Journals
[54] Bo Wang, Yeling Tang, Fei Wei, Zhongjie Ba, Kui Ren. FTDKD: Frequency-Time Domain Knowledge Distillation for Low-Quality Compressed Audio Deepfake Detection. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2024: Early Access. (PDF)
[53] Fei Wang, Qile Chen, Botao Jing, Yeling Tang, Zengren Song, Bo Wang. Deepfake Detection Based on the Adaptive Fusion of Spatial-Frequency Features. International Journal of Intelligent Systems, 2024: 7578036. (PDF)
[52] Bo Wang, Fei Yu, Fei Wei, Yi Li, Wei Wang. Invisible Intruders: Label-Consistent Backdoor Attack Using Re-parameterized Noise Trigger. IEEE Transactions on Multimedia, 2024,26: 10766-10788. (PDF)
[51] Bo Wang, Xiaohan Wu, Fei Wang, Yushu Zhang, Fei Wei, Zengren Song. Spatial-Frequency Feature Fusion Based Deepfake Detection through Knowledge Distillation. Engineering Applications of Artificial Intelligence, 2024,133: 108341. (PDF)
[50] Mengnan Zhao, Bo Wang, Weikuo Guo, Wei Wang. Protecting by Attacking: A Personal Information Protecting Method with Cross-modal Adversarial Examples. Neurocomputing, 2023,551: 126481. (PDF)
[49] Bo Wang, Jiayao Hou, Fei Wei, Fei Yu, Weiming Zheng. MDM-CPS: A Few-shot Sample Approach for Source Camera Identification. Expert Systems With Applications, 2023,229: 120315. (PDF)
[48] Bo Wang, Xiaohan Wu, Yeling Tang, Yanyan Ma, Zihao Shan, Fei Wei. Frequency Domain Filtered Residual Network for Deepfake Detection. Mathematics, 2023,11(4): 816. (PDF)
[47] Bo Wang, Fei Yu, Yanyan Ma, Haining Zhao, Jiayao Hou, Weiming Zheng. PCEP: Few-Shot Model-Based Source Camera Identification. Mathematics, 2023,11(4): 803. (PDF)
[46] Bo Wang, Xiaorui Dai, Wei Wang, Fei Yu, Fei Wei, Mengnan Zhao. Adversarial Examples for Poisoning Attack against Federated Learning. Science China Information Sciences, 2023, 53(3):470-484. (In Chinese) (PDF)
[45] Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren. Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Transactions on Information Forensics & Security, 2022,17: 2468-2482. (PDF)
[44] Bo Wang, Yue Wang, Wei Wang, Jiayao Hou. Envelope Optimization Based on Adaptive Clustering for Open-Set Camera Model Identification. ACTA ELECTRONICA SINICA, 2022, 8(50): 1840-1850. (In Chinese)(PDF)
[43] Bo Wang, Jiayao Hou, Yanyan Ma, Fei Wang, Fei Wei. Multi-DS Strategy for Source Camera Identification in Few-shot Sample Data Set. Security and Communication Networks, 2022: 8716884. (PDF)
[42] Bo Wang, Shiqi Wu, Fei Wei, Yue Wang, Jiayao Hou, Xue Sui. Virtual Sample Generation for Few-Shot Source Camera Identification. Journal of Information Security and Applications, 2022, 66: 103153. (PDF)
[41] Bo Wang, Yucai Li, Xiaohan Wu, Yanyan Ma, Zengren Song, Mingkan Wu. Face Forgery Detection Based on the Improved Siamese Network. Security and Communication Networks, 2022: 5169873. (PDF)
[40] Bo Wang, Yue Wang, Jiayao Hou, Yi Li, Yanqing Guo. Open-Set Source Camera Identification Based on Envelope of Data Clustering Optimization (EDCO). Computers & Security, 2022, 113: 102571. (PDF)
[39] Bo Wang, Mengnan Zhao, Wei Wang, Xiaorui Dai, Yi Li, Yanqing Guo. Adversarial Analysis for Source Camera Identification. IEEE Transactions on Circuits Systems for Video Technology, 2021, 31(11): 4174-4186. (PDF)
[38] Bo Wang, Mengnan Zhao, Wei Wang, Fei Wei, Zhan Qin, Kui Ren. Are You Confident That You Have Successfully Generated Adversarial Examples?. IEEE Transactions on Circuits Systems for Video Technology, 2021, 31(6): 2089-2099. (PDF)
[37] Bo Wang, Yue Wang, Jiayao Hou, Xue Sui, Meineng Zhu. Discriminative Feature Projection for Camera Model Identification of Recompressed Images. Multimedia Tools and Applications, 2021, 80: 29719-29743. (PDF)
[36] Shiqi Wu, Bo Wang, Jianxiang Zhao, Mengnan Zhao, Kun Zhong, Yanqing Guo. Virtual Sample Generation and Ensemble Learning Based Image Source Identification with Small Training Samples. International Journal of Digital Crime and Forensics, 2021, 13(3): 34-46. (PDF)
[35] Guowen Zhang, Bo Wang, Fei Wei, Kaize Shi, Yue Wang, Xue Sui, Meineng Zhu. Source Camera Identification for Re-Compressed Images: A Method Based on Tri-Transfer Learning. Computers & Security, 2021, 100: 102076. (PDF)
[34] Xin Zheng, Huaibo Huang, Yanqing Guo, Bo Wang, Ran He. BLAN: Bi-directional Ladder Attentive Network for Facial Attribute Prediction. Pattern Recognition, 2020, 4(100): 107155. (PDF)
[33] Bo Wang, Kun Zhong, Zihao Shan, Meineng Zhu, Xue Sui. A Unified Framework of Source Camera Identification Based on Features. Forensic Science International, 2020, 307: 110109. (PDF)
[32] Mengnan Zhao, Bo Wang, Fei Wei, Meineng Zhu, Xue Sui. Source Camera Identification Based on Coupling Coding and Adaptive Filter. IEEE Access, 2020, 8: 54431-54440. (PDF)
[31] Hongyong Jia, Yue Chen, Yan Li, Xincheng Yan, Fenlin Liu, Xiangyang Luo, Bo Wang. Attributes Revocation Through Ciphertext Puncturation. Journal of Information Security and Application, 2019, 48: 102355. (PDF)
[30] Wei She, Qi Liu, Zhao Tian, Jian-Sen Chen,Bo Wang, Wei Liu. Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks. IEEE Access, 2019, 7: 38947-38956. (PDF)
[29] Ke Niu, Jun Li, Xiaoyuan Yang, Shuo Zhang, Bo Wang. Hybrid Adaptive Video Steganography Scheme Under Game Model. IEEE Access, 2019, 7: 61523-61533. (PDF)
[28] Bo Wang, Yabin Li, Xue Sui, Ming Li, Yanqing Guo. Joint Statistics Matching for Camera Model Identification of Recompressed Images. Mathematical Biosciences and Engineering, 2019, 16(5): 5041-5061. (PDF)
[27] Bo Wang, Yabin Li, JianXiang Zhao, Xue Sui, Xiangwei Kong. JPEG Compression History Detection Based on Detail Deviation. Mathematical Biosciences and Engineering, 2019, 16(5): 5584-5594.(PDF)
[26] Ruixiang Li, Yingying Liu, Yaqiong Qiao, Te Ma, Bo Wang, Xiangyang Luo. Street-Level Landmarks Acquisition Based on SVM Classifiers. Computers, Materials and Continua, 2019, 58(2): 591-606. (PDF)
[25] Yan Li, Junwei Wang, Shuangkui Ge, Xiangyang Luo, Bo Wang. A Reversible Database Watermarking Method with Low Distortion. Mathematical Biosciences and Engineering, 2019, 16(5): 4053-4068. (PDF)
[24] Bo Wang, Kun Zhong, Ming Li. Ensemble Classifier Based Source Camera Identification Using Fusion Features. Multimedia Tools and Applications, 2019, 78: 8397-8422. (PDF)
[23] Yong Yang, Xiangwei Kong, Bo Wang, Ke Ren, Yanqing Guo. Steganalysis on Internet Images via Domain Adaptive Classifier. Neurocomputing, 2019, 351: 205-216. (PDF)
[22] Bo Wang, Jianfeng Yin, Shunquan Tan, Yabin Li, Ming Li. Source Camera Model Identification Based on Convolutional Neural Networks with Local Binary Patterns Coding. Signal Processing: Image Communication, 2018, 68: 162-168. (PDF)
[21] Wang Bo, Yang Fulong. An Overview and Trends on Digital Image Source Forensics. Journal of Information Security Research, 2016, 2(6): 501-511. (In Chinese)(PDF)
[20] WANG Bo, YIN Jian-feng, LI Ya-bin. Performance Evaluation for JPEG Compression on Model-Based Source Camera Identification. Chinese Journal of Network and Information Security, 2016, 2(9): 65-71. (PDF)
[19] Ming Li, Qian Liu, Xiangwei Kong, Yanqing Guo, Bo Wang. Amplitude-Adaptive Spread-Spectrum Data Embedding. IET Image Processing, 2016, 2(10): 138-148. (PDF)
[18] Ming Li, Qian Liu, Yanqing Guo, Bo Wang. Optimal M-PAM Spread-Spectrum Data Embedding with Precoding. Circuits, Systems & Signal Processing, 2016, 4(35): 1333-1353. (PDF)
[17] Kong Xiangwei, Wang Bo, Li Xiaolong. Multimedia Information Security: A Review. Journal of Information Security Research, 2015, 1(1): 44-53. (Invited Paper for the Inaugural Issue) (In Chinese)(PDF)
[16] Bo Wang, Yue Tan, Meijuan Zhao, Yanqing Guo, Xiangwei Kong. Classifier Combination Based Source Identification for Cell Phone Images. KSII Transactions on Internet and Information Systems, 2015, 9(12): 5087-5102. (PDF)
[15] Ming Li, Yanqing Guo, Bo Wang, Xiangwei Kong. Secure Spread-Spectrum Data Embedding with PN-Sequence Masking. Signal Processing: Image Communication, 2015, 39: 17-25. (PDF)
[14] Ying Li, Bo Wang, Xiangwei Kong, Yanqing Guo. Image Tampering Detection Using No-Reference Image Quality Metrics. Journal of Harbin Institute of Technology (New Series), 2014, 21(6): 51-56. (PDF)
[13] Zhong Wei, Kong Xiangwei, You Xingang, Wang Bo. Splicing Feature Extraction and Analysis Based on Fractional Cepstrum Transform in Voice Forensics. Journal of Data Acquisition and Processing, 29(2), 2014: 248-253. (In Chinese) (PDF)
[12] ZHONG Wei, KONG Xiangwei, YOU Xin-gang, WANG Bo. Forensic Speech Information Hiding Using Fractional Cosine-Cepstrum Transform. Acta Electronica Sinica, 2012, 40(3): 595-599. (In Chinese) (PDF)
[11] Bo Wang, Xiangwei Kong, Lanying Wu. Different-quality Re-demosaicing in Digital Image Forensics. Journal of Convergence Information Technology, 2012, 7(17):492-505. (PDF)
[10] Wang Bo, Kong Xiangwei, You Xin-gang. A Blind Forensics Method for Image Splicing Based on Original Image Estimation Using Color Filter Array Interpolation. Journal of Electronics & Information Technology, 2012, 34(1): 200-206. (In Chinese) (PDF)
[9] Wei Zhong, Xiangwei Kong, Xingang You, Bo Wang. Forensic Speech Enhancement Based On Two-Dimensional Fractional Fourier Transform Domain. Journal of Convergence Information Technology, 2011, 11(6): 293-299. (PDF)
[8] Lisha Dong, Xiangwei Kong, Bo Wang, Xingang You. A Robust JPEG Image Tampering Detection Method Using GLCM Features. Advances in Information Sciences and Service Sciences, 2011, 10(3): 384-391. (PDF)
[7] WANG Bo, KONG Xiangwei, Elisa Bertino, FU Haiyan. Exposing Copy-Paste-Blur Forgeries Based on Color Coherence. Chinese Journal of Electronics, 2009, 18(3): 487-490. (PDF)
[6] WANG Bo, KONG Xiangwei, YOU Xin-gang, FU Haiyan. Identification of Source Cameras Based on CFA Interpolation Algorithm Detection Using Covariance Matrix. Journal of Optoelectronics, Laser, 2009, 20(4): 517-520. (In Chinese) (PDF)
[5] Wang Bo, Kong Xiangwei, You Xin-gang, Fu Haiyan. Blind CFA Interpolation Detection Based on Covariance Matrix. Journal of Electronics & Information Technology, 2009, 31(5): 1175-1179. (In Chinese) (PDF)
[4] Wang Bo, Kong Xiangwei, Fu Haiyan. A Source Camera Identification Method Based on The Combination of OC-SVM and MC-SVM, Journal of Computer Research and Development, 2009, 46(9): 1456-1461. (In Chinese) (PDF)
[3] Wang Bo, Sun Lulu, Kong Xiangwei, You Xin-gang. Image Forensics Technology Using Abnormity of Local Hue for Blur Detection, Acta Electronica Sinica, 2006, 34(12A): 2451-2454. (In Chinese) (PDF)
[2] GUO Yanqing, HE Dequan, YOU Xin-gang, KONG Xiangwei, WANG Bo. Research on Holism-Based Feature Extraction and Fusion for Steganalysis. Acta Electronica Sinica, 2006, 34(12A): 2443-2446. (In Chinese) (PDF)
[1] JIANG Ying, KONG Xiangwei, YOU Xin-gang, WANG Bo. Feature Selection for Steganalysis. Journal of Harbin Institute of Technology, 2006, 38(Sup.): 860-862. (In Chinese) (PDF)
Conference
[36] Bo Wang, Yanyan Ma, Yeling Tang, Rui Wang, Maozhen Zhang. Enhancing Synthesized SpeechDetection with Dual Attention Using Features Fusion. IEEE International Conference on Computer Applications Technology, 2023. (PDF) (PPT)
[35] Mingkan Wu, Fei Wang, Xiaohan Wu, Fei Yu, Bo Wang, Zengren Song. Deepfake Detection with Data Privacy Protection. IEEE 24th International Workshop on Multimedia Signal Processing, 2022. (PDF)
[34] Mengnan Zhao, Xiaorui Dai, Bo Wang, Fei Yu, Fei Wei. Further Understanding Towards Sparsity Adversarial Attacks. The 8th International Conference on Artificial Intelligence and Security, 2022: 200-212. (PDF)
[33] Guisheng Liu, Yi Li, Yanqing Guo, Xiangyang Luo, Bo Wang. Multi-Attribute Controlled Text Generation with Contrastive-Generator and External-Discriminator. The 29th International Conference on Computational Linguistics, 2022: 5904-5913. (PDF)
[32] Xunpeng Zhang, Xiangwei Kong, Pengda Wang, Bo Wang. Cover-Source Mismatch in Deep Spatial Steganalysis. The 18th International Workshop on Digital Forensics and Watermarking, 2019. (PDF) (PPT)
[31] Feipeng Lin, Bo Wang, Yabin Li. Differential Direction Based Reversible Data Hiding. The 3rd International Conference on Cloud Computing and Security, 2017. (PDF)
[30] Fulong Yang, Yabin Li, Kun Chong, Bo Wang. Double JPEG Compression Detection Based on Fusion Features. EAI International Conference on Machine Learning and Intelligent Communications, 2017. (PDF)
[29] Yabin Li, Bo Wang, Kun Chong, Yanqing Guo. Complexity Based Sample Selection for Camera Source Identification. EAI International Conference on Machine Learning and Intelligent Communications, 2017. (PDF)
[28] Guowen Zhang, Bo Wang, Yabin Li. Cross-Class and Inter-Class Alignment Based Camera Source Identification for Re-Compression Images. The 9th International Conference on Image and Graphics, 2017. (PDF)
[27] Wei Zhong, Xingang You, Xiangwei Kong, Bo Wang. Electric Network Frequency Estimation Based on Linear Canonical Transfer for Audio Signal Authentication. The 25th European Signal Processing Conference, 2017. (PDF)
[26] Xiangwei Kong, Bo Wang, Mingliang Yang, Yue Feng. Multiple Heterogeneous JPEG Image Hierarchical Forensics. The 9th International Symposium on Digital Forensics and Information Security, 2016. (PDF)
[25] Jun Guo, Yanqing Guo, Bo Wang, Xiangwei Kong, Ran He. Topology Preserving Dictrionary Learning for Pattern Classification. IEEE International Joint Conference on Neural Networks, 2016. (PDF)
[24] Ming Li, Qian Liu, Bo Wang, Yanqing Guo, Xiangwei Kong. PN-Sequence Masked Spread-Spectrum Data Embedding. IEEE International Conference on Communication in China, 2015. (PDF)
[23] TAN Yue, WANG Bo, ZHAO Meijuan, KONG Xiangwei, GUO Yanqing, LI Ming. Camera Source Identification with Limited Labeled Training Set. 12th China Information Hiding and Multimedia Security Workshop, 2015. (In Chinese) (PPT)
[22] Jun Guo, Yanqing Guo, Yi Li, Bo Wang, Ming Li. Locality Sensitive Discriminative Dictionary Learning. IEEE International Conference on Image Processing, 2015. (PDF) (PPT)
[21] Yue Tan, Bo Wang, Ming Li, Meijuan Zhao, Yanqing Guo, Yunqing Shi. Camera Source Identification with Limited Labeled Training Set. International Workshop on Digital-forensics and Watermarking, 2015. (PDF) (PPT)
[20] Wei Zhong, Xiangwei Kong, Xin-gang You, Bo Wang. Recording Device Identification Based on Cepstral Mixed Features. Fifth International Conference on Computer Engineering and Networks, 2015. (PDF) (PPT)
[19] Yue Tan, Bo Wang, Meijuan Zhao, Xiangwei Kong, Ming Li, Patch-Based Sensor Pattern Noise for Camera Source Identification, IEEE China Summit & International Conference on Signal and Information Processing, 2015. (PDF) (PPT)
[18] Ming Li, Lingyun Li, Yanqing Guo, Bo Wang, Xiangwei Kong, Security Analysis of Optimal Multi-Carrier Spread-Spectrum Embedding, IEEE China Summit & International Conference on Signal and Information Processing, 2015. (PDF)
[17] Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang. Exposing The Double Compression in MP3 Audio by Frequency Vibration. IEEE China Summit & International Conference on Signal and Information Processing, 2014. (PDF) (PPT)
[16] Lanying Wu, Xiangwei Kong, Bo Wang, Shize Shang. Image Tampering Localization via Estimating the Non-Aligned Double JPEG Compression. SPIE Electronic Imaging, 2014. (PDF)
[15] Yanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao. Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation. International Workshop on Digital-forensics and Watermarking, 2013. (PDF)
[14] Xiaofeng Li, Xiangwei Kong, Bo Wang, Yanqing Guo, Xingang You. Generalized Transfer Component Analysis for Mismatched JPEG Steganalysis. IEEE International Conference on Image Processing, 2013. (PDF) (PPT)
[13] Shuhan Luan, Xiangwei Kong, Bo Wang, Yanqing Guo, Xingang You, Silhouette Coefficient Based Approach on Cell-Phone Classification for Unknown Source Images. IEEE International Conference on Communication, 2012. (PDF) (PPT)
[12] Bo Wang, Xiangwei Kong, Image Splicing Localization Based on Re-Demosaicing. International Conference of Electrical and Electronics Engineering, 2011. (PDF)
[11] Lisha Dong, Xiangwei Kong, Bo Wang, Xingang You, Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients. International Conference on Image and Graphics, 2011. (PDF)
[10] Xuehui Sun, Lisha Dong, Bo Wang, Xiangwei Kong, Xin'gang You. Source Cell-phone Identification Based on Multi-feature Fusion. International Conference on Image Processing, Computer Vision, and Pattern Recognition, 2010. (PDF)
[9] Xiangwei Kong, Xin'gang You, Bo Wang, Shize Shang, Linjie Shen. Laser Printer Source Forensics For Arbitrary Chinese Characters. International Conference on Security and Managements, 2010. (PDF)
[8] Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng. Source Camera Identification Forensics Based on Wavelet Features. The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. (PDF) (PPT)
[7] Bo Wang, Xiangwei Kong, XingangYou. Source Camera Identification Using Support Vector Machines. Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, AdvanceAdvances in Digital Forensics V, 2009, 107-118. (PDF) (PPT)
[6] Guangxin CHEN, Xiangwei KONG, Wei ZHONG, Bo WANG. Detection of Double MP3 Compression Based on Fluctuation Intensity of Quantized MDCT Coefficients. 10th China Information Hiding and Multimedia Security Workshop, 2012. (In Chinese) (PDF)
[5] Qian XIAO, Xiangwei KONG, Bo WANG. Steganalysis of LSB Matching Based on Mean Co-ocurrence Matrix of The Sum Features Using Image Estimate. 10th China Information Hiding and Multimedia Security Workshop, 2012. (In Chinese) (PDF)
[4] GUO Xiaoming, WANG Bo, KONG Xiangwei, ZHOU Linna. Source Camera Identification Based on Image Pattern Noise Features. 9th China Information Hiding and Multimedia Security Workshop, 2010. (In Chinese) (PDF)
[3] SHANG Shize, WANG Bo, KONG Xiangwei, YOU Xingang. The Identification of Image USM Sharpening in Photoshop. 9th China Information Hiding and Multimedia Security Workshop, 2010. (In Chinese) (PDF)
[2] SUN Xuehui, DONG Lisha, WANG Bo, KONG Xiangwei, You Xingang. Identifying Source Cell Phone Using Multi-Feature. 9th China Information Hiding and Multimedia Security Workshop, 2010. (In Chinese) (PDF)
[1] WANG Bo, KONG Xiangwei, YOU Xingang. Digital Forensic Method Using Color Consistency. China Computer Security Workshop, 2008. (In Chinese) (PDF) (PPT)