Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters

    As we know, compared with the feature-based steganalysis method, deep convolutional neural networks (DCNNs) have firmly established themselves as the superior steganography detectors. In this paper, considerin...

    **aofeng Song, **nshe Qi, Wanli Kou in Advances in Artificial Intelligence and Se… (2022)

  2. No Access

    Chapter and Conference Paper

    Research on Technical System for Cyberspace Surveying and Map**

    With the rapid development of the network, various businesses continue to appear, and the number of cyberspace protection targets is increasing exponentially. How to find out the family background, recognize t...

    Wanli Kou, Lin Ni, Jia Du in Advances in Artificial Intelligence and Security (2022)

  3. No Access

    Chapter and Conference Paper

    Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events

    Aiming to improve the efficiency of network security protection, the collaborative utilization of network security devices is studied. Firstly, the utilization status quo of network security devices was analyz...

    Jia Du, Junqiang Yang, Wanli Kou in Artificial Intelligence and Machine Learni… (2024)