1. XiaoXia, Li,Jianjun Wang,A steganographic method based upon JPEG and particle swarm optimization algorithm, Information Sciences, 2007, Vol.177, No.15, pp.3099-3109.。
2. Huan Xu, Jianjun Wang, Hyoung Joong Kim, Near-Optimal Solution to Pair-wise LSB Matching by Using Immune Programming Strategy, Information Sciences 180 (2010) 1201–1217。
3. Jianjun Wang, Yiting Sun , Huan Xu , Kangkang Chen,An improved section-wise exploiting modification direction method,Signal Processing 90 (2010) 2954–2964。
4. Han,Lian, Zheng Wang,Jianjun Wang,and Liming Zhang, Speaker Identification Using Reduced RBF Networks Array, Lecture Notes in Computer Science, 3171,2004,924-929。
5. 王建军,王颖, 一种基于k-Fibonacci矩阵和JPEG的数据隐藏方法,系统工程与电子技术,2006,Vol.28,No.8, pp.1252-1257+1278.
6. 李晓霞, 王建军,一种基于粒子群优化的信息隐藏方法,系统工程与电子技术,2007, Vol. 29, No. 4, pp. 655-658.。
7. 李晓霞,王建军,一种抗RS攻击的隐秘算法,系统工程与电子技术,2007,Vol.29, No.8,pp1358-1361.(Ei:074110859237),
8. 王炎,王建军, 一种基于ICA的多边形曲线水印算法,计算机辅助设计与图像图形学学报,2006,Vol.18, No.7, pp. 1054-1059.
9. 陈开亮,王建军,一种HVS和Contourlet结合的图像水印算法,计算机辅助设计与图像图形学学报,2007,Vol. 19, No. 6, June, 2007, pp.811-816.
10.Kang- Kang Chen, Jian-Jun Wang, A Novel Reversible Data Hiding Based on Exploiting Modification Direction Algorithm, Multimedia Information Networking and Security, 2009. MINES 09. International Conference on. Volume 1, 18-20 Nov. 2009 pp.514-518.
11.Chen Kailiang, Wang Jianjun, Yongsoo Choi, An image watermark scheme based on NSCT and ICA, Proceedings of International Ubiquitous Conference, January 22, 2008, Busan, Korea, pp.37-42。
12.Chenyi Wang, Jianjun Wang, Yongsoo Choi, Semi-fragile Watermarking for Image Authentication using Second Generation Curvelet Transform,The 3rd International Joint Workshop on Information Security and Its Applications ,IJWISA 2008,February 20-21, 2008,Seoul, Korea,pp.135-143.