​
Login / Signup
Enping Li
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 8
Top Topics
Data Hiding
Application Development
Jpeg Images
Pseudorandom
Top Venues
TALE
IEEE Trans. Inf. Forensics Secur.
MOBMU
ICME
</>
Publications
</>
Yuewang He
,
Xiangui Kang
,
Qiben Yan
,
Enping Li
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Fei Shang
,
Yuhang Lan
,
Jianhua Yang
,
Enping Li
,
Xiangui Kang
Robust data hiding for JPEG images with invertible neural network.
Neural Networks
163 (2023)
Bingyuan Huang
,
Sanshuai Cui
,
Xiangui Kang
,
Enping Li
Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models.
ICME
(2023)
Yuhang Lan
,
Fei Shang
,
Jianhua Yang
,
Xiangui Kang
,
Enping Li
Robust Image Steganography: Hiding Messages in Frequency Coefficients.
AAAI
(2023)
Enping Li
A Hands-On Mobile Device Forensics Course in Cybersecurity Education.
TALE
(2021)
Enping Li
,
Mengkun Yang
Enhancing Teaching Effectiveness in Mobile Application Development with Structured Practice.
TALE
(2019)
Enping Li
,
Jun Yu
A Forensic Mobile Application Designed for both Steganalysis and Steganography in Digital Images.
MOBMU
(2017)
Jun Yu
,
Enping Li
,
Scott Craver
Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test.
Media Watermarking, Security, and Forensics
(2016)
Enping Li
,
Scott Craver
,
Jun Yu
Capacity Limits of Pseudorandom Channels in Deception Problems.
IEEE Trans. Inf. Forensics Secur.
10 (9) (2015)
Jun Yu
,
Scott Craver
,
Enping Li
Toward the identification of DSLR lenses by chromatic aberration.
Media Forensics and Security
(2011)
Enping Li
,
Scott Craver
A square-root law for active wardens.
MM&Sec
(2011)
Scott Craver
,
Enping Li
,
Jun Yu
Protocols for data hiding in pseudo-random state.
Media Forensics and Security
(2009)
Enping Li
,
Scott Craver
A supraliminal channel in a wireless phone application.
MM&Sec
(2009)
Scott Craver
,
Enping Li
,
Jun Yu
,
Idris M. Atakli
A Supraliminal Channel in a Videoconferencing Application.
Information Hiding
(2008)