


default search action
Yihao Wang 0006
Person information
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Yihao Wang — disambiguation page
- Yihao Wang 0001
— Harbin Institute of Technology, Harbin, China - Yihao Wang 0002
— Chinese Academy of Sciences Chongqing Institute, Chongqing, China - Yihao Wang 0003
— Xi'an Institute of Optics and Precision Mechanics, Xi'an, China - Yihao Wang 0004
— JD.com, Beijing, China - Yihao Wang 0005
— Northeast Institute of Geography and Agroecology, Chinese Academy of Sciences, Changchun, China - Yihao Wang 0007
— Zhejiang University, Hangzhou, China - Yihao Wang 0008
— Nanjing University of Science and Technology, Nanjing, China - Yihao Wang 0009
— University of Bonn, Germany - Yihao Wang 0010
— Sun Yat-sen University, Guangzhou, China - Yihao Wang 0011
— Fudan University, Shanghai, China - Yihao Wang 0012
— University of Electronic Science and Technology of China, Sichuan, China - Yihao Wang 0013
— Southern Methodist University, Dallas, TX, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j8]Yihao Wang
, Ruiqi Song
, Lingxiao Li
, Yifan Tang
, Ru Zhang
, Jianyi Liu
:
User profile constructed by multiple attributes for optimizing linguistic steganalysis in social networks. Expert Syst. Appl. 297: 129311 (2026)- 2025
[j7]Yihao Wang
, Ruiqi Song
, Lingxiao Li
, Ru Zhang
, Jianyi Liu
:
Dynamically allocated interval-based generative linguistic steganography with roulette wheel. Appl. Soft Comput. 176: 113101 (2025)
[j6]Yifan Tang
, Yihao Wang
, Ru Zhang
, Jianyi Liu
:
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. IEEE Signal Process. Lett. 32: 541-545 (2025)
[j5]Jie Wang
, Yihao Wang
, Yihao Li
, Ru Zhang
, Jianyi Liu
:
Multi-Classification of Linguistic Steganography Driven by Large Language Models. IEEE Signal Process. Lett. 32: 1440-1444 (2025)- 2023
[j4]Yihao Wang
, Ru Zhang
, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 (2023)
[j3]Yihao Wang
, Ru Zhang
, Jianyi Liu:
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario. IEEE Signal Process. Lett. 30: 1232-1236 (2023)- 2021
[j2]Ruixia Jin
, Yihao Wang
, Yuanyuan Ma
, Tao Li, Xintao Duan
:
Gain-Loss Evaluation-Based Generic Selection for Steganalysis Feature. Symmetry 13(10): 1775 (2021)- 2020
[j1]Yihao Wang
, Yuanyuan Ma
, Ruixia Jin
, Pei Liu, Ning Ruan:
Comprehensive Criteria-Based Generalized Steganalysis Feature Selection Method. IEEE Access 8: 154418-154435 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-01 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







