Temporal forensics and anti-forensics for motion compensated video MC Stamm, WS Lin, KJR Liu IEEE Transactions on Information Forensics and Security 7 (4), 1315-1329, 2012 | 204 | 2012 |
Anti-forensics of JPEG compression MC Stamm, SK Tjoa, WS Lin, KJR Liu 2010 IEEE International conference on acoustics, speech and signal …, 2010 | 142 | 2010 |
Targetvue: Visual analysis of anomalous user behaviors in online communication systems N Cao, C Shi, S Lin, J Lu, YR Lin, CY Lin IEEE transactions on visualization and computer graphics 22 (1), 280-289, 2015 | 134 | 2015 |
Undetectable image tampering through JPEG compression anti-forensics MC Stamm, SK Tjoa, WS Lin, KJR Liu 2010 IEEE International Conference on Image Processing, 2109-2112, 2010 | 114 | 2010 |
Incentive cooperation strategies for peer-to-peer live multimedia streaming social networks WS Lin, HV Zhao, KJR Liu IEEE transactions on multimedia 11 (3), 396-412, 2009 | 114 | 2009 |
Digital image source coder forensics via intrinsic fingerprints WS Lin, SK Tjoa, HV Zhao, KJR Liu IEEE Transactions on Information Forensics and Security 4 (3), 460-475, 2009 | 92 | 2009 |
Indirect reciprocity security game for large-scale wireless networks L Xiao, Y Chen, WS Lin, KJR Liu IEEE Transactions on Information Forensics and Security 7 (4), 1368-1380, 2012 | 78 | 2012 |
Energy-efficient cellular network operation via base station cooperation F Han, Z Safar, WS Lin, Y Chen, KJR Liu 2012 IEEE international conference on communications (ICC), 4374-4378, 2012 | 71 | 2012 |
Forensics vs. anti-forensics: A decision and game theoretic framework MC Stamm, WS Lin, KJR Liu 2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012 | 71 | 2012 |
Near-optimal waveform design for sum rate optimization in time-reversal multiuser downlink systems YH Yang, B Wang, WS Lin, KJR Liu IEEE Transactions on Wireless Communications 12 (1), 346-357, 2012 | 67 | 2012 |
Cooperative peer-to-peer streaming: An evolutionary game-theoretic approach Y Chen, B Wang, WS Lin, Y Wu, KJR Liu IEEE Transactions on Circuits and Systems for Video Technology 20 (10), 1346 …, 2010 | 58 | 2010 |
A new algorithm for the binate covering problem and its application to the minimization of boolean relations SW Jeong, F Somenzi ICCAD 92, 417-420, 1992 | 57* | 1992 |
Behavior modeling and forensics for multimedia social networks HV Zhao, WS Lin, KJR Liu IEEE Signal Processing Magazine 26 (1), 118-139, 2009 | 44 | 2009 |
Behavior dynamics in media-sharing social networks HV Zhao, WS Lin, KJR Liu Cambridge University Press, 2011 | 42 | 2011 |
A cheat-proof game theoretic demand response scheme for smart grids Y Chen, WS Lin, F Han, YH Yang, Z Safar, KJR Liu 2012 IEEE International Conference on Communications (ICC), 3362-3366, 2012 | 40 | 2012 |
Insider threat prediction YX Anni R. Coden, Ching-Yung Lin, Wan-Yi Lin US Patent 9,589,245, 2017 | 26* | 2017 |
Authenticating MIMO transmissions using channel-like fingerprinting N Goergen, WS Lin, KJR Liu, TC Clancy 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 23 | 2010 |
Block Size Forensic Analysis in Digital Images. SK Tjoa, WYS Lin, HV Zhao, KJR Liu ICASSP (1), 633-636, 2007 | 22 | 2007 |
Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks WS Lin, HV Zhao, KJR Liu IEEE Transactions on Multimedia 13 (2), 191-205, 2010 | 20 | 2010 |
Game-theoretic pricing for video streaming in mobile networks WS Lin, KJR Liu IEEE transactions on image processing 21 (5), 2667-2680, 2012 | 19 | 2012 |