What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nenghai Yu
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Provably Secure Public-Key Steganography Based on Admissible Encoding.
Xin Zhang
Kejiang Chen
Na Zhao
Weiming Zhang
Nenghai Yu
2025
journals/tifs
CoAS: Composite Audio Steganography Based on Text and Speech Synthesis.
Yiming Li
Kejiang Chen
Yaofei Wang
Xin Zhang
Guanjie Wang
Weiming Zhang
Nenghai Yu
2025
journals/tifs
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security.
Xiangkun Wang
Kejiang Chen
Yuang Qi
Ruiheng Liu
Weiming Zhang
Nenghai Yu
2025
conf/sp
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
Xiang Zhang
Jie Zhang
Zehua Ma
Jinyang Huang
Meng Li
Huan Yan
Peng Zhao
Zijian Zhang
Bin Liu
Qing Guo
Tianwei Zhang
Nenghai Yu
2025
journals/tifs
AutoPT: How Far Are We From the Fully Automated Web Penetration Testing?
Benlong Wu
Guoqiang Chen
Kejiang Chen
Xiuwei Shang
Jiapeng Han
Yanru He
Weiming Zhang
Nenghai Yu
2025
conf/esorics
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.
Hao Huang
Xiuwei Shang
Junqi Zhang
Shaoyin Cheng
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Toward Secure and Robust Steganography for Black-Box Generated Images.
Kai Zeng
Kejiang Chen
Jiansong Zhang
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography.
Zexin Fan
Kejiang Chen
Kai Zeng
Jiansong Zhang
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models.
Jiawei Zhao
Kejiang Chen
Xiaojian Yuan
Yuang Qi
Weiming Zhang
Nenghai Yu
2024
journals/tifs
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography.
Xin Zhang
Kejiang Chen
Jinyang Ding
Yuqi Yang
Weiming Zhang
Nenghai Yu
2024
conf/ccs
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Kunsheng Tang
Wenbo Zhou
Jie Zhang
Aishan Liu
Gelei Deng
Shuai Li
Peigui Qi
Weiming Zhang
Tianwei Zhang
Nenghai Yu
2024
conf/ndss
Detecting Voice Cloning Attacks via Timbre Watermarking.
Chang Liu
Jie Zhang
Tianwei Zhang
Xi Yang
Weiming Zhang
Nenghai Yu
2023
journals/tifs
F<sup>2</sup>Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection.
Changtao Miao
Zichang Tan
Qi Chu
Huan Liu
Honggang Hu
Nenghai Yu
2023
conf/sp
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies".
Jinyang Ding
Kejiang Chen
Yaofei Wang
Na Zhao
Weiming Zhang
Nenghai Yu
2023
conf/ih
Calibration-based Steganalysis for Neural Network Steganography.
Na Zhao
Kejiang Chen
Chuan Qin
Yi Yin
Weiming Zhang
Nenghai Yu
2022
journals/istr
Robustness enhancement against adversarial steganography via steganalyzer outputs.
Chuan Qin
Wei Ming Zhang
Hang Zhou
Jiayang Liu
Yuan He
Nenghai Yu
2022
journals/tifs
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection.
Changtao Miao
Zichang Tan
Qi Chu
Nenghai Yu
Guodong Guo
2022
conf/ccs
Blacktooth: Breaking through the Defense of Bluetooth in Silence.
Mingrui Ai
Kaiping Xue
Bo Luo
Lutong Chen
Nenghai Yu
Qibin Sun
Feng Wu
2021
journals/tifs
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
Yaofei Wang
Weiming Zhang
Weixiang Li
Nenghai Yu
2020
journals/tches
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
Jiajia Zhang
Mengce Zheng
Jiehui Nan
Honggang Hu
Nenghai Yu
2020
journals/istr
Efficient and privacy-preserving authentication scheme for wireless body area networks.
Mengxia Shuai
Bin Liu
Nenghai Yu
Ling Xiong
Changhui Wang
2020
journals/tifs
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities.
Shaohua Li
Kaiping Xue
David S. L. Wei
Hao Yue
Nenghai Yu
Peilin Hong
2020
journals/tifs
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
Yaofei Wang
Weiming Zhang
Weixiang Li
Xinzhi Yu
Nenghai Yu
2019
journals/compsec
Anonymous authentication scheme for smart home environment with provable security.
Mengxia Shuai
Nenghai Yu
Hongxia Wang
Ling Xiong
2019
journals/tifs
Screen-Shooting Resilient Watermarking.
Han Fang
Weiming Zhang
Hang Zhou
Hao Cui
Nenghai Yu
2019
journals/tifs
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
Kejiang Chen
Hang Zhou
Wenbo Zhou
Weiming Zhang
Nenghai Yu
2019
journals/tifs
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
Qingyou Yang
Kaiping Xue
Jie Xu
Jiajie Wang
Fenghua Li
Nenghai Yu
2018
conf/ih
Defining Joint Distortion for JPEG Steganography.
Weixiang Li
Weiming Zhang
Kejiang Chen
Wenbo Zhou
Nenghai Yu
2018
conf/ih
Adversarial Examples Against Deep Neural Network based Steganalysis.
Yiwei Zhang
Weiming Zhang
Kejiang Chen
Jiayang Liu
Yujia Liu
Nenghai Yu
2017
journals/tifs
A New Rule for Cost Reassignment in Adaptive Steganography.
Wenbo Zhou
Weiming Zhang
Nenghai Yu
2017
journals/tifs
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving.
Kaiping Xue
Shaohua Li
Jianan Hong
Yingjie Xue
Nenghai Yu
Peilin Hong
2015
journals/tifs
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xiaolong Li
Nenghai Yu
2015
journals/tifs
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
Ke Li
Weiming Zhang
Ce Yang
Nenghai Yu
2014
journals/compsec
Towards optimal noise distribution for privacy preserving in data aggregation.
Hao Zhang
Nenghai Yu
Yonggang Wen
Weiming Zhang
2014
conf/ih
Video steganography with perturbed macroblock partition.
Hong Zhang
Yun Cao
Xianfeng Zhao
Weiming Zhang
Nenghai Yu
2013
journals/tifs
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xuexian Hu
Nenghai Yu
Xianfeng Zhao
Fenghua Li
2013
journals/tifs
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
Kede Ma
Weiming Zhang
Xianfeng Zhao
Nenghai Yu
Fenghua Li
2012
journals/tifs
Fast Matrix Embedding by Matrix Extending.
Chao Wang
Weiming Zhang
Jiufen Liu
Nenghai Yu
2011
conf/ih
Capacity-Approaching Codes for Reversible Data Hiding.
Weiming Zhang
Biao Chen
Nenghai Yu
2010
journals/tifs
Generalization and Analysis of the Paper Folding Method for Steganography.
Weiming Zhang
Jiufen Liu
Xin Wang
Nenghai Yu
Coauthors
Aishan Liu
(1)
Benlong Wu
(1)
Biao Chen
(1)
Bin Liu
(2)
Bo Luo
(1)
Ce Yang
(1)
Chang Liu
(1)
Changhui Wang
(1)
Changtao Miao
(2)
Chao Wang
(1)
Chuan Qin
(2)
David S. L. Wei
(1)
Feng Wu
(1)
Fenghua Li
(3)
Gelei Deng
(1)
Guanjie Wang
(1)
Guodong Guo
(1)
Guoqiang Chen
(1)
Han Fang
(1)
Hang Zhou
(3)
Hao Cui
(1)
Hao Huang
(1)
Hao Yue
(1)
Hao Zhang
(1)
Hong Zhang
(1)
Honggang Hu
(2)
Hongxia Wang
(1)
Huan Liu
(1)
Huan Yan
(1)
Jiajia Zhang
(1)
Jiajie Wang
(1)
Jianan Hong
(1)
Jiansong Zhang
(2)
Jiapeng Han
(1)
Jiawei Zhao
(1)
Jiayang Liu
(2)
Jie Xu
(1)
Jie Zhang
(3)
Jiehui Nan
(1)
Jinyang Ding
(2)
Jinyang Huang
(1)
Jiufen Liu
(2)
Junqi Zhang
(1)
Kai Zeng
(2)
Kaiping Xue
(4)
Ke Li
(1)
Kede Ma
(1)
Kejiang Chen
(13)
Kunsheng Tang
(1)
Ling Xiong
(2)
Lutong Chen
(1)
Meng Li
(1)
Mengce Zheng
(1)
Mengxia Shuai
(2)
Mingrui Ai
(1)
Na Zhao
(3)
Nenghai Yu
(40)
Peigui Qi
(1)
Peilin Hong
(2)
Peng Zhao
(1)
Qi Chu
(2)
Qibin Sun
(1)
Qing Guo
(1)
Qingyou Yang
(1)
Ruiheng Liu
(1)
Shaohua Li
(2)
Shaoyin Cheng
(1)
Shuai Li
(1)
Tianwei Zhang
(3)
Wei Ming Zhang
(1)
Weiming Zhang
(29)
Weixiang Li
(3)
Wenbo Zhou
(4)
Xi Yang
(1)
Xianfeng Zhao
(3)
Xiang Zhang
(1)
Xiangkun Wang
(1)
Xiaocheng Hu
(2)
Xiaojian Yuan
(1)
Xiaolong Li
(1)
Xin Wang
(1)
Xin Zhang
(3)
Xinzhi Yu
(1)
Xiuwei Shang
(2)
Xuexian Hu
(1)
Yanru He
(1)
Yaofei Wang
(4)
Yi Yin
(1)
Yiming Li
(1)
Yingjie Xue
(1)
Yiwei Zhang
(1)
Yonggang Wen
(1)
Yuan He
(1)
Yuang Qi
(2)
Yujia Liu
(1)
Yun Cao
(1)
Yuqi Yang
(1)
Zehua Ma
(1)
Zexin Fan
(1)
Zichang Tan
(2)
Zijian Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to