The following publications are possibly variants of this publication:
- An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IPRui Miao, Yongfeng Huang. icc 2011: 1-5 [doi]
- A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IPHui Tian, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu. icycs 2008: 647-652 [doi]
- Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate ModulationHui Tian, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen. icl, 21(4):749-752, 2017. [doi]
- Base communication model of IP covert timing channelsChangda Wang, Yulin Yuan, Lei Huang. fcsc, 10(6):1130-1141, 2016. [doi]
- A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in EnterprisesRuming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei. securecomm 2020: 1-21 [doi]
- Exploiting Correlation Characteristics to Detect Covert digital communicationShuhua Huang, Weiwei Liu 0002, Guangjie Liu, Yuewei Dai, Wen Tian. itiis, 14(8):3550-3566, 2020. [doi]
- Steganalysis of compressed speech to detect covert voice over Internet protocol channelsYongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip. iet-ifs, 5(1):26-32, 2011. [doi]
- Research on covert communication channel based on modulation of common compressed speech codecFuFang Li, Binbin Li, Yongfeng Huang 0001, Yuanyong Feng, Lingxi Peng, Naqin Zhou. nca, 34(14):11507-11520, 2022. [doi]
- Spatial Modulation Covert Communication Assisted By Artificial NoiseLuying Huang, Jing Lei 0001, Ying Huang. iccchina 2023: 1-6 [doi]