1. Soualmi, A., Alti, A., & Laouamer, L. (2022). An imperceptible watermarking scheme for medical image tamper detection. International Journal of Information Security and Privacy (IJISP), 16.
2. Yang, G. K., Mendoza, B., Kwon, O., & Yoon, J. (2022). Task-specific feature selection and detection algorithms for iot-based networks. Computer and communication, 10(10), 15.
3. Karampidis, K., Rousouliotis, M., Linardos, E., & Kavallieratou, E. (2021). A comprehensive survey of fingerprint presentation attack detection. Journal of Surveillance, Security and Safety, 2(4), 117-161.
4. Han, K., Li, Y., & Xia, B. (2021). A cascade model-aware generative adversarial example detection method. Tsinghua Science and Technology, 26(6), 800-812.
5. Yu, W., Huang, X., Yuan, Q., Yi, M., & Li, X. (2021). Information security field event detection technology based on satt-lstm. Security and Communication Networks, 2021(3), 1-8.