materials & Continua, 56(1): 151-167, 2018 (中科院4区)
[26] Donghui Hu, Zhongjin Ma, Yuqi Fan, Shuli Zheng, Dengpan Ye, Lina Wang: Study on the interaction between the cover source mismatch and texture complexity in steganalysis.Multimedia Tools and Applications, 78(6): 7643-7666 (2019)(CCF C类)
[27] Jun Chen, Xiangyang Luo, Jianwei Hu,Dengpan Ye,Daofu Gong:An Attack on Hollow CAPTCHA Using Accurate Filling and Nonredundant Merging, IETE Technical Review, 35(S1):106-118 (2018)(中科院4区)
[28] Donghui Hu, Zhongjin Ma, Xiaotian Zhang, Peipei Li,Dengpan Ye, Baohong Ling: The Concept Drift Problem in Android Malware Detection and Its Solution.Security and Communication Networks, 2017: 4956386:1-4956386:13 (2017)(CCF C类)
[29] Fang Cao, Bowen An, Jinwei Wang,Dengpan Ye, Huili Wang: Hierarchical recovery for tampered images based on watermark self-embedding.Displays, 46: 52–60 (2017)(中科院4区)
[30] Donghui Hu, Lina Wang, Xiaqiu Jiang,Dengpan Ye, Shiguo Lian. A Specific Steganalysis Approach to Effective Attacking the MB1.Chinese Journal of Electronics, 18(4):610-614 (2009)(国内权威)(中科院4区)
[31] Yueyun Shang,Dengpan Ye, Zhuo Wei, Yajuan Xie: GPU-Based MPEG-2 to Secure Scalable Video Transcoding. International Journal of Digital Crime and Forensics, 6(2): 52-69 (2014)(SCI源刊)
[32] Lingyu Yan, Hefei Ling,Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen: Feature Fusion based Hashing for Large Scale Image Copy Detection.International Journal of Computational Intelligence Systems, 8(4): 725-734 (2015)(中科院4区)
[33] Yanzhen Ren, Mengdi Fan,Dengpan Ye, Jing Yang, Lina Wang: Detection of double MP3 compression Based on Difference of Calibration Histogram.Multimedia Tools and Application, 75:13855–13870 (2016)(CCF C类)
[34] Shuli Zheng, Dandan Li, Donghui Hu,Dengpan Ye, Lina Wang, Jinwei Wang. Lossless data hiding algorithm for encrypted images with high capacity.Multimedia Tools and Application75: 13765–13778 (2016)(CCF C类)
[35] Shiguo Lian, Xi Chen,Dengpan Ye. Secure fractal image coding based on fractal parameter encryption.Fractals - complex Geometry Patterns & Scaling in Nature & Society, 17(2):149-160 (2009)(中科院3区)
[36] Yi Zhang, Xiangyang Luo, Chunfang Yang,Dengpan Ye, Fenlin Liu: A Framework of Adaptive Steganography Resisting JPEG Compression and Detection,Security and Communication Networks,9(15): 2957-2971 (2016)(CCF C类)
[37] Lina Wang, Xiaqiu Jiang, Shiguo Lian, Donghui Hu,Dengpan Ye: Image authentication based on perceptual hash using Gabor filters.Soft Computing, 15(3): 493-504 (2011)(中科院3区)
[38] Yajuan Xie, Shanzhen Yi, Zhongqian Tang,Dengpan Ye: Uncertainty Multisource Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory.International Journal of Computational Intelligence Systems, 5(5): 975-984 (2012)(中科院4区)
[39] Shiyu Li,Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo: Attack on Deep Steganalysis Neural Networks, ICCCS 2018 (4): 265-276 (2018) (EI)
[40] Dengpan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang: A Multi-feature Based Invertible Authentication Watermarking for JPEG Images.IWDW 2004: 152-162 (EI)
[41] Shichang Ding, Xiangyang Luo,Dengpan Ye,Fenlin Liu:Delay-Distance Correlation Study for IP Geolocation.武汉大学学报(自然科学英文版), 2017 , 22 (2) :157-164(中文核心)
[42] 叶登攀,尚月赟:基于多特征的MPEG视频认证方案.通信学报,29(02):59-65 (2008)(CCF中文B类)(中国科技期刊卓越行动计划入选期刊,EI)
[43] 叶登攀:用于压缩视频/图像的无损信息隐藏方法.通信学报,28(11A):64-69 (2007)(CCF中文B类)(中国科技期刊卓越行动计划入选期刊,EI)
[44] 梅园,叶登攀,刘昌瑞:加密域图像检索技术综述.华南理工大学学报(自然科学版), 2018, 46(5) (EI期刊)
[45] 叶登攀,马方方,梅园:基于迁移学习的隐写分析.网络与信息安全学报,2017,3(1):23-30(中国网络空间安全协会会刊)
[46] 尚月赟,李成蹊,叶登攀:基于DCT排序特征加密的人脸图像安全检索系统.武汉大学学报(理学版),60(6):531-536(2014)(中文核心)
[47] 尚月赟,马龙飞,叶登攀:基于熵特征融合的拷贝检测方法研究.计算机工程与应用, 48(16):80-84(2012)(中文核心)
[48] 刘光杰,戴跃伟,叶登攀,顾霞,王执铨:对一种基于IP标识协议隐写的分析.计算机工程,33(24):136-137(2007)(中文核心)