1. Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)
2. Lecture Notes in Computer Science;Z Yang,2020
3. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;Z Yang,2018
4. Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018)
5. Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)