Author:
Zhao Pengbiao,Wang Bintao,Qin Zhen,Ding Yi,Choo Kim-Kwang Raymond
Funder
National Natural Science Foundation of China
Sichuan Science and Technology Innovation Platform and Talent Plan
Sichuan Science and Technology Support Plan
YIBIN Science and Technology Support Plan
Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China
Cloud Technology Endowed Professorship
Publisher
Springer Science and Business Media LLC
Reference47 articles.
1. Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X (2018) Synergy of big data and 5G wireless networks: Opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12–18
2. Chen D, Zhao Z, Qin X, Luo Y, Cao M, Xu H, Liu A (2020) Magleak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment. IEEE Trans Industr Inf 18(1):467–476
3. Li F, Wen M (2018) Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Netw Appl 11:924–939
4. Fridrich J (2009) Steganography in digital media: Principles, algorithms, and applications. Cambridge University Press
5. Pevnỳ T, Filler T, Bas P (2010) Information hiding: 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010. Revised Selected Papers 12. Springer, pp 161–177