• Publications
  • Influence
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensivelyExpand
  • 93
  • 11
  • PDF
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
  • Hui Tian, Y. Chen, +4 authors J. Liu
  • Computer Science
  • IEEE Transactions on Services Computing
  • 1 September 2017
Cloud storage is an increasingly popular application of cloud computing, which can provide on-demand outsourcing data services for both organizations and individuals. However, users may not fullyExpand
  • 91
  • 6
  • PDF
Steganography Integration Into a Low-Bit Rate Speech Codec
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile communications, so that steganography in low bit-rate audio streams would have broad applications inExpand
  • 71
  • 4
  • PDF
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
Quantization index modulation (QIM) steganography makes it possible to hide secret information in voice-over IP (VoIP) streams, which could be utilized by unauthorized entities to set up covertExpand
  • 24
  • 4
  • PDF
THU_NGN at SemEval-2018 Task 1: Fine-grained Tweet Sentiment Intensity Analysis with Attention CNN-LSTM
Traditional sentiment analysis approaches mainly focus on classifying the sentiment polarities or emotion categories of texts. However, they can’t exploit the sentiment intensity information.Expand
  • 6
  • 4
  • PDF
Sentiment Domain Adaptation with Multiple Sources
Domain adaptation is an important research topic in sentiment analysis area. Existing domain adaptation methods usually transfer sentiment knowledge from only one source domain to target domain. InExpand
  • 40
  • 3
  • PDF
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
  • Rui Miao, Y. Huang
  • Computer Science
  • IEEE International Conference on Communications…
  • 5 June 2011
An effective covert communication system can be achieved based on steganography in stream media such as VoIP (Voice over IP), and the LSB-based (Least-Significant-Bit) methods are the most popularExpand
  • 36
  • 3
  • PDF
Towards building a high-quality microblog-specific Chinese sentiment lexicon
Due to the huge popularity of microblogging services, microblogs have become important sources of customer opinions. Sentiment analysis systems can provide useful knowledge to decision supportExpand
  • 29
  • 3
Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry
We propose a novel text steganography method using RNN Encoder-Decoder structure to generate quatrains, one genre of Chinese poetry. Compared to other text-generation based steganography methodsExpand
  • 27
  • 3
Neural Metaphor Detecting with CNN-LSTM Model
Metaphors are figurative languages widely used in daily life and literatures. It’s an important task to detect the metaphors evoked by texts. Thus, the metaphor shared task is aimed to extractExpand
  • 24
  • 3
  • PDF