BibTeX records: Xingming Sun

download as .bib file

@article{DBLP:journals/csse/ZhangZZSMS23,
  author       = {Xiang Zhang and
                  Xiaona Zhang and
                  Xiaorui Zhang and
                  Wei Sun and
                  Ruohan Meng and
                  Xingming Sun},
  title        = {A Derivative Matrix-Based Covert Communication Method in Blockchain},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {46},
  number       = {1},
  pages        = {225--239},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.034915},
  doi          = {10.32604/CSSE.2023.034915},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/ZhangZZSMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ZhouZSWS23,
  author       = {Zhili Zhou and
                  Jianyu Zhu and
                  Yuecheng Su and
                  Meimin Wang and
                  Xingming Sun},
  title        = {Geometric correction code-based robust image watermarking},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {13},
  pages        = {3660--3669},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12143},
  doi          = {10.1049/IPR2.12143},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ZhouZSWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/GuoYCS23,
  author       = {Zhiqing Guo and
                  Gaobo Yang and
                  Jiyou Chen and
                  Xingming Sun},
  title        = {Exposing Deepfake Face Forgeries With Guided Residuals},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {25},
  pages        = {8458--8470},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMM.2023.3237169},
  doi          = {10.1109/TMM.2023.3237169},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/GuoYCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/ZhangZSSJ22,
  author       = {Xiaorui Zhang and
                  Wenfang Zhang and
                  Wei Sun and
                  Xingming Sun and
                  Sunil Kumar Jha},
  title        = {A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data
                  Protection},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {41},
  number       = {3},
  pages        = {1043--1056},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.022305},
  doi          = {10.32604/CSSE.2022.022305},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/ZhangZSSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/FuWSZ22,
  author       = {Zhangjie Fu and
                  Yan Wang and
                  Xingming Sun and
                  Xiaosong Zhang},
  title        = {Semantic and secure search over encrypted outsourcing cloud based
                  on {BERT}},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {2},
  pages        = {162802},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0277-0},
  doi          = {10.1007/S11704-021-0277-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/FuWSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuXS22,
  author       = {Qi Gu and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {{MSPPIR:} Multi-Source Privacy-Preserving Image Retrieval in cloud
                  computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {78--92},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.03.040},
  doi          = {10.1016/J.FUTURE.2022.03.040},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GuXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/YuanYXSW22,
  author       = {Chengsheng Yuan and
                  Peipeng Yu and
                  Zhihua Xia and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {{FLD-SRC:} Fingerprint Liveness Detection for {AFIS} Based on Spatial
                  Ridges Continuity},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {16},
  number       = {4},
  pages        = {817--827},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSTSP.2022.3174655},
  doi          = {10.1109/JSTSP.2022.3174655},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jstsp/YuanYXSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/YuanJSW22,
  author       = {Chengsheng Yuan and
                  Shengming Jiao and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {{MFFFLD:} {A} Multimodal-Feature-Fusion-Based Fingerprint Liveness
                  Detection},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {648--661},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCDS.2021.3062624},
  doi          = {10.1109/TCDS.2021.3062624},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tamd/YuanJSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuZJS22,
  author       = {Zhangjie Fu and
                  Yueyan Zhi and
                  Shouling Ji and
                  Xingming Sun},
  title        = {Remote Attacks on Drones Vision Sensors: An Empirical Study},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3125--3135},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3085412},
  doi          = {10.1109/TDSC.2021.3085412},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FuZJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/MengCZLWS22,
  author       = {Ruohan Meng and
                  Qi Cui and
                  Zhili Zhou and
                  Zhetao Li and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {High-Capacity Steganography Using Object Addition-Based Cover Enhancement
                  for Secure Communication in Networks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {848--862},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2021.3137829},
  doi          = {10.1109/TNSE.2021.3137829},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/MengCZLWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-1,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13338},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06794-5},
  doi          = {10.1007/978-3-031-06794-5},
  isbn         = {978-3-031-06793-8},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-2,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13339},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06788-4},
  doi          = {10.1007/978-3-031-06788-4},
  isbn         = {978-3-031-06787-7},
  timestamp    = {Thu, 28 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-3,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13340},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06791-4},
  doi          = {10.1007/978-3-031-06791-4},
  isbn         = {978-3-031-06790-7},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-13067,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Jianwei Fei and
                  Xingming Sun and
                  Jian Weng},
  title        = {A Robust Document Image Watermarking Scheme using Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2202.13067},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.13067},
  eprinttype    = {arXiv},
  eprint       = {2202.13067},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00753,
  author       = {Zhiqing Guo and
                  Gaobo Yang and
                  Jiyou Chen and
                  Xingming Sun},
  title        = {Exposing Deepfake Face Forgeries with Guided Residuals},
  journal      = {CoRR},
  volume       = {abs/2205.00753},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00753},
  doi          = {10.48550/ARXIV.2205.00753},
  eprinttype    = {arXiv},
  eprint       = {2205.00753},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/JiangXS21,
  author       = {Leqi Jiang and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {Chapter Three - Review on privacy-preserving data comparison protocols
                  in cloud computing},
  journal      = {Adv. Comput.},
  volume       = {120},
  pages        = {81--119},
  year         = {2021},
  url          = {https://doi.org/10.1016/bs.adcom.2020.09.002},
  doi          = {10.1016/BS.ADCOM.2020.09.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/JiangXS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/YuanCSWW21,
  author       = {Chengsheng Yuan and
                  Qi Cui and
                  Xingming Sun and
                  Q. M. Jonathan Wu and
                  Sheng Wu},
  title        = {Chapter Five - Fingerprint liveness detection using an improved {CNN}
                  with the spatial pyramid pooling structure},
  journal      = {Adv. Comput.},
  volume       = {120},
  pages        = {157--193},
  year         = {2021},
  url          = {https://doi.org/10.1016/bs.adcom.2020.10.002},
  doi          = {10.1016/BS.ADCOM.2020.10.002},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/YuanCSWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cviu/GuoYCS21,
  author       = {Zhiqing Guo and
                  Gaobo Yang and
                  Jiyou Chen and
                  Xingming Sun},
  title        = {Fake face detection via adaptive manipulation traces extraction network},
  journal      = {Comput. Vis. Image Underst.},
  volume       = {204},
  pages        = {103170},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cviu.2021.103170},
  doi          = {10.1016/J.CVIU.2021.103170},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cviu/GuoYCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouWYFSW21,
  author       = {Zhili Zhou and
                  Meimin Wang and
                  Ching{-}Nung Yang and
                  Zhangjie Fu and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Blockchain-based decentralized reputation system in E-commerce environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {124},
  pages        = {155--167},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.05.035},
  doi          = {10.1016/J.FUTURE.2021.05.035},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouWYFSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/YangXZSH21,
  author       = {Zhongliang Yang and
                  Lingyun Xiang and
                  Si{-}yu Zhang and
                  Xingming Sun and
                  Yongfeng Huang},
  title        = {Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {28},
  pages        = {409--413},
  year         = {2021},
  url          = {https://doi.org/10.1109/LSP.2021.3058889},
  doi          = {10.1109/LSP.2021.3058889},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/YangXZSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/ZhouWS21,
  author       = {Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {Multiple Distance-Based Coding: Toward Scalable Feature Matching for
                  Large-Scale Web Image Search},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {7},
  number       = {3},
  pages        = {559--573},
  year         = {2021},
  url          = {https://doi.org/10.1109/TBDATA.2019.2919570},
  doi          = {10.1109/TBDATA.2019.2919570},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/ZhouWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/ShenLLSZ21,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Qi Liu and
                  Xingming Sun and
                  Yan Zhang},
  title        = {Secure Authentication in Cloud Big Data with Hierarchical Attribute
                  Authorization Structure},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {7},
  number       = {4},
  pages        = {668--677},
  year         = {2021},
  url          = {https://doi.org/10.1109/TBDATA.2017.2705048},
  doi          = {10.1109/TBDATA.2017.2705048},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbd/ShenLLSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/ChenFSL21,
  author       = {Junfu Chen and
                  Zhangjie Fu and
                  Xingming Sun and
                  Enlu Li},
  editor       = {Yuxin Peng and
                  Shi{-}Min Hu and
                  Moncef Gabbouj and
                  Kun Zhou and
                  Michael Elad and
                  Kun Xu},
  title        = {Achieving Lightweight Image Steganalysis with Content-Adaptive in
                  Spatial Domain},
  booktitle    = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou,
                  China, August 6-8, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12888},
  pages        = {641--653},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-87355-4\_53},
  doi          = {10.1007/978-3-030-87355-4\_53},
  timestamp    = {Wed, 16 Mar 2022 23:55:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icig/ChenFSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/ChenFSL21,
  author       = {Junfu Chen and
                  Zhangjie Fu and
                  Xingming Sun and
                  Enlu Li},
  editor       = {Huimin Ma and
                  Liang Wang and
                  Changshui Zhang and
                  Fei Wu and
                  Tieniu Tan and
                  Yaonan Wang and
                  Jianhuang Lai and
                  Yao Zhao},
  title        = {Multi-scale Extracting and Second-Order Statistics for Lightweight
                  Steganalysis},
  booktitle    = {Pattern Recognition and Computer Vision - 4th Chinese Conference,
                  {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13020},
  pages        = {548--559},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88007-1\_45},
  doi          = {10.1007/978-3-030-88007-1\_45},
  timestamp    = {Mon, 20 Nov 2023 17:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/prcv/ChenFSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2021-1,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 7th International Conference,
                  {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12736},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78609-0},
  doi          = {10.1007/978-3-030-78609-0},
  isbn         = {978-3-030-78608-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2021-2,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 7th International Conference,
                  {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12737},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78612-0},
  doi          = {10.1007/978-3-030-78612-0},
  isbn         = {978-3-030-78611-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/CaoZWYS20,
  author       = {Yi Cao and
                  Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Chengsheng Yuan and
                  Xingming Sun},
  title        = {Coverless information hiding based on the generation of anime characters},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2020},
  number       = {1},
  pages        = {36},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13640-020-00524-4},
  doi          = {10.1186/S13640-020-00524-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/CaoZWYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShenLSWX20,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xingming Sun and
                  Fushan Wei and
                  Yang Xiang},
  title        = {Efficient cloud-aided verifiable secret sharing scheme with batch
                  verification for smart cities},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {450--456},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2018.10.049},
  doi          = {10.1016/J.FUTURE.2018.10.049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShenLSWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YuanCYMCWS20,
  author       = {Chengsheng Yuan and
                  Xianyi Chen and
                  Peipeng Yu and
                  Ruohan Meng and
                  Weijin Cheng and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {Semi-supervised stacked autoencoder-based deep hierarchical semantic
                  feature for real-time fingerprint liveness detection},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {55--71},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-019-00928-0},
  doi          = {10.1007/S11554-019-00928-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YuanCYMCWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/LiSZY20,
  author       = {Chuanlong Li and
                  Xingming Sun and
                  Zhili Zhou and
                  Yimin Yang},
  title        = {Real-time image carrier generation based on generative adversarial
                  network and fast object detection},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {3},
  pages        = {655--665},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-020-00969-w},
  doi          = {10.1007/S11554-020-00969-W},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/LiSZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhiFSY20,
  author       = {Yueyan Zhi and
                  Zhangjie Fu and
                  Xingming Sun and
                  Jingnan Yu},
  title        = {Security and Privacy Issues of {UAV:} {A} Survey},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {1},
  pages        = {95--101},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-018-1193-x},
  doi          = {10.1007/S11036-018-1193-X},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ZhiFSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/FuLSLT20,
  author       = {Zhangjie Fu and
                  Yangen Liu and
                  Xingming Sun and
                  Yuling Liu and
                  Zuwei Tian},
  title        = {Confusing-Keyword Based Secure Search over Encrypted Cloud Data},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {1},
  pages        = {125--132},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-018-1195-8},
  doi          = {10.1007/S11036-018-1195-8},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/FuLSLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/YuanXSW20,
  author       = {Chengsheng Yuan and
                  Zhihua Xia and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Deep Residual Network With Adaptive Learning Framework for Fingerprint
                  Liveness Detection},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {461--473},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCDS.2019.2920364},
  doi          = {10.1109/TCDS.2019.2920364},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tamd/YuanXSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ShenLBSSC20,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Md. Zakirul Alam Bhuiyan and
                  Jun Shen and
                  Xingming Sun and
                  Aniello Castiglione},
  title        = {Secure Verifiable Database Supporting Efficient Dynamic Operations
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {280--290},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2017.2776402},
  doi          = {10.1109/TETC.2017.2776402},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/ShenLBSSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/ZhouWWSS20,
  author       = {Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Shaohua Wan and
                  Wendi Sun and
                  Xingming Sun},
  title        = {Integrating {SIFT} and {CNN} Feature Matching for Partial-Duplicate
                  Image Detection},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {4},
  number       = {5},
  pages        = {593--604},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETCI.2019.2909936},
  doi          = {10.1109/TETCI.2019.2909936},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetci/ZhouWWSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/ZhouWYS20,
  author       = {Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Yimin Yang and
                  Xingming Sun},
  title        = {Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate
                  Image Search},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {16},
  number       = {2},
  pages        = {54:1--54:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3383582},
  doi          = {10.1145/3383582},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/ZhouWYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/XiaYLSXS20,
  author       = {Zhihua Xia and
                  Chengsheng Yuan and
                  Rui Lv and
                  Xingming Sun and
                  Neal N. Xiong and
                  Yun{-}Qing Shi},
  title        = {A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {50},
  number       = {4},
  pages        = {1526--1536},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSMC.2018.2874281},
  doi          = {10.1109/TSMC.2018.2874281},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/XiaYLSXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2020-1,
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12239},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57884-8},
  doi          = {10.1007/978-3-030-57884-8},
  isbn         = {978-3-030-57883-1},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2020-2,
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12240},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57881-7},
  doi          = {10.1007/978-3-030-57881-7},
  isbn         = {978-3-030-57880-0},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-04945,
  author       = {Zhiqing Guo and
                  Gaobo Yang and
                  Jiyou Chen and
                  Xingming Sun},
  title        = {Fake Face Detection via Adaptive Residuals Extraction Network},
  journal      = {CoRR},
  volume       = {abs/2005.04945},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.04945},
  eprinttype    = {arXiv},
  eprint       = {2005.04945},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-04945.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-12416,
  author       = {Qi Gu and
                  Zhihua Xia and
                  Xingming Sun and
                  Jian Weng},
  title        = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud
                  computing},
  journal      = {CoRR},
  volume       = {abs/2007.12416},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.12416},
  eprinttype    = {arXiv},
  eprint       = {2007.12416},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuanXJCWS19,
  author       = {Chengsheng Yuan and
                  Zhihua Xia and
                  Leqi Jiang and
                  Yi Cao and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {Fingerprint Liveness Detection Using an Improved {CNN} With Image
                  Scale Equalization},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {26953--26966},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2901235},
  doi          = {10.1109/ACCESS.2019.2901235},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YuanXJCWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MengCZFS19,
  author       = {Ruohan Meng and
                  Qi Cui and
                  Zhili Zhou and
                  Zhangjie Fu and
                  Xingming Sun},
  title        = {A Steganography Algorithm Based on CycleGAN for Covert Communication
                  in the Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {90574--90584},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2920956},
  doi          = {10.1109/ACCESS.2019.2920956},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MengCZFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CuiZFMSW19,
  author       = {Qi Cui and
                  Zhili Zhou and
                  Zhangjie Fu and
                  Ruohan Meng and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Image Steganography Based on Foreground Object Generation by Generative
                  Adversarial Networks in Mobile Edge Computing With Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {90815--90824},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2913895},
  doi          = {10.1109/ACCESS.2019.2913895},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CuiZFMSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouCYS19,
  author       = {Zhili Zhou and
                  Jingcheng Chen and
                  Ching{-}Nung Yang and
                  Xingming Sun},
  title        = {Video Copy Detection Using Spatio-Temporal {CNN} Features},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {100658--100665},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2930173},
  doi          = {10.1109/ACCESS.2019.2930173},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouCYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/ZhouYYS19,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Yimin Yang and
                  Xingming Sun},
  title        = {Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing
                  Attacks in Cloud Environment},
  journal      = {Complex.},
  volume       = {2019},
  pages        = {2875676:1--2875676:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2875676},
  doi          = {10.1155/2019/2875676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/ZhouYYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiangCYSZ19,
  author       = {Leqi Jiang and
                  Yi Cao and
                  Chengsheng Yuan and
                  Xingming Sun and
                  Xiaoli Zhu},
  title        = {An effective comparison protocol over encrypted data in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102367},
  doi          = {10.1016/J.JISA.2019.102367},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiangCYSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/YuanSW19,
  author       = {Chengsheng Yuan and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Difference co-occurrence matrix using {BP} neural network for fingerprint
                  liveness detection},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {13},
  pages        = {5157--5169},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-018-3182-1},
  doi          = {10.1007/S00500-018-3182-1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/YuanSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenZHZSX19,
  author       = {Jian Shen and
                  Tianqi Zhou and
                  Debiao He and
                  Yuexin Zhang and
                  Xingming Sun and
                  Yang Xiang},
  title        = {Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {996--1010},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2725953},
  doi          = {10.1109/TDSC.2017.2725953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenZHZSX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FuXZLS19,
  author       = {Zhangjie Fu and
                  Jiashuang Xu and
                  Zhuangdi Zhu and
                  Alex X. Liu and
                  Xingming Sun},
  title        = {Writing in the Air with WiFi Signals for Virtual Reality Devices},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {473--484},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2831709},
  doi          = {10.1109/TMC.2018.2831709},
  timestamp    = {Tue, 05 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/FuXZLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/FuHSVY19,
  author       = {Zhangjie Fu and
                  Fengxiao Huang and
                  Xingming Sun and
                  Athanasios V. Vasilakos and
                  Ching{-}Nung Yang},
  title        = {Enabling Semantic Search Based on Conceptual Graphs over Encrypted
                  Outsourced Data},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {813--823},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2016.2622697},
  doi          = {10.1109/TSC.2016.2622697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/FuHSVY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2019-1,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11632},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24274-9},
  doi          = {10.1007/978-3-030-24274-9},
  isbn         = {978-3-030-24273-2},
  timestamp    = {Thu, 18 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2019-2,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11633},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24265-7},
  doi          = {10.1007/978-3-030-24265-7},
  isbn         = {978-3-030-24264-0},
  timestamp    = {Thu, 18 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2019-3,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11634},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24271-8},
  doi          = {10.1007/978-3-030-24271-8},
  isbn         = {978-3-030-24270-1},
  timestamp    = {Fri, 19 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2019-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2019-4,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11635},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24268-8},
  doi          = {10.1007/978-3-030-24268-8},
  isbn         = {978-3-030-24267-1},
  timestamp    = {Fri, 19 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2019-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouYCS18,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Yi Cao and
                  Xingming Sun},
  title        = {Secret Image Sharing Based on Encrypted Pixels},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15021--15025},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2811722},
  doi          = {10.1109/ACCESS.2018.2811722},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouYCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiaMSSXJ18,
  author       = {Zhihua Xia and
                  Xiaohe Ma and
                  Zixuan Shen and
                  Xingming Sun and
                  Neal N. Xiong and
                  Byeungwoo Jeon},
  title        = {Secure Image {LBP} Feature Extraction in Cloud-Based Smart Campus},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {30392--30401},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2845456},
  doi          = {10.1109/ACCESS.2018.2845456},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiaMSSXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiaSXSJ18,
  author       = {Zhihua Xia and
                  Tianjiao Shi and
                  Neal N. Xiong and
                  Xingming Sun and
                  Byeungwoo Jeon},
  title        = {A Privacy-Preserving Handwritten Signature Verification Method Using
                  Combinational Features and Secure {KNN}},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {46695--46705},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2866411},
  doi          = {10.1109/ACCESS.2018.2866411},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiaSXSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShenCSLS18,
  author       = {Jian Shen and
                  Shaohua Chang and
                  Jun Shen and
                  Qi Liu and
                  Xingming Sun},
  title        = {A lightweight multi-layer authentication protocol for wireless body
                  area networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {956--963},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.11.033},
  doi          = {10.1016/J.FUTURE.2016.11.033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShenCSLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/QinJCDS18,
  author       = {Chuan Qin and
                  Ping Ji and
                  Chin{-}Chen Chang and
                  Jing Dong and
                  Xingming Sun},
  title        = {Non-uniform Watermark Sharing Based on Optimal Iterative {BTC} for
                  Image Tampering Recovery},
  journal      = {{IEEE} Multim.},
  volume       = {25},
  number       = {3},
  pages        = {36--48},
  year         = {2018},
  url          = {https://doi.org/10.1109/MMUL.2018.112142509},
  doi          = {10.1109/MMUL.2018.112142509},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/QinJCDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/YangSCHC18,
  author       = {Bin Yang and
                  Xingming Sun and
                  Enguo Cao and
                  Weifeng Hu and
                  Xianyi Chen},
  title        = {Convolutional neural network for smooth filtering detection},
  journal      = {{IET} Image Process.},
  volume       = {12},
  number       = {8},
  pages        = {1432--1438},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ipr.2017.0683},
  doi          = {10.1049/IET-IPR.2017.0683},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/YangSCHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ChenYTLWS18,
  author       = {Beijing Chen and
                  Ming Yu and
                  Yuhang Tian and
                  Leida Li and
                  Dingcheng Wang and
                  Xingming Sun},
  title        = {Multiple-parameter fractional quaternion Fourier transform and its
                  application in colour image encryption},
  journal      = {{IET} Image Process.},
  volume       = {12},
  number       = {12},
  pages        = {2238--2249},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ipr.2018.5440},
  doi          = {10.1049/IET-IPR.2018.5440},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ChenYTLWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ZhangSY18,
  author       = {Yanhua Zhang and
                  Xingming Sun and
                  Zhanke Yu},
  title        = {K-barrier coverage in wireless sensor networks based on immune particle
                  swarm optimisation},
  journal      = {Int. J. Sens. Networks},
  volume       = {27},
  number       = {4},
  pages        = {250--258},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSNET.2018.10014900},
  doi          = {10.1504/IJSNET.2018.10014900},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ZhangSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/LiS18,
  author       = {Chuanlong Li and
                  Xingming Sun},
  title        = {A novel meteorological sensor data acquisition approach based on unmanned
                  aerial vehicle},
  journal      = {Int. J. Sens. Networks},
  volume       = {28},
  number       = {2},
  pages        = {80--88},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSNET.2018.096226},
  doi          = {10.1504/IJSNET.2018.096226},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/LiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenZWSX18,
  author       = {Jian Shen and
                  Tianqi Zhou and
                  Fushan Wei and
                  Xingming Sun and
                  Yang Xiang},
  title        = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G}
                  in the Social Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {2526--2536},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2775248},
  doi          = {10.1109/JIOT.2017.2775248},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenZWSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinCLZS18,
  author       = {Chuan Qin and
                  Xueqin Chen and
                  Xiangyang Luo and
                  Xinpeng Zhang and
                  Xingming Sun},
  title        = {Perceptual image hashing via dual-cross pattern encoding and salient
                  structure detection},
  journal      = {Inf. Sci.},
  volume       = {423},
  pages        = {284--302},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2017.09.060},
  doi          = {10.1016/J.INS.2017.09.060},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/QinCLZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangSGXC18,
  author       = {Bin Yang and
                  Xingming Sun and
                  Honglei Guo and
                  Zhihua Xia and
                  Xianyi Chen},
  title        = {A copy-move forgery detection method based on {CMFD-SIFT}},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {1},
  pages        = {837--855},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-016-4289-y},
  doi          = {10.1007/S11042-016-4289-Y},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/YangSGXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangLYLLS18,
  author       = {Dengyong Zhang and
                  Zaoshan Liang and
                  Gaobo Yang and
                  Qingguo Li and
                  Leida Li and
                  Xingming Sun},
  title        = {A robust forgery detection algorithm for object removal by exemplar-based
                  image inpainting},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {10},
  pages        = {11823--11842},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4829-0},
  doi          = {10.1007/S11042-017-4829-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangLYLLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiWWSQ18,
  author       = {Jin{-}Feng Li and
                  Hong{-}Xia Wang and
                  Tao Wu and
                  Xingming Sun and
                  Qing Qian},
  title        = {Norm ratio-based audio watermarking scheme in {DWT} domain},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {12},
  pages        = {14481--14497},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5024-z},
  doi          = {10.1007/S11042-017-5024-Z},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiWWSQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiaLS18,
  author       = {Zhihua Xia and
                  Rui Lv and
                  Xingming Sun},
  title        = {Rotation-invariant Weber pattern and Gabor feature for fingerprint
                  liveness detection},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18187--18200},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5517-9},
  doi          = {10.1007/S11042-017-5517-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiaLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/ZhouWS18,
  author       = {Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {Encoding multiple contextual clues for partial-duplicate image retrieval},
  journal      = {Pattern Recognit. Lett.},
  volume       = {109},
  pages        = {18--26},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.patrec.2017.08.013},
  doi          = {10.1016/J.PATREC.2017.08.013},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/prl/ZhouWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangFS18,
  author       = {Zhenghong Wang and
                  Zhangjie Fu and
                  Xingming Sun},
  title        = {Semantic Contextual Search Based on Conceptual Graphs over Encrypted
                  Cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {1420930:1--1420930:10},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/1420930},
  doi          = {10.1155/2018/1420930},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiaZSQR18,
  author       = {Zhihua Xia and
                  Yi Zhu and
                  Xingming Sun and
                  Zhan Qin and
                  Kui Ren},
  title        = {Towards Privacy-Preserving Content-Based Image Retrieval in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {1},
  pages        = {276--286},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2491933},
  doi          = {10.1109/TCC.2015.2491933},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/XiaZSQR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/DingYLZLS18,
  author       = {Xiangling Ding and
                  Gaobo Yang and
                  Ran Li and
                  Lebing Zhang and
                  Yue Li and
                  Xingming Sun},
  title        = {Identification of Motion-Compensated Frame Rate Up-Conversion Based
                  on Residual Signals},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {28},
  number       = {7},
  pages        = {1497--1512},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSVT.2017.2676162},
  doi          = {10.1109/TCSVT.2017.2676162},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/DingYLZLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/QianWSCWS18,
  author       = {Qing Qian and
                  Hongxia Wang and
                  Xingming Sun and
                  Yunhe Cui and
                  Huan Wang and
                  Canghong Shi},
  title        = {Speech authentication and content recovery scheme for security communication
                  and storage},
  journal      = {Telecommun. Syst.},
  volume       = {67},
  number       = {4},
  pages        = {635--649},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11235-017-0360-x},
  doi          = {10.1007/S11235-017-0360-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/QianWSCWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/ChenWWS18,
  author       = {Yanli Chen and
                  Hongxia Wang and
                  Hanzhou Wu and
                  Xingming Sun},
  title        = {A video error concealment method using data hiding based on compressed
                  sensing over lossy channel},
  journal      = {Telecommun. Syst.},
  volume       = {68},
  number       = {2},
  pages        = {337--349},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11235-017-0393-1},
  doi          = {10.1007/S11235-017-0393-1},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/ChenWWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuXSLX18,
  author       = {Zhangjie Fu and
                  Lili Xia and
                  Xingming Sun and
                  Alex X. Liu and
                  Guowu Xie},
  title        = {Semantic-Aware Searching Over Encrypted Data for Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2359--2371},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819121},
  doi          = {10.1109/TIFS.2018.2819121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuXSLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/XuFCTLDSL18,
  author       = {Xiaolong Xu and
                  Shucun Fu and
                  Qing Cai and
                  Wei Tian and
                  Wenjie Liu and
                  Wanchun Dou and
                  Xingming Sun and
                  Alex X. Liu},
  title        = {Dynamic Resource Allocation for Load Balancing in Fog Environment},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/6421607},
  doi          = {10.1155/2018/6421607},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/XuFCTLDSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-1,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11063},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00006-6},
  doi          = {10.1007/978-3-030-00006-6},
  isbn         = {978-3-030-00005-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-2,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11064},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00009-7},
  doi          = {10.1007/978-3-030-00009-7},
  isbn         = {978-3-030-00008-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-3,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7},
  doi          = {10.1007/978-3-030-00012-7},
  isbn         = {978-3-030-00011-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-4,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8},
  doi          = {10.1007/978-3-030-00015-8},
  isbn         = {978-3-030-00014-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-5,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11067},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00018-9},
  doi          = {10.1007/978-3-030-00018-9},
  isbn         = {978-3-030-00017-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-5.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2018-6,
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11068},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00021-9},
  doi          = {10.1007/978-3-030-00021-9},
  isbn         = {978-3-030-00020-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2018-6.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShenWWSMH17,
  author       = {Jian Shen and
                  Chen Wang and
                  Anxi Wang and
                  Xingming Sun and
                  Sangman Moh and
                  Patrick C. K. Hung},
  title        = {Organized topology based routing protocol in incompletely predictable
                  ad-hoc networks},
  journal      = {Comput. Commun.},
  volume       = {99},
  pages        = {107--118},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2016.07.009},
  doi          = {10.1016/J.COMCOM.2016.07.009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ShenWWSMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DingDYSHS17,
  author       = {Xiangling Ding and
                  Yingzhuo Deng and
                  Gaobo Yang and
                  Yun Song and
                  Dajiang He and
                  Xingming Sun},
  title        = {Design of new scan orders for perceptual encryption of {H.264/AVC}
                  videos},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {55--65},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0492},
  doi          = {10.1049/IET-IFS.2015.0492},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DingDYSHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhouWHS17,
  author       = {Zhili Zhou and
                  Q. M. Jonathan Wu and
                  Fang Huang and
                  Xingming Sun},
  title        = {Fast and accurate near-duplicate image elimination for visual sensor
                  networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717694172},
  doi          = {10.1177/1550147717694172},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhouWHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/LiuSXS17,
  author       = {Dandan Liu and
                  Jian Shen and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {A Content-Based Image Retrieval Scheme Using an Encrypted Difference
                  Histogram in Cloud Computing},
  journal      = {Inf.},
  volume       = {8},
  number       = {3},
  pages        = {96},
  year         = {2017},
  url          = {https://doi.org/10.3390/info8030096},
  doi          = {10.3390/INFO8030096},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/LiuSXS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GaoWYCZS17,
  author       = {Guangyong Gao and
                  Xiangdong Wan and
                  Shimao Yao and
                  Zongmin Cui and
                  Caixue Zhou and
                  Xingming Sun},
  title        = {Reversible data hiding with contrast enhancement and tamper localization
                  for medical images},
  journal      = {Inf. Sci.},
  volume       = {385},
  pages        = {250--265},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.01.009},
  doi          = {10.1016/J.INS.2017.01.009},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/GaoWYCZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XiaXVS17,
  author       = {Zhihua Xia and
                  Neal N. Xiong and
                  Athanasios V. Vasilakos and
                  Xingming Sun},
  title        = {{EPCBIR:} An efficient and privacy-preserving content-based image
                  retrieval scheme in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {387},
  pages        = {195--204},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.12.030},
  doi          = {10.1016/J.INS.2016.12.030},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XiaXVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLYLS17,
  author       = {Dengyong Zhang and
                  Qingguo Li and
                  Gaobo Yang and
                  Leida Li and
                  Xingming Sun},
  title        = {Detection of image seam carving by using weber local descriptor and
                  local binary patterns},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {36},
  pages        = {135--144},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.09.003},
  doi          = {10.1016/J.JISA.2017.09.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLYLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ShenLLHS17,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Qi Liu and
                  Debiao He and
                  Xingming Sun},
  title        = {An Enhanced Cloud Data Storage Auditing Protocol Providing Strong
                  Security and Efficiency for Smart City},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {923--938},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2050},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ShenLLHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ZhangYYXLS17,
  author       = {Dengyong Zhang and
                  Ting Yin and
                  Gaobo Yang and
                  Ming Xia and
                  Leida Li and
                  Xingming Sun},
  title        = {Detecting image seam carving with low scaling ratio using multi-scale
                  spatial and spectral entropies},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {48},
  pages        = {281--291},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.07.006},
  doi          = {10.1016/J.JVCIR.2017.07.006},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/ZhangYYXLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ChenQSS17,
  author       = {Beijing Chen and
                  Xiaoming Qi and
                  Xingming Sun and
                  Yun{-}Qing Shi},
  title        = {Quaternion pseudo-Zernike moments combining both of {RGB} information
                  and depth information for color image splicing detection},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {49},
  pages        = {283--290},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.08.011},
  doi          = {10.1016/J.JVCIR.2017.08.011},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/ChenQSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PengGLS17,
  author       = {Fei Peng and
                  Xiaoqing Gong and
                  Min Long and
                  Xingming Sun},
  title        = {A selective encryption scheme for protecting {H.264/AVC} video in
                  multimedia social network},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {3},
  pages        = {3235--3253},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3710-x},
  doi          = {10.1007/S11042-016-3710-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PengGLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiaYLLS17,
  author       = {Min Xia and
                  Gaobo Yang and
                  Leida Li and
                  Ran Li and
                  Xingming Sun},
  title        = {Detecting video frame rate up-conversion based on frame-level analysis
                  of average texture variation},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {6},
  pages        = {8399--8421},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3468-1},
  doi          = {10.1007/S11042-016-3468-1},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/XiaYLLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuHSQ17,
  author       = {Zhenghui Liu and
                  Jiwu Huang and
                  Xingming Sun and
                  Chuanda Qi},
  title        = {A security watermark scheme used for digital speech forensics},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {7},
  pages        = {9297--9317},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3533-9},
  doi          = {10.1007/S11042-016-3533-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuHSQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SongYXZS17,
  author       = {Yun Song and
                  Gaobo Yang and
                  Hongtao Xie and
                  Dengyong Zhang and
                  Xingming Sun},
  title        = {Residual domain dictionary learning for compressed sensing video recovery},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {7},
  pages        = {10083--10096},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3599-4},
  doi          = {10.1007/S11042-016-3599-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SongYXZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangWSQ17,
  author       = {Huan Wang and
                  Hong{-}Xia Wang and
                  Xingming Sun and
                  Qing Qian},
  title        = {A passive authentication scheme for copy-move forgery based on package
                  clustering algorithm},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {10},
  pages        = {12627--12644},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3687-5},
  doi          = {10.1007/S11042-016-3687-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangWSQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MohammadSYYYJ17,
  author       = {Nur Mohammad and
                  Xingming Sun and
                  Hengfu Yang and
                  Jianping Yin and
                  Gaobo Yang and
                  Mingfang Jiang},
  title        = {Lossless visible watermarking based on adaptive circular shift operation
                  for BTC-compressed images},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {11},
  pages        = {13301--13313},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3757-8},
  doi          = {10.1007/S11042-016-3757-8},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MohammadSYYYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShenTZSX17,
  author       = {Jian Shen and
                  Haowen Tan and
                  Yan Zhang and
                  Xingming Sun and
                  Yang Xiang},
  title        = {A new lightweight {RFID} grouping authentication protocol for multiple
                  tags in mobile environment},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {21},
  pages        = {22761--22783},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-017-4386-6},
  doi          = {10.1007/S11042-017-4386-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShenTZSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShenTZSX17a,
  author       = {Jian Shen and
                  Haowen Tan and
                  Yan Zhang and
                  Xingming Sun and
                  Yang Xiang},
  title        = {Erratum to: {A} new lightweight {RFID} grouping authentication protocol
                  for multiple tags in mobile environment},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {21},
  pages        = {22785},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-017-4602-4},
  doi          = {10.1007/S11042-017-4602-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShenTZSX17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ShenLSLS17,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Jun Shen and
                  Qi Liu and
                  Xingming Sun},
  title        = {A secure cloud-assisted urban data sharing framework for ubiquitous-cities},
  journal      = {Pervasive Mob. Comput.},
  volume       = {41},
  pages        = {219--230},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.03.013},
  doi          = {10.1016/J.PMCJ.2017.03.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/ShenLSLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/LiYZDS17,
  author       = {Yue Li and
                  Gaobo Yang and
                  Yapei Zhu and
                  Xiangling Ding and
                  Xingming Sun},
  title        = {Adaptive Inter {CU} Depth Decision for {HEVC} Using Optimal Selection
                  Model and Encoding Parameters},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {63},
  number       = {3},
  pages        = {535--546},
  year         = {2017},
  url          = {https://doi.org/10.1109/TBC.2017.2704423},
  doi          = {10.1109/TBC.2017.2704423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbc/LiYZDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouWWYS17,
  author       = {Zhili Zhou and
                  Yunlong Wang and
                  Q. M. Jonathan Wu and
                  Ching{-}Nung Yang and
                  Xingming Sun},
  title        = {Effective and Efficient Global Context Verification for Image Copy
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {48--63},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601065},
  doi          = {10.1109/TIFS.2016.2601065},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/LiYZDS17,
  author       = {Yue Li and
                  Gaobo Yang and
                  Yapei Zhu and
                  Xiangling Ding and
                  Xingming Sun},
  title        = {Unimodal Stopping Model-Based Early {SKIP} Mode Decision for High-Efficiency
                  Video Coding},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {19},
  number       = {7},
  pages        = {1431--1441},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMM.2017.2669863},
  doi          = {10.1109/TMM.2017.2669863},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/LiYZDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/GuSS17,
  author       = {Bin Gu and
                  Xingming Sun and
                  Victor S. Sheng},
  title        = {Structural Minimax Probability Machine},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {28},
  number       = {7},
  pages        = {1646--1656},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNNLS.2016.2544779},
  doi          = {10.1109/TNNLS.2016.2544779},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/GuSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/ShenYLS17,
  author       = {Linchuan Shen and
                  Gaobo Yang and
                  Leida Li and
                  Xingming Sun},
  editor       = {Yong Liu and
                  Liang Zhao and
                  Guoyong Cai and
                  Guoqing Xiao and
                  Kenli Li and
                  Lipo Wang},
  title        = {Robust detection for object removal with post-processing by exemplar-based
                  image inpainting},
  booktitle    = {13th International Conference on Natural Computation, Fuzzy Systems
                  and Knowledge Discovery, {ICNC-FSKD} 2017, Guilin, China, July 29-31,
                  2017},
  pages        = {2730--2736},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/FSKD.2017.8393211},
  doi          = {10.1109/FSKD.2017.8393211},
  timestamp    = {Mon, 08 Mar 2021 17:45:50 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/ShenYLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShenFLWJS17,
  author       = {Jian Shen and
                  Meng Feng and
                  Dengzhi Liu and
                  Chen Wang and
                  Jiachen Jiang and
                  Xingming Sun},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Enhanced Remote Password-Authenticated Key Agreement Based on Smart
                  Card Supporting Password Changing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {454--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_27},
  doi          = {10.1007/978-3-319-72359-4\_27},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShenFLWJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2017-1,
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10602},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68505-2},
  doi          = {10.1007/978-3-319-68505-2},
  isbn         = {978-3-319-68504-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2017-2,
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7},
  doi          = {10.1007/978-3-319-68542-7},
  isbn         = {978-3-319-68541-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiCSLY16,
  author       = {Jing Li and
                  Xiubo Chen and
                  Xingming Sun and
                  Zongpeng Li and
                  Yixian Yang},
  title        = {Quantum network coding for multi-unicast problem based on 2D and 3D
                  cluster states},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {4},
  pages        = {042301:1--042301:15},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5539-3},
  doi          = {10.1007/S11432-016-5539-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiCSLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiXCSY16,
  author       = {Zhen{-}Zhen Li and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Xingming Sun and
                  Yi{-}Xian Yang},
  title        = {Multi-User Quantum Wireless Network Communication Based on Multi-Qubit
                  {GHZ} State},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {20},
  number       = {12},
  pages        = {2470--2473},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCOMM.2016.2610434},
  doi          = {10.1109/LCOMM.2016.2610434},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiXCSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhouYCSLW16,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Beijing Chen and
                  Xingming Sun and
                  Qi Liu and
                  Q. M. Jonathan Wu},
  title        = {Effective and Efficient Image Copy Detection with Resistance to Arbitrary
                  Rotation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {6},
  pages        = {1531--1540},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDP7341},
  doi          = {10.1587/TRANSINF.2015EDP7341},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhouYCSLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/PanZLXS16,
  author       = {Zhaoqing Pan and
                  Yun Zhang and
                  Jianjun Lei and
                  Long Xu and
                  Xingming Sun},
  title        = {Early {DIRECT} mode decision based on all-zero block and rate distortion
                  cost for multiview video coding},
  journal      = {{IET} Image Process.},
  volume       = {10},
  number       = {1},
  pages        = {9--15},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ipr.2014.1018},
  doi          = {10.1049/IET-IPR.2014.1018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/PanZLXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinCYWS16,
  author       = {Chuan Qin and
                  Xueqin Chen and
                  Dengpan Ye and
                  Jinwei Wang and
                  Xingming Sun},
  title        = {A novel image hashing scheme with perceptual robustness using block
                  truncation coding},
  journal      = {Inf. Sci.},
  volume       = {361-362},
  pages        = {84--99},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.04.036},
  doi          = {10.1016/J.INS.2016.04.036},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/QinCYWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinWZS16,
  author       = {Chuan Qin and
                  Huili Wang and
                  Xinpeng Zhang and
                  Xingming Sun},
  title        = {Self-embedding fragile watermarking based on reference-data interleaving
                  and adaptive selection of embedding mode},
  journal      = {Inf. Sci.},
  volume       = {373},
  pages        = {233--250},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.09.001},
  doi          = {10.1016/J.INS.2016.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/QinWZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YaoYSL16,
  author       = {Yuxuan Yao and
                  Gaobo Yang and
                  Xingming Sun and
                  Leida Li},
  title        = {Detecting video frame-rate up-conversion based on periodic properties
                  of edge-intensity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {26},
  pages        = {39--50},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2015.12.001},
  doi          = {10.1016/J.JISA.2015.12.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YaoYSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/GaoSSZCX16,
  author       = {Guangyong Gao and
                  Yun{-}Qing Shi and
                  Xingming Sun and
                  Caixue Zhou and
                  Zongmin Cui and
                  Liya Xu},
  title        = {Reversible Watermarking with Adaptive Embedding Threshold Matrix},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {9},
  pages        = {4603--4624},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.09.031},
  doi          = {10.3837/TIIS.2016.09.031},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/GaoSSZCX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhangWDLZXSW16,
  author       = {Jiliang Zhang and
                  Qiang Wu and
                  Yipeng Ding and
                  Yong{-}Qiang Lv and
                  Qiang Zhou and
                  Zhihua Xia and
                  Xingming Sun and
                  Xing{-}Wei Wang},
  title        = {Techniques for Design and Implementation of an FPGA-Specific Physical
                  Unclonable Function},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {1},
  pages        = {124--136},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1616-8},
  doi          = {10.1007/S11390-016-1616-8},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhangWDLZXSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/CaoFS16,
  author       = {Xinyue Cao and
                  Zhangjie Fu and
                  Xingming Sun},
  title        = {A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile
                  Digital Watermarking-Based Data Auditing},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2016},
  pages        = {3219042:1--3219042:7},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/3219042},
  doi          = {10.1155/2016/3219042},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jece/CaoFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/TangLGSZ16,
  author       = {Lijuan Tang and
                  Leida Li and
                  Ke Gu and
                  Xingming Sun and
                  Jianying Zhang},
  title        = {Blind quality index for camera images with natural scene statistics
                  and patch-based sharpness assessment},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {40},
  pages        = {335--344},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2016.07.007},
  doi          = {10.1016/J.JVCIR.2016.07.007},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/TangLGSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/PanJLZSK16,
  author       = {Zhaoqing Pan and
                  Peng Jin and
                  Jianjun Lei and
                  Yun Zhang and
                  Xingming Sun and
                  Sam Kwong},
  title        = {Fast reference frame selection based on content similarity for low
                  complexity {HEVC} encoder},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {40},
  pages        = {516--524},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2016.07.018},
  doi          = {10.1016/J.JVCIR.2016.07.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/PanJLZSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiaWSLX16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Quansheng Liu and
                  Naixue Xiong},
  title        = {Steganalysis of {LSB} matching using differences between nonadjacent
                  pixels},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {4},
  pages        = {1947--1962},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2381-8},
  doi          = {10.1007/S11042-014-2381-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiaWSLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangFSY16,
  author       = {Fengxiao Huang and
                  Zhangjie Fu and
                  Xingming Sun and
                  Ching{-}Nung Yang},
  title        = {Privacy-preserving outsourced gene data search in encryption domain},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5178--5186},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1687},
  doi          = {10.1002/SEC.1687},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangFSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/PanLZSK16,
  author       = {Zhaoqing Pan and
                  Jianjun Lei and
                  Yun Zhang and
                  Xingming Sun and
                  Sam Kwong},
  title        = {Fast Motion Estimation Based on Content Property for Low-Complexity
                  {H.265/HEVC} Encoder},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {62},
  number       = {3},
  pages        = {675--684},
  year         = {2016},
  url          = {https://doi.org/10.1109/TBC.2016.2580920},
  doi          = {10.1109/TBC.2016.2580920},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/PanLZSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/FanLWS16,
  author       = {Mingquan Fan and
                  Peipei Liu and
                  Hongxia Wang and
                  Xingming Sun},
  title        = {Cross correlation feature mining for steganalysis of hash based least
                  significant bit substitution video steganography},
  journal      = {Telecommun. Syst.},
  volume       = {63},
  number       = {4},
  pages        = {523--529},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11235-016-0139-5},
  doi          = {10.1007/S11235-016-0139-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/FanLWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaWZQSR16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Liangao Zhang and
                  Zhan Qin and
                  Xingming Sun and
                  Kui Ren},
  title        = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval
                  Scheme in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2594--2608},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2590944},
  doi          = {10.1109/TIFS.2016.2590944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuWGSR16,
  author       = {Zhangjie Fu and
                  Xinle Wu and
                  Chaowen Guan and
                  Xingming Sun and
                  Kui Ren},
  title        = {Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced
                  Data With Accuracy Improvement},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2706--2716},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2596138},
  doi          = {10.1109/TIFS.2016.2596138},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuWGSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiCZLKS16,
  author       = {Leida Li and
                  Hao Cai and
                  Yabin Zhang and
                  Weisi Lin and
                  Alex C. Kot and
                  Xingming Sun},
  title        = {Sparse Representation-Based Image Quality Index With Adaptive Sub-Dictionaries},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {25},
  number       = {8},
  pages        = {3775--3786},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIP.2016.2577891},
  doi          = {10.1109/TIP.2016.2577891},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tip/LiCZLKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XiaWSW16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Qian Wang},
  title        = {A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted
                  Cloud Data},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {2},
  pages        = {340--352},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2401003},
  doi          = {10.1109/TPDS.2015.2401003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XiaWSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/FuRSSH16,
  author       = {Zhangjie Fu and
                  Kui Ren and
                  Jiangang Shu and
                  Xingming Sun and
                  Fengxiao Huang},
  title        = {Enabling Personalized Search over Encrypted Outsourced Data with Efficiency
                  Improvement},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {9},
  pages        = {2546--2559},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2506573},
  doi          = {10.1109/TPDS.2015.2506573},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/FuRSSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/YangLYLXWS16,
  author       = {Panlong Yang and
                  Qingyu Li and
                  Yubo Yan and
                  Xiang{-}Yang Li and
                  Yan Xiong and
                  Baowei Wang and
                  Xingming Sun},
  title        = {"Friend is Treasure": Exploring and Exploiting Mobile Social
                  Contacts for Efficient Task Offloading},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {65},
  number       = {7},
  pages        = {5485--5496},
  year         = {2016},
  url          = {https://doi.org/10.1109/TVT.2015.2465392},
  doi          = {10.1109/TVT.2015.2465392},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/YangLYLXWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShenWWRS16,
  author       = {Jian Shen and
                  Anxi Wang and
                  Chen Wang and
                  Yongjun Ren and
                  Xingming Sun},
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {A {RFID} Based Localization Algorithm for Wireless Sensor Networks},
  booktitle    = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10040},
  pages        = {275--285},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48674-1\_25},
  doi          = {10.1007/978-3-319-48674-1\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShenWWRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FuSJX16,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Sai Ji and
                  Guowu Xie},
  title        = {Towards efficient content-aware search over encrypted outsourced data
                  in cloud},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524606},
  doi          = {10.1109/INFOCOM.2016.7524606},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/FuSJX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2016-1,
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48671-0},
  doi          = {10.1007/978-3-319-48671-0},
  isbn         = {978-3-319-48670-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2016-2,
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10040},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48674-1},
  doi          = {10.1007/978-3-319-48674-1},
  isbn         = {978-3-319-48673-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangSCZL15,
  author       = {Bin Yang and
                  Xingming Sun and
                  Xianyi Chen and
                  Jianjun Zhang and
                  Xu Li},
  title        = {Exposing Photographic Splicing by Detecting the Inconsistencies in
                  Shadows},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {588--600},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu146},
  doi          = {10.1093/COMJNL/BXU146},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YangSCZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinYLZS15,
  author       = {Ting Yin and
                  Gaobo Yang and
                  Leida Li and
                  Dengyong Zhang and
                  Xingming Sun},
  title        = {Detecting seam carving based image resizing using local binary patterns},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {130--141},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.003},
  doi          = {10.1016/J.COSE.2015.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinYLZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FuSLZS15,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Qi Liu and
                  Lu Zhou and
                  Jiangang Shu},
  title        = {Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search
                  over Encrypted Cloud Data Supporting Parallel Computing},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {98-B},
  number       = {1},
  pages        = {190--200},
  year         = {2015},
  url          = {https://doi.org/10.1587/transcom.E98.B.190},
  doi          = {10.1587/TRANSCOM.E98.B.190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FuSLZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/ShenTMCLS15,
  author       = {Jian Shen and
                  Haowen Tan and
                  Sangman Moh and
                  Ilyong Chung and
                  Qi Liu and
                  Xingming Sun},
  title        = {Enhanced secure sensor association and key management in wireless
                  body area networks},
  journal      = {J. Commun. Networks},
  volume       = {17},
  number       = {5},
  pages        = {453--462},
  year         = {2015},
  url          = {https://doi.org/10.1109/JCN.2015.000083},
  doi          = {10.1109/JCN.2015.000083},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/ShenTMCLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/FuSX15,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Jie Xi},
  title        = {Digital forensics of Microsoft Office 2007-2013 documents to prevent
                  covert communication},
  journal      = {J. Commun. Networks},
  volume       = {17},
  number       = {5},
  pages        = {525--533},
  year         = {2015},
  url          = {https://doi.org/10.1109/JCN.2015.000091},
  doi          = {10.1109/JCN.2015.000091},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/FuSX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/YangSXHW15,
  author       = {Bin Yang and
                  Xingming Sun and
                  Xiangyang Xin and
                  Weifeng Hu and
                  Youxin Wu},
  title        = {Image copy-move forgery detection based on sped-up robust features
                  descriptor and adaptive minimal-maximal suppression},
  journal      = {J. Electronic Imaging},
  volume       = {24},
  number       = {6},
  pages        = {063016},
  year         = {2015},
  url          = {https://doi.org/10.1117/1.JEI.24.6.063016},
  doi          = {10.1117/1.JEI.24.6.063016},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jei/YangSXHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmiv/ChenSCCSC15,
  author       = {Beijing Chen and
                  Huazhong Shu and
                  Gouenou Coatrieux and
                  Gang Chen and
                  Xingming Sun and
                  Jean{-}Louis Coatrieux},
  title        = {Color Image Analysis by Quaternion-Type Moments},
  journal      = {J. Math. Imaging Vis.},
  volume       = {51},
  number       = {1},
  pages        = {124--144},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10851-014-0511-6},
  doi          = {10.1007/S10851-014-0511-6},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmiv/ChenSCCSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChenSSXY15,
  author       = {Xianyi Chen and
                  Xingming Sun and
                  Huiyu Sun and
                  Lingyun Xiang and
                  Bin Yang},
  title        = {Histogram shifting based reversible data hiding method using directed-prediction
                  scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {15},
  pages        = {5747--5765},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1881-x},
  doi          = {10.1007/S11042-014-1881-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChenSSXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SunYWXLZ15,
  author       = {Xingming Sun and
                  Shuangshuang Yan and
                  Baowei Wang and
                  Li Xia and
                  Qi Liu and
                  Hui Zhang},
  title        = {Air Temperature Error Correction Based on Solar Radiation in an Economical
                  Meteorological Wireless Sensor Network},
  journal      = {Sensors},
  volume       = {15},
  number       = {8},
  pages        = {18114--18139},
  year         = {2015},
  url          = {https://doi.org/10.3390/s150818114},
  doi          = {10.3390/S150818114},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SunYWXLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/PanCS15,
  author       = {Zhaoqing Pan and
                  Liming Chen and
                  Xingming Sun},
  title        = {Low Complexity {HEVC} Encoder for Visual Sensor Networks},
  journal      = {Sensors},
  volume       = {15},
  number       = {12},
  pages        = {30115--30125},
  year         = {2015},
  url          = {https://doi.org/10.3390/s151229788},
  doi          = {10.3390/S151229788},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/PanCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLYS15,
  author       = {Jian Li and
                  Xiaolong Li and
                  Bin Yang and
                  Xingming Sun},
  title        = {Segmentation-Based Image Copy-Move Forgery Detection Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {507--518},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2381872},
  doi          = {10.1109/TIFS.2014.2381872},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiSL15,
  author       = {Xu Li and
                  Xingming Sun and
                  Quansheng Liu},
  title        = {Image Integrity Authentication Scheme Based on Fixed Point Theory},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {24},
  number       = {2},
  pages        = {632--645},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIP.2014.2372473},
  doi          = {10.1109/TIP.2014.2372473},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/LiSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhouSHCS15,
  author       = {Zhili Zhou and
                  Huiyu Sun and
                  Rohan Harit and
                  Xianyi Chen and
                  Xingming Sun},
  editor       = {Zhiqiu Huang and
                  Xingming Sun and
                  Junzhou Luo and
                  Jian Wang},
  title        = {Coverless Image Steganography Without Embedding},
  booktitle    = {Cloud Computing and Security - First International Conference, {ICCCS}
                  2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9483},
  pages        = {123--132},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27051-7\_11},
  doi          = {10.1007/978-3-319-27051-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhouSHCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenSTZS15,
  author       = {Xianyi Chen and
                  Huiyu Sun and
                  Yoshito Tobe and
                  Zhili Zhou and
                  Xingming Sun},
  editor       = {Zhiqiu Huang and
                  Xingming Sun and
                  Junzhou Luo and
                  Jian Wang},
  title        = {Coverless Information Hiding Method Based on the Chinese Mathematical
                  Expression},
  booktitle    = {Cloud Computing and Security - First International Conference, {ICCCS}
                  2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9483},
  pages        = {133--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27051-7\_12},
  doi          = {10.1007/978-3-319-27051-7\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenSTZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2015,
  editor       = {Zhiqiu Huang and
                  Xingming Sun and
                  Junzhou Luo and
                  Jian Wang},
  title        = {Cloud Computing and Security - First International Conference, {ICCCS}
                  2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9483},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27051-7},
  doi          = {10.1007/978-3-319-27051-7},
  isbn         = {978-3-319-27050-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/ChenCCSCS14,
  author       = {Beijing Chen and
                  Gouenou Coatrieux and
                  Gang Chen and
                  Xingming Sun and
                  Jean{-}Louis Coatrieux and
                  Huazhong Shu},
  title        = {Full 4-D quaternion discrete Fourier transform based watermarking
                  for color images},
  journal      = {Digit. Signal Process.},
  volume       = {28},
  pages        = {106--119},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dsp.2014.02.010},
  doi          = {10.1016/J.DSP.2014.02.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/ChenCCSCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ChenLSLS14,
  author       = {Beijing Chen and
                  Quansheng Liu and
                  Xingming Sun and
                  Xu Li and
                  Huazhong Shu},
  title        = {Removing Gaussian noise for colour images by quaternion representation
                  and optimisation of weights in non-local means filter},
  journal      = {{IET} Image Process.},
  volume       = {8},
  number       = {10},
  pages        = {591--600},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ipr.2013.0521},
  doi          = {10.1049/IET-IPR.2013.0521},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ChenLSLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/XiaZSC14,
  author       = {Zhihua Xia and
                  Yanling Zhu and
                  Xingming Sun and
                  Lihong Chen},
  title        = {Secure semantic expansion based search over encrypted cloud data supporting
                  similarity ranking},
  journal      = {J. Cloud Comput.},
  volume       = {3},
  pages        = {8},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13677-014-0008-2},
  doi          = {10.1186/S13677-014-0008-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/XiaZSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/ShenMCS14,
  author       = {Jian Shen and
                  Sangman Moh and
                  Ilyong Chung and
                  Xingming Sun},
  title        = {Buffer scheme optimization of epidemic routing in delay tolerant networks},
  journal      = {J. Commun. Networks},
  volume       = {16},
  number       = {6},
  pages        = {656--666},
  year         = {2014},
  url          = {https://doi.org/10.1109/JCN.2014.000112},
  doi          = {10.1109/JCN.2014.000112},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/ShenMCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiangSLX14,
  author       = {Lingyun Xiang and
                  Xingming Sun and
                  Gang Luo and
                  Bin Xia},
  title        = {Linguistic steganalysis using the features derived from synonym frequency},
  journal      = {Multim. Tools Appl.},
  volume       = {71},
  number       = {3},
  pages        = {1893--1911},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1313-8},
  doi          = {10.1007/S11042-012-1313-8},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiangSLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiaWSW14,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Baowei Wang},
  title        = {Steganalysis of least significant bit matching using multi-order differences},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1283--1291},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.864},
  doi          = {10.1002/SEC.864},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiaWSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouSCCF14,
  author       = {Zhili Zhou and
                  Xingming Sun and
                  Xianyi Chen and
                  Cheng Chang and
                  Zhangjie Fu},
  title        = {A novel signature based on the combination of global and local signatures
                  for image copy detection},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {1702--1711},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.866},
  doi          = {10.1002/SEC.866},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhouSCCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/FuSLZ14,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Nigel Linge and
                  Lu Zhou},
  title        = {Achieving effective cloud search services: multi-keyword ranked search
                  over encrypted cloud data supporting synonym query},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {60},
  number       = {1},
  pages        = {164--172},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCE.2014.6780939},
  doi          = {10.1109/TCE.2014.6780939},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/FuSLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/FuSSL14,
  author       = {Zhangjie Fu and
                  Jiangang Shu and
                  Xingming Sun and
                  Nigel Linge},
  title        = {Smart cloud search services: verifiable keyword-based semantic search
                  over encrypted cloud data},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {60},
  number       = {4},
  pages        = {762--770},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCE.2014.7027353},
  doi          = {10.1109/TCE.2014.7027353},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/FuSSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/ZhangWNS14,
  author       = {Hui Zhang and
                  Q. M. Jonathan Wu and
                  Thanh Minh Nguyen and
                  Xingming Sun},
  title        = {Synthetic Aperture Radar Image Segmentation by Modified Student's
                  t-Mixture Model},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {52},
  number       = {7},
  pages        = {4391--4403},
  year         = {2014},
  url          = {https://doi.org/10.1109/TGRS.2013.2281854},
  doi          = {10.1109/TGRS.2013.2281854},
  timestamp    = {Sat, 15 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/ZhangWNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FuSSZ14,
  author       = {Zhangjie Fu and
                  Jiangang Shu and
                  Xingming Sun and
                  Daxing Zhang},
  editor       = {Robert H. Deng and
                  Elaine Shi and
                  Kui Ren},
  title        = {Semantic keyword search based on trie over encrypted cloud data},
  booktitle    = {Proceedings of the Second International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014},
  pages        = {59--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600075.2600081},
  doi          = {10.1145/2600075.2600081},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FuSSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/FuCWS14,
  author       = {Zhangjie Fu and
                  Xinyue Cao and
                  Jin Wang and
                  Xingming Sun},
  editor       = {Junzo Watada and
                  Akinori Ito and
                  Jeng{-}Shyang Pan and
                  Han{-}Chieh Chao and
                  Chien{-}Ming Chen},
  title        = {Secure Storage of Data in Cloud Computing},
  booktitle    = {2014 Tenth International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan,
                  August 27-29, 2014},
  pages        = {783--786},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IIH-MSP.2014.199},
  doi          = {10.1109/IIH-MSP.2014.199},
  timestamp    = {Thu, 22 Oct 2020 13:52:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/FuCWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/FuXWS14a,
  author       = {Zhangjie Fu and
                  Jie Xi and
                  Jin Wang and
                  Xingming Sun},
  editor       = {Junzo Watada and
                  Akinori Ito and
                  Jeng{-}Shyang Pan and
                  Han{-}Chieh Chao and
                  Chien{-}Ming Chen},
  title        = {Document Attribute-Based Keyword Search over Encrypted Data},
  booktitle    = {2014 Tenth International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan,
                  August 27-29, 2014},
  pages        = {787--790},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IIH-MSP.2014.200},
  doi          = {10.1109/IIH-MSP.2014.200},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/FuXWS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/FuSWS14,
  author       = {Zhangjie Fu and
                  Jiangang Shu and
                  Jin Wang and
                  Xingming Sun},
  editor       = {Junzo Watada and
                  Akinori Ito and
                  Jeng{-}Shyang Pan and
                  Han{-}Chieh Chao and
                  Chien{-}Ming Chen},
  title        = {A Similarity Search Method for Encrypted Cloud Document},
  booktitle    = {2014 Tenth International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan,
                  August 27-29, 2014},
  pages        = {791--794},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IIH-MSP.2014.201},
  doi          = {10.1109/IIH-MSP.2014.201},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/FuSWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouSWFS14,
  author       = {Zhili Zhou and
                  Xingming Sun and
                  Yunlong Wang and
                  Zhangjie Fu and
                  Yun{-}Qing Shi},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Combination of {SIFT} Feature and Convex Region-Based Global Context
                  Feature for Image Copy Detection},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_5},
  doi          = {10.1007/978-3-319-19321-2\_5},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouSWFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FuSS14,
  author       = {Zhangjie Fu and
                  Jiangang Shu and
                  Xingming Sun},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud
                  Data Supporting Verifiability},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_4},
  doi          = {10.1007/978-3-319-23829-6\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/FuSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/RuanSL13,
  author       = {Zhiqiang Ruan and
                  Xingming Sun and
                  Wei Liang},
  title        = {Securing sensor data storage and query based on \emph{k}-out-of- \emph{n}
                  coding},
  journal      = {Int. J. Commun. Syst.},
  volume       = {26},
  number       = {5},
  pages        = {549--566},
  year         = {2013},
  url          = {https://doi.org/10.1002/dac.1358},
  doi          = {10.1002/DAC.1358},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/RuanSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/XiaWSW13,
  author       = {Zhihua Xia and
                  Shufang Wang and
                  Xingming Sun and
                  Baowei Wang},
  title        = {Steganalysis of least significant bit matching based on image histogram
                  and correlation},
  journal      = {J. Electronic Imaging},
  volume       = {22},
  number       = {3},
  pages        = {033008},
  year         = {2013},
  url          = {https://doi.org/10.1117/1.JEI.22.3.033008},
  doi          = {10.1117/1.JEI.22.3.033008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/XiaWSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChenSSZZ13,
  author       = {Xianyi Chen and
                  Xingming Sun and
                  Huiyu Sun and
                  Zhili Zhou and
                  Jianjun Zhang},
  title        = {Reversible watermarking method based on asymmetric-histogram shifting
                  of prediction errors},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {10},
  pages        = {2620--2626},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.04.086},
  doi          = {10.1016/J.JSS.2013.04.086},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ChenSSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/FuSXZS13,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Zhihua Xia and
                  Lu Zhou and
                  Jiangang Shu},
  title        = {Multi-keyword ranked search supporting synonym query over encrypted
                  data in cloud computing},
  booktitle    = {{IEEE} 32nd International Performance Computing and Communications
                  Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PCCC.2013.6742783},
  doi          = {10.1109/PCCC.2013.6742783},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/FuSXZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiLS13,
  author       = {Jian Li and
                  Xiaolong Li and
                  Xingming Sun},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {A New Reversible Data Hiding Scheme Based on Efficient Prediction},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_24},
  doi          = {10.1007/978-3-662-43886-2\_24},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FuSZS13,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Lu Zhou and
                  Jiangang Shu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {New Forensic Methods for {OOXML} Format Documents},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {503--513},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_36},
  doi          = {10.1007/978-3-662-43886-2\_36},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FuSZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013scc,
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2484402},
  isbn         = {978-1-4503-2067-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013scc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiSL13,
  author       = {Xu Li and
                  Xingming Sun and
                  Quansheng Liu},
  title        = {Image Integrity Authentication Scheme Based On Fixed Point Theory},
  journal      = {CoRR},
  volume       = {abs/1308.0679},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.0679},
  eprinttype    = {arXiv},
  eprint       = {1308.0679},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiSLC13,
  author       = {Xu Li and
                  Xingming Sun and
                  Quansheng Liu and
                  Beijing Chen},
  title        = {A Novel Method for Image Integrity Authentication Based on Fixed Point
                  Theory},
  journal      = {CoRR},
  volume       = {abs/1308.5326},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.5326},
  eprinttype    = {arXiv},
  eprint       = {1308.5326},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiSLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WandjiSK13,
  author       = {Nathalie Diane Wandji and
                  Xingming Sun and
                  Moise Fah Kue},
  title        = {Detection of copy-move forgery in digital images based on {DCT}},
  journal      = {CoRR},
  volume       = {abs/1308.5661},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.5661},
  eprinttype    = {arXiv},
  eprint       = {1308.5661},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WandjiSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FuSLL12,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Yuling Liu and
                  Bo Li},
  title        = {Text split-based steganography in {OOXML} format documents for covert
                  communication},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {9},
  pages        = {957--968},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.378},
  doi          = {10.1002/SEC.378},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FuSLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/LiZDS12,
  author       = {Sujun Li and
                  Boqing Zhou and
                  Jingguo Dai and
                  Xingming Sun},
  title        = {A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash
                  Key Chains for Sensor Networks},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {1},
  number       = {5},
  pages        = {416--419},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCL.2012.061212.120201},
  doi          = {10.1109/WCL.2012.061212.120201},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/LiZDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cad/PengLLS11,
  author       = {Fei Peng and
                  Yu{-}Zhou Lei and
                  Min Long and
                  Xingming Sun},
  title        = {A reversible watermarking scheme for two-dimensional {CAD} engineering
                  graphics based on improved difference expansion},
  journal      = {Comput. Aided Des.},
  volume       = {43},
  number       = {8},
  pages        = {1018--1024},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cad.2011.03.011},
  doi          = {10.1016/J.CAD.2011.03.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cad/PengLLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FuSLL11,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Yuling Liu and
                  Bo Li},
  title        = {Forensic investigation of {OOXML} format documents},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {48--55},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.04.001},
  doi          = {10.1016/J.DIIN.2011.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FuSLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/HanZXS11,
  author       = {Jinsong Han and
                  Jizhong Zhao and
                  Min Xi and
                  Xingming Sun},
  title        = {Removing dubious feedback from mobile wireless ad hoc peer-to-peer
                  systems},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {8},
  number       = {1/2},
  pages        = {106--113},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJAHUC.2011.041626},
  doi          = {10.1504/IJAHUC.2011.041626},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/HanZXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ShahSHM11,
  author       = {S. A. Shah and
                  Xingming Sun and
                  Ali Hamadou and
                  Abdul Majid},
  title        = {Query Preserving Relational Database Watermarking},
  journal      = {Informatica (Slovenia)},
  volume       = {35},
  number       = {3},
  pages        = {391--396},
  year         = {2011},
  url          = {http://www.informatica.si/index.php/informatica/article/view/363},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/ShahSHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/LiaoLSZ10,
  author       = {Bo Liao and
                  Benyou Liao and
                  Xingming Sun and
                  Qingguang Zeng},
  title        = {A Novel method for similarity analysis and protein sub-cellular localization
                  prediction},
  journal      = {Bioinform.},
  volume       = {26},
  number       = {21},
  pages        = {2678--2683},
  year         = {2010},
  url          = {https://doi.org/10.1093/bioinformatics/btq521},
  doi          = {10.1093/BIOINFORMATICS/BTQ521},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/LiaoLSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/XiaoSLWXL10,
  author       = {Xiangrong Xiao and
                  Xingming Sun and
                  Fan Li and
                  Baowei Wang and
                  Zhihua Xia and
                  Wei Liang},
  title        = {Watermarking-based intellectual property protection for sensor streaming
                  data},
  journal      = {Int. J. Comput. Appl. Technol.},
  volume       = {39},
  number       = {4},
  pages        = {213--223},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJCAT.2010.036025},
  doi          = {10.1504/IJCAT.2010.036025},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcat/XiaoSLWXL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdcta/HosamYLS10,
  author       = {Osama Hosam and
                  Lincong Yang and
                  Wei Liang and
                  Xingming Sun},
  title        = {Watermarking 3D Triangular Mesh with High Visual Quality},
  journal      = {J. Digit. Content Technol. its Appl.},
  volume       = {4},
  number       = {4},
  pages        = {107--116},
  year         = {2010},
  url          = {http://www.aicit.org/jdcta/ppl/11.\%20JDCTA2-337067.pdf},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdcta/HosamYLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/XiaSLQL10,
  author       = {Zhihua Xia and
                  Xingming Sun and
                  Wei Liang and
                  Jiaohua Qin and
                  Feng Li},
  title        = {{JPEG} image steganalysis using joint discrete cosine transform domain
                  features},
  journal      = {J. Electronic Imaging},
  volume       = {19},
  number       = {2},
  pages        = {023006},
  year         = {2010},
  url          = {https://doi.org/10.1117/1.3421972},
  doi          = {10.1117/1.3421972},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/XiaSLQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhouLLSW09,
  author       = {Boqing Zhou and
                  Sujun Li and
                  Qiaoliang Li and
                  Xingming Sun and
                  Xiaoming Wang},
  title        = {An efficient and scalable pairwise key pre-distribution scheme for
                  sensor networks using deployment knowledge},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {1},
  pages        = {124--133},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2008.09.035},
  doi          = {10.1016/J.COMCOM.2008.09.035},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhouLLSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuSCW09,
  author       = {Yuling Liu and
                  Xingming Sun and
                  Ingemar J. Cox and
                  Hong Wang},
  title        = {Natural Language Information Hiding Based on Chinese Mathematical
                  Expression},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {10--15},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p10-15.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuSCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcc/LiaoCSZ09,
  author       = {Bo Liao and
                  Weiyang Chen and
                  Xingming Sun and
                  Wen Zhu},
  title        = {A binary coding method of {RNA} secondary structure and its application},
  journal      = {J. Comput. Chem.},
  volume       = {30},
  number       = {14},
  pages        = {2205--2212},
  year         = {2009},
  url          = {https://doi.org/10.1002/jcc.21227},
  doi          = {10.1002/JCC.21227},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcc/LiaoCSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/QinSXN09,
  author       = {Jiaohua Qin and
                  Xingming Sun and
                  Xuyu Xiang and
                  Changming Niu},
  title        = {Principal feature selection and fusion method for image steganalysis},
  journal      = {J. Electronic Imaging},
  volume       = {18},
  number       = {3},
  pages        = {033009},
  year         = {2009},
  url          = {https://doi.org/10.1117/1.3206961},
  doi          = {10.1117/1.3206961},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/QinSXN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YangSYLX09,
  author       = {Ying Yang and
                  Xingming Sun and
                  Hengfu Yang and
                  Chang{-}Tsun Li and
                  Rong Xiao},
  title        = {A Contrast-Sensitive Reversible Visible Image Watermarking Technique},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {19},
  number       = {5},
  pages        = {656--667},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCSVT.2009.2017401},
  doi          = {10.1109/TCSVT.2009.2017401},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YangSYLX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/HosamS09,
  author       = {Osama Hosam and
                  Xingming Sun},
  editor       = {Huaikou Miao and
                  Gongzhu Hu},
  title        = {Three-Dimensional Reconstruction Using Enhanced Shape from Stereo
                  Technique},
  booktitle    = {8th {IEEE/ACIS} International Conference on Computer and Information
                  Science, {IEEE/ACIS} {ICIS} 2009, June 1-3, 2009, Shanghai, China},
  pages        = {627--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICIS.2009.166},
  doi          = {10.1109/ICIS.2009.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/HosamS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/YangSYL08,
  author       = {Ying Yang and
                  Xingming Sun and
                  Hengfu Yang and
                  Chang{-}Tsun Li},
  title        = {Removable visible image watermarking algorithm in the discrete cosine
                  transform domain},
  journal      = {J. Electronic Imaging},
  volume       = {17},
  number       = {3},
  pages        = {033008},
  year         = {2008},
  url          = {https://doi.org/10.1117/1.2952843},
  doi          = {10.1117/1.2952843},
  timestamp    = {Fri, 08 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/YangSYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/BaiSSDZ08,
  author       = {Yameng Bai and
                  Xingming Sun and
                  Guang Sun and
                  Xiaohong Deng and
                  Xiaoming Zhou},
  title        = {Dynamic K-Gram Based Software Birthmark},
  booktitle    = {19th Australian Software Engineering Conference {(ASWEC} 2008), March
                  25-28, 2008, Perth, Australia},
  pages        = {644--649},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ASWEC.2008.21},
  doi          = {10.1109/ASWEC.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/BaiSSDZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WangSWX08,
  author       = {Baowei Wang and
                  Xingming Sun and
                  Xinbing Wang and
                  Bin Xiao},
  title        = {Time-Based Privacy Protection for Multi-attribute Data in WSNs},
  booktitle    = {14th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2008, Melbourne, Victoria, Australia, December 8-10, 2008},
  pages        = {615--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICPADS.2008.67},
  doi          = {10.1109/ICPADS.2008.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/WangSWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XiaoSY08,
  author       = {Rong Xiao and
                  Xingming Sun and
                  Ying Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Copyright Protection in Wireless Sensor Networks by Watermarking},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {7--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.139},
  doi          = {10.1109/IIH-MSP.2008.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/XiaoSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LiuSLX08,
  author       = {Yongping Liu and
                  Xingming Sun and
                  Yuling Liu and
                  Rong Xiao},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {File-Update Based Steganography for Microsoft PowerPoint Files},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {11--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.150},
  doi          = {10.1109/IIH-MSP.2008.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LiuSLX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LiSWW08,
  author       = {Zishuai Li and
                  Xingming Sun and
                  Baowei Wang and
                  Xiaoliang Wang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {A Steganography Scheme in {P2P} Network},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {20--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.144},
  doi          = {10.1109/IIH-MSP.2008.144},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LiSWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HuangZS08,
  author       = {Huajun Huang and
                  Shaohong Zhong and
                  Xingming Sun},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {An Algorithm of Webpage Information Hiding Based on Attributes Permutation},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {257--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.195},
  doi          = {10.1109/IIH-MSP.2008.195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/HuangZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XieSXL08,
  author       = {Yuhua Xie and
                  Xingming Sun and
                  Lingyun Xiang and
                  Gang Luo},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {294--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.147},
  doi          = {10.1109/IIH-MSP.2008.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/XieSXL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhouSSY08,
  author       = {Xiaoming Zhou and
                  Xingming Sun and
                  Guang Sun and
                  Ying Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {A Combined Static and Dynamic Software Birthmark Based on Component
                  Dependence Graph},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1416--1421},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.145},
  doi          = {10.1109/IIH-MSP.2008.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhouSSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/PengS08,
  author       = {Fei Peng and
                  Xingming Sun},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics
                  Based on Characters Statistic},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1516--1519},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.115},
  doi          = {10.1109/IIH-MSP.2008.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/PengS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/HuangZS08,
  author       = {Huajun Huang and
                  Shaohong Zhong and
                  Xingming Sun},
  editor       = {Fei Yu and
                  Qi Luo and
                  Yongjun Chen and
                  Zhigang Chen},
  title        = {Steganalysis of Information Hidden in Webpage Based on Higher-order
                  Statistics},
  booktitle    = {Proceedings of The International Symposium on Electronic Commerce
                  and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages        = {957--960},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISECS.2008.169},
  doi          = {10.1109/ISECS.2008.169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isecs/HuangZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangTSL08,
  author       = {Huajun Huang and
                  Junshan Tan and
                  Xingming Sun and
                  Lingxi Liu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Detection of Hidden Information in Webpage Based on Higher-Order Statistics},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {293--302},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_25},
  doi          = {10.1007/978-3-642-04438-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangTSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiaoSC07,
  author       = {Xiangrong Xiao and
                  Xingming Sun and
                  Minggang Chen},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Second-LSB-Dependent Robust Watermarking for Relational Database},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {292--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.25},
  doi          = {10.1109/IAS.2007.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiaoSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HuangSHL07,
  author       = {Junwei Huang and
                  Xingming Sun and
                  Huajun Huang and
                  Gang Luo},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Detection of Hidden Information in Webpages Based on Randomness},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {447--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.74},
  doi          = {10.1109/IAS.2007.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HuangSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiangSLG07,
  author       = {Lingyun Xiang and
                  Xingming Sun and
                  Gang Luo and
                  Can Gan},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Research on Steganalysis for Text Steganography Based on Font Format},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {490--495},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.48},
  doi          = {10.1109/IAS.2007.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiangSLG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/HuangSLS07,
  author       = {Huajun Huang and
                  Xingming Sun and
                  Zishuai Li and
                  Guang Sun},
  editor       = {J. Lei},
  title        = {Detection of Hidden Information in Webpage},
  booktitle    = {Fourth International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings,
                  Volume 4},
  pages        = {317--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FSKD.2007.247},
  doi          = {10.1109/FSKD.2007.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fskd/HuangSLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YangSWQ07,
  author       = {Hengfu Yang and
                  Xingming Sun and
                  Bin Wang and
                  Zheng Qin},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {An Image-Adaptive Semi-fragile Watermarking for Image Authentication
                  and Tamper Detection},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4707},
  pages        = {1066--1075},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74484-9\_93},
  doi          = {10.1007/978-3-540-74484-9\_93},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/YangSWQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YulingXCH07,
  author       = {Yuling Liu and
                  Xingming Sun and
                  Can Gan and
                  Hong Wang},
  title        = {An Efficient Linguistic Steganography for Chinese Text},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {2094--2097},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4285095},
  doi          = {10.1109/ICME.2007.4285095},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/YulingXCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LuoSXH07,
  author       = {Gang Luo and
                  Xingming Sun and
                  Lingyun Xiang and
                  Junwei Huang},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {An Evaluation Scheme for Steganalysis-proof Ability of Steganographic
                  Algorithms},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {126--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.85},
  doi          = {10.1109/IIH-MSP.2007.85},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LuoSXH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HuangSSH07,
  author       = {Huajun Huang and
                  Xingming Sun and
                  Guang Sun and
                  Junwei Huang},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {257--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIHMSP.2007.4457539},
  doi          = {10.1109/IIHMSP.2007.4457539},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/HuangSSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/Hua-junXGJ07,
  author       = {Huajun Huang and
                  Xingming Sun and
                  Guang Sun and
                  Junwei Huang},
  editor       = {Jianzhong Li and
                  Wang{-}Chien Lee and
                  Fabrizio Silvestri},
  title        = {Detection of steganographic information in tags of webpage},
  booktitle    = {Proceedings of the 2nf International Conference on Scalable Information
                  Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {304},
  pages        = {72},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/infoscale.2007.959},
  doi          = {10.4108/INFOSCALE.2007.959},
  timestamp    = {Wed, 28 Nov 2018 12:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/infoscale/Hua-junXGJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/XiaoSYC07,
  author       = {Xiangrong Xiao and
                  Xingming Sun and
                  Lincong Yang and
                  Minggang Chen},
  title        = {Secure Data Transmission of Wireless Sensor Network Based on Information
                  Hiding},
  booktitle    = {4th Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBIQ.2007.4451044},
  doi          = {10.1109/MOBIQ.2007.4451044},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/XiaoSYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/AiSLCSL07,
  author       = {Jieqing Ai and
                  Xingming Sun and
                  Yunhao Liu and
                  Ingemar J. Cox and
                  Guang Sun and
                  Yi Luo},
  title        = {A Stern-based Collusion-Secure Software Watermarking Algorithm and
                  Its Implementation},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {813--818},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.53},
  doi          = {10.1109/MUE.2007.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/AiSLCSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/YangS07,
  author       = {Hengfu Yang and
                  Xingming Sun},
  title        = {Semi-Fragile Watermarking for Image Authentication and Tamper Detection
                  Using {HVS} Model},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {1112--1117},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.189},
  doi          = {10.1109/MUE.2007.189},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/YangS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/LiuSW05,
  author       = {Yuling Liu and
                  Xingming Sun and
                  Yong Wu},
  editor       = {Lipo Wang and
                  Ke Chen and
                  Yew{-}Soon Ong},
  title        = {A Natural Language Watermarking Based on Chinese Syntax},
  booktitle    = {Advances in Natural Computation, First International Conference, {ICNC}
                  2005, Changsha, China, August 27-29, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3612},
  pages        = {958--961},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539902\_119},
  doi          = {10.1007/11539902\_119},
  timestamp    = {Sun, 02 Jun 2019 21:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/LiuSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/SunA05,
  author       = {Xingming Sun and
                  Alex Jessey Asiimwe},
  editor       = {Lipo Wang and
                  Ke Chen and
                  Yew{-}Soon Ong},
  title        = {Noun-Verb Based Technique of Text Watermarking Using Recursive Decent
                  Semantic Net Parsers},
  booktitle    = {Advances in Natural Computation, First International Conference, {ICNC}
                  2005, Changsha, China, August 27-29, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3612},
  pages        = {968--971},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539902\_121},
  doi          = {10.1007/11539902\_121},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/SunA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/SunLH04,
  author       = {Xingming Sun and
                  Gang Luo and
                  Huajun Huang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Component-based digital watermarking of Chinese texts},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {76--81},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046306},
  doi          = {10.1145/1046290.1046306},
  timestamp    = {Tue, 15 Feb 2022 16:17:26 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/SunLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/YangYS03,
  author       = {Lihua Yang and
                  Zhihua Yang and
                  Xingming Sun},
  title        = {Construction of wavelets for width-invariant characterization of curves},
  journal      = {Pattern Recognit. Lett.},
  volume       = {24},
  number       = {15},
  pages        = {2751--2760},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-8655(03)00118-1},
  doi          = {10.1016/S0167-8655(03)00118-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/YangYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/SunCYT02,
  author       = {Xingming Sun and
                  Huowang Chen and
                  Lihua Yang and
                  Yuan Yan Tang},
  title        = {Mathematical Representation of a Chinese Character and its Applications},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {16},
  number       = {6},
  pages        = {735--748},
  year         = {2002},
  url          = {https://doi.org/10.1142/S0218001402001939},
  doi          = {10.1142/S0218001402001939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/SunCYT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/SunYTH01,
  author       = {Xingming Sun and
                  Lihua Yang and
                  Yuan Yan Tang and
                  Yunfa Hu},
  title        = {A New Stroke Extraction Method of Chinese Characters},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {15},
  number       = {4},
  pages        = {707--721},
  year         = {2001},
  url          = {https://doi.org/10.1142/S0218001401001064},
  doi          = {10.1142/S0218001401001064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/SunYTH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics