Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xingming Sun
@article{DBLP:journals/csse/ZhangZZSMS23, author = {Xiang Zhang and Xiaona Zhang and Xiaorui Zhang and Wei Sun and Ruohan Meng and Xingming Sun}, title = {A Derivative Matrix-Based Covert Communication Method in Blockchain}, journal = {Comput. Syst. Sci. Eng.}, volume = {46}, number = {1}, pages = {225--239}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.034915}, doi = {10.32604/CSSE.2023.034915}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ZhangZZSMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ZhouZSWS23, author = {Zhili Zhou and Jianyu Zhu and Yuecheng Su and Meimin Wang and Xingming Sun}, title = {Geometric correction code-based robust image watermarking}, journal = {{IET} Image Process.}, volume = {17}, number = {13}, pages = {3660--3669}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12143}, doi = {10.1049/IPR2.12143}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/ZhouZSWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/GuoYCS23, author = {Zhiqing Guo and Gaobo Yang and Jiyou Chen and Xingming Sun}, title = {Exposing Deepfake Face Forgeries With Guided Residuals}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {8458--8470}, year = {2023}, url = {https://doi.org/10.1109/TMM.2023.3237169}, doi = {10.1109/TMM.2023.3237169}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/GuoYCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ZhangZSSJ22, author = {Xiaorui Zhang and Wenfang Zhang and Wei Sun and Xingming Sun and Sunil Kumar Jha}, title = {A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection}, journal = {Comput. Syst. Sci. Eng.}, volume = {41}, number = {3}, pages = {1043--1056}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.022305}, doi = {10.32604/CSSE.2022.022305}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ZhangZSSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/FuWSZ22, author = {Zhangjie Fu and Yan Wang and Xingming Sun and Xiaosong Zhang}, title = {Semantic and secure search over encrypted outsourcing cloud based on {BERT}}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {2}, pages = {162802}, year = {2022}, url = {https://doi.org/10.1007/s11704-021-0277-0}, doi = {10.1007/S11704-021-0277-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/FuWSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GuXS22, author = {Qi Gu and Zhihua Xia and Xingming Sun}, title = {{MSPPIR:} Multi-Source Privacy-Preserving Image Retrieval in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {78--92}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.03.040}, doi = {10.1016/J.FUTURE.2022.03.040}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GuXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/YuanYXSW22, author = {Chengsheng Yuan and Peipeng Yu and Zhihua Xia and Xingming Sun and Q. M. Jonathan Wu}, title = {{FLD-SRC:} Fingerprint Liveness Detection for {AFIS} Based on Spatial Ridges Continuity}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {16}, number = {4}, pages = {817--827}, year = {2022}, url = {https://doi.org/10.1109/JSTSP.2022.3174655}, doi = {10.1109/JSTSP.2022.3174655}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jstsp/YuanYXSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamd/YuanJSW22, author = {Chengsheng Yuan and Shengming Jiao and Xingming Sun and Q. M. Jonathan Wu}, title = {{MFFFLD:} {A} Multimodal-Feature-Fusion-Based Fingerprint Liveness Detection}, journal = {{IEEE} Trans. Cogn. Dev. Syst.}, volume = {14}, number = {2}, pages = {648--661}, year = {2022}, url = {https://doi.org/10.1109/TCDS.2021.3062624}, doi = {10.1109/TCDS.2021.3062624}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tamd/YuanJSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FuZJS22, author = {Zhangjie Fu and Yueyan Zhi and Shouling Ji and Xingming Sun}, title = {Remote Attacks on Drones Vision Sensors: An Empirical Study}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3125--3135}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3085412}, doi = {10.1109/TDSC.2021.3085412}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FuZJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/MengCZLWS22, author = {Ruohan Meng and Qi Cui and Zhili Zhou and Zhetao Li and Q. M. Jonathan Wu and Xingming Sun}, title = {High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {2}, pages = {848--862}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2021.3137829}, doi = {10.1109/TNSE.2021.3137829}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/MengCZLWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-1, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13338}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06794-5}, doi = {10.1007/978-3-031-06794-5}, isbn = {978-3-031-06793-8}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-2, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13339}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06788-4}, doi = {10.1007/978-3-031-06788-4}, isbn = {978-3-031-06787-7}, timestamp = {Thu, 28 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-3, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4}, doi = {10.1007/978-3-031-06791-4}, isbn = {978-3-031-06790-7}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-13067, author = {Sulong Ge and Zhihua Xia and Jianwei Fei and Xingming Sun and Jian Weng}, title = {A Robust Document Image Watermarking Scheme using Deep Neural Network}, journal = {CoRR}, volume = {abs/2202.13067}, year = {2022}, url = {https://arxiv.org/abs/2202.13067}, eprinttype = {arXiv}, eprint = {2202.13067}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00753, author = {Zhiqing Guo and Gaobo Yang and Jiyou Chen and Xingming Sun}, title = {Exposing Deepfake Face Forgeries with Guided Residuals}, journal = {CoRR}, volume = {abs/2205.00753}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00753}, doi = {10.48550/ARXIV.2205.00753}, eprinttype = {arXiv}, eprint = {2205.00753}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JiangXS21, author = {Leqi Jiang and Zhihua Xia and Xingming Sun}, title = {Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing}, journal = {Adv. Comput.}, volume = {120}, pages = {81--119}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.002}, doi = {10.1016/BS.ADCOM.2020.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JiangXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/YuanCSWW21, author = {Chengsheng Yuan and Qi Cui and Xingming Sun and Q. M. Jonathan Wu and Sheng Wu}, title = {Chapter Five - Fingerprint liveness detection using an improved {CNN} with the spatial pyramid pooling structure}, journal = {Adv. Comput.}, volume = {120}, pages = {157--193}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.10.002}, doi = {10.1016/BS.ADCOM.2020.10.002}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/YuanCSWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cviu/GuoYCS21, author = {Zhiqing Guo and Gaobo Yang and Jiyou Chen and Xingming Sun}, title = {Fake face detection via adaptive manipulation traces extraction network}, journal = {Comput. Vis. Image Underst.}, volume = {204}, pages = {103170}, year = {2021}, url = {https://doi.org/10.1016/j.cviu.2021.103170}, doi = {10.1016/J.CVIU.2021.103170}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cviu/GuoYCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhouWYFSW21, author = {Zhili Zhou and Meimin Wang and Ching{-}Nung Yang and Zhangjie Fu and Xingming Sun and Q. M. Jonathan Wu}, title = {Blockchain-based decentralized reputation system in E-commerce environment}, journal = {Future Gener. Comput. Syst.}, volume = {124}, pages = {155--167}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.05.035}, doi = {10.1016/J.FUTURE.2021.05.035}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhouWYFSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/YangXZSH21, author = {Zhongliang Yang and Lingyun Xiang and Si{-}yu Zhang and Xingming Sun and Yongfeng Huang}, title = {Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility}, journal = {{IEEE} Signal Process. Lett.}, volume = {28}, pages = {409--413}, year = {2021}, url = {https://doi.org/10.1109/LSP.2021.3058889}, doi = {10.1109/LSP.2021.3058889}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/YangXZSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/ZhouWS21, author = {Zhili Zhou and Q. M. Jonathan Wu and Xingming Sun}, title = {Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search}, journal = {{IEEE} Trans. Big Data}, volume = {7}, number = {3}, pages = {559--573}, year = {2021}, url = {https://doi.org/10.1109/TBDATA.2019.2919570}, doi = {10.1109/TBDATA.2019.2919570}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/ZhouWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/ShenLLSZ21, author = {Jian Shen and Dengzhi Liu and Qi Liu and Xingming Sun and Yan Zhang}, title = {Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure}, journal = {{IEEE} Trans. Big Data}, volume = {7}, number = {4}, pages = {668--677}, year = {2021}, url = {https://doi.org/10.1109/TBDATA.2017.2705048}, doi = {10.1109/TBDATA.2017.2705048}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbd/ShenLLSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ChenFSL21, author = {Junfu Chen and Zhangjie Fu and Xingming Sun and Enlu Li}, editor = {Yuxin Peng and Shi{-}Min Hu and Moncef Gabbouj and Kun Zhou and Michael Elad and Kun Xu}, title = {Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain}, booktitle = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou, China, August 6-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12888}, pages = {641--653}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87355-4\_53}, doi = {10.1007/978-3-030-87355-4\_53}, timestamp = {Wed, 16 Mar 2022 23:55:43 +0100}, biburl = {https://dblp.org/rec/conf/icig/ChenFSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/ChenFSL21, author = {Junfu Chen and Zhangjie Fu and Xingming Sun and Enlu Li}, editor = {Huimin Ma and Liang Wang and Changshui Zhang and Fei Wu and Tieniu Tan and Yaonan Wang and Jianhuang Lai and Yao Zhao}, title = {Multi-scale Extracting and Second-Order Statistics for Lightweight Steganalysis}, booktitle = {Pattern Recognition and Computer Vision - 4th Chinese Conference, {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13020}, pages = {548--559}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88007-1\_45}, doi = {10.1007/978-3-030-88007-1\_45}, timestamp = {Mon, 20 Nov 2023 17:42:12 +0100}, biburl = {https://dblp.org/rec/conf/prcv/ChenFSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2021-1, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 7th International Conference, {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12736}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78609-0}, doi = {10.1007/978-3-030-78609-0}, isbn = {978-3-030-78608-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2021-2, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 7th International Conference, {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12737}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78612-0}, doi = {10.1007/978-3-030-78612-0}, isbn = {978-3-030-78611-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/CaoZWYS20, author = {Yi Cao and Zhili Zhou and Q. M. Jonathan Wu and Chengsheng Yuan and Xingming Sun}, title = {Coverless information hiding based on the generation of anime characters}, journal = {{EURASIP} J. Image Video Process.}, volume = {2020}, number = {1}, pages = {36}, year = {2020}, url = {https://doi.org/10.1186/s13640-020-00524-4}, doi = {10.1186/S13640-020-00524-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/CaoZWYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShenLSWX20, author = {Jian Shen and Dengzhi Liu and Xingming Sun and Fushan Wei and Yang Xiang}, title = {Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities}, journal = {Future Gener. Comput. Syst.}, volume = {109}, pages = {450--456}, year = {2020}, url = {https://doi.org/10.1016/j.future.2018.10.049}, doi = {10.1016/J.FUTURE.2018.10.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ShenLSWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YuanCYMCWS20, author = {Chengsheng Yuan and Xianyi Chen and Peipeng Yu and Ruohan Meng and Weijin Cheng and Q. M. Jonathan Wu and Xingming Sun}, title = {Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {55--71}, year = {2020}, url = {https://doi.org/10.1007/s11554-019-00928-0}, doi = {10.1007/S11554-019-00928-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YuanCYMCWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/LiSZY20, author = {Chuanlong Li and Xingming Sun and Zhili Zhou and Yimin Yang}, title = {Real-time image carrier generation based on generative adversarial network and fast object detection}, journal = {J. Real Time Image Process.}, volume = {17}, number = {3}, pages = {655--665}, year = {2020}, url = {https://doi.org/10.1007/s11554-020-00969-w}, doi = {10.1007/S11554-020-00969-W}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/LiSZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZhiFSY20, author = {Yueyan Zhi and Zhangjie Fu and Xingming Sun and Jingnan Yu}, title = {Security and Privacy Issues of {UAV:} {A} Survey}, journal = {Mob. Networks Appl.}, volume = {25}, number = {1}, pages = {95--101}, year = {2020}, url = {https://doi.org/10.1007/s11036-018-1193-x}, doi = {10.1007/S11036-018-1193-X}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ZhiFSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/FuLSLT20, author = {Zhangjie Fu and Yangen Liu and Xingming Sun and Yuling Liu and Zuwei Tian}, title = {Confusing-Keyword Based Secure Search over Encrypted Cloud Data}, journal = {Mob. Networks Appl.}, volume = {25}, number = {1}, pages = {125--132}, year = {2020}, url = {https://doi.org/10.1007/s11036-018-1195-8}, doi = {10.1007/S11036-018-1195-8}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/FuLSLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamd/YuanXSW20, author = {Chengsheng Yuan and Zhihua Xia and Xingming Sun and Q. M. Jonathan Wu}, title = {Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection}, journal = {{IEEE} Trans. Cogn. Dev. Syst.}, volume = {12}, number = {3}, pages = {461--473}, year = {2020}, url = {https://doi.org/10.1109/TCDS.2019.2920364}, doi = {10.1109/TCDS.2019.2920364}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tamd/YuanXSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ShenLBSSC20, author = {Jian Shen and Dengzhi Liu and Md. Zakirul Alam Bhuiyan and Jun Shen and Xingming Sun and Aniello Castiglione}, title = {Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {2}, pages = {280--290}, year = {2020}, url = {https://doi.org/10.1109/TETC.2017.2776402}, doi = {10.1109/TETC.2017.2776402}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/ShenLBSSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetci/ZhouWWSS20, author = {Zhili Zhou and Q. M. Jonathan Wu and Shaohua Wan and Wendi Sun and Xingming Sun}, title = {Integrating {SIFT} and {CNN} Feature Matching for Partial-Duplicate Image Detection}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {4}, number = {5}, pages = {593--604}, year = {2020}, url = {https://doi.org/10.1109/TETCI.2019.2909936}, doi = {10.1109/TETCI.2019.2909936}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetci/ZhouWWSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/ZhouWYS20, author = {Zhili Zhou and Q. M. Jonathan Wu and Yimin Yang and Xingming Sun}, title = {Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {16}, number = {2}, pages = {54:1--54:25}, year = {2020}, url = {https://doi.org/10.1145/3383582}, doi = {10.1145/3383582}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/ZhouWYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/XiaYLSXS20, author = {Zhihua Xia and Chengsheng Yuan and Rui Lv and Xingming Sun and Neal N. Xiong and Yun{-}Qing Shi}, title = {A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {50}, number = {4}, pages = {1526--1536}, year = {2020}, url = {https://doi.org/10.1109/TSMC.2018.2874281}, doi = {10.1109/TSMC.2018.2874281}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/XiaYLSXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2020-1, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12239}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57884-8}, doi = {10.1007/978-3-030-57884-8}, isbn = {978-3-030-57883-1}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2020-2, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7}, doi = {10.1007/978-3-030-57881-7}, isbn = {978-3-030-57880-0}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04945, author = {Zhiqing Guo and Gaobo Yang and Jiyou Chen and Xingming Sun}, title = {Fake Face Detection via Adaptive Residuals Extraction Network}, journal = {CoRR}, volume = {abs/2005.04945}, year = {2020}, url = {https://arxiv.org/abs/2005.04945}, eprinttype = {arXiv}, eprint = {2005.04945}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04945.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-12416, author = {Qi Gu and Zhihua Xia and Xingming Sun and Jian Weng}, title = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud computing}, journal = {CoRR}, volume = {abs/2007.12416}, year = {2020}, url = {https://arxiv.org/abs/2007.12416}, eprinttype = {arXiv}, eprint = {2007.12416}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuanXJCWS19, author = {Chengsheng Yuan and Zhihua Xia and Leqi Jiang and Yi Cao and Q. M. Jonathan Wu and Xingming Sun}, title = {Fingerprint Liveness Detection Using an Improved {CNN} With Image Scale Equalization}, journal = {{IEEE} Access}, volume = {7}, pages = {26953--26966}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2901235}, doi = {10.1109/ACCESS.2019.2901235}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuanXJCWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MengCZFS19, author = {Ruohan Meng and Qi Cui and Zhili Zhou and Zhangjie Fu and Xingming Sun}, title = {A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {90574--90584}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2920956}, doi = {10.1109/ACCESS.2019.2920956}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MengCZFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CuiZFMSW19, author = {Qi Cui and Zhili Zhou and Zhangjie Fu and Ruohan Meng and Xingming Sun and Q. M. Jonathan Wu}, title = {Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {90815--90824}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2913895}, doi = {10.1109/ACCESS.2019.2913895}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CuiZFMSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouCYS19, author = {Zhili Zhou and Jingcheng Chen and Ching{-}Nung Yang and Xingming Sun}, title = {Video Copy Detection Using Spatio-Temporal {CNN} Features}, journal = {{IEEE} Access}, volume = {7}, pages = {100658--100665}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2930173}, doi = {10.1109/ACCESS.2019.2930173}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouCYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/ZhouYYS19, author = {Zhili Zhou and Ching{-}Nung Yang and Yimin Yang and Xingming Sun}, title = {Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment}, journal = {Complex.}, volume = {2019}, pages = {2875676:1--2875676:8}, year = {2019}, url = {https://doi.org/10.1155/2019/2875676}, doi = {10.1155/2019/2875676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/ZhouYYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiangCYSZ19, author = {Leqi Jiang and Yi Cao and Chengsheng Yuan and Xingming Sun and Xiaoli Zhu}, title = {An effective comparison protocol over encrypted data in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102367}, doi = {10.1016/J.JISA.2019.102367}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiangCYSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/YuanSW19, author = {Chengsheng Yuan and Xingming Sun and Q. M. Jonathan Wu}, title = {Difference co-occurrence matrix using {BP} neural network for fingerprint liveness detection}, journal = {Soft Comput.}, volume = {23}, number = {13}, pages = {5157--5169}, year = {2019}, url = {https://doi.org/10.1007/s00500-018-3182-1}, doi = {10.1007/S00500-018-3182-1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/YuanSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenZHZSX19, author = {Jian Shen and Tianqi Zhou and Debiao He and Yuexin Zhang and Xingming Sun and Yang Xiang}, title = {Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {996--1010}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2725953}, doi = {10.1109/TDSC.2017.2725953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenZHZSX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/FuXZLS19, author = {Zhangjie Fu and Jiashuang Xu and Zhuangdi Zhu and Alex X. Liu and Xingming Sun}, title = {Writing in the Air with WiFi Signals for Virtual Reality Devices}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {2}, pages = {473--484}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2831709}, doi = {10.1109/TMC.2018.2831709}, timestamp = {Tue, 05 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/FuXZLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/FuHSVY19, author = {Zhangjie Fu and Fengxiao Huang and Xingming Sun and Athanasios V. Vasilakos and Ching{-}Nung Yang}, title = {Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {5}, pages = {813--823}, year = {2019}, url = {https://doi.org/10.1109/TSC.2016.2622697}, doi = {10.1109/TSC.2016.2622697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/FuHSVY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2019-1, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11632}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24274-9}, doi = {10.1007/978-3-030-24274-9}, isbn = {978-3-030-24273-2}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2019-2, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11633}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24265-7}, doi = {10.1007/978-3-030-24265-7}, isbn = {978-3-030-24264-0}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2019-3, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11634}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24271-8}, doi = {10.1007/978-3-030-24271-8}, isbn = {978-3-030-24270-1}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2019-4, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24268-8}, doi = {10.1007/978-3-030-24268-8}, isbn = {978-3-030-24267-1}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2019-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouYCS18, author = {Zhili Zhou and Ching{-}Nung Yang and Yi Cao and Xingming Sun}, title = {Secret Image Sharing Based on Encrypted Pixels}, journal = {{IEEE} Access}, volume = {6}, pages = {15021--15025}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2811722}, doi = {10.1109/ACCESS.2018.2811722}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouYCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiaMSSXJ18, author = {Zhihua Xia and Xiaohe Ma and Zixuan Shen and Xingming Sun and Neal N. Xiong and Byeungwoo Jeon}, title = {Secure Image {LBP} Feature Extraction in Cloud-Based Smart Campus}, journal = {{IEEE} Access}, volume = {6}, pages = {30392--30401}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2845456}, doi = {10.1109/ACCESS.2018.2845456}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiaMSSXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiaSXSJ18, author = {Zhihua Xia and Tianjiao Shi and Neal N. Xiong and Xingming Sun and Byeungwoo Jeon}, title = {A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure {KNN}}, journal = {{IEEE} Access}, volume = {6}, pages = {46695--46705}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2866411}, doi = {10.1109/ACCESS.2018.2866411}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiaSXSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShenCSLS18, author = {Jian Shen and Shaohua Chang and Jun Shen and Qi Liu and Xingming Sun}, title = {A lightweight multi-layer authentication protocol for wireless body area networks}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {956--963}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.11.033}, doi = {10.1016/J.FUTURE.2016.11.033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ShenCSLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/QinJCDS18, author = {Chuan Qin and Ping Ji and Chin{-}Chen Chang and Jing Dong and Xingming Sun}, title = {Non-uniform Watermark Sharing Based on Optimal Iterative {BTC} for Image Tampering Recovery}, journal = {{IEEE} Multim.}, volume = {25}, number = {3}, pages = {36--48}, year = {2018}, url = {https://doi.org/10.1109/MMUL.2018.112142509}, doi = {10.1109/MMUL.2018.112142509}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/QinJCDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/YangSCHC18, author = {Bin Yang and Xingming Sun and Enguo Cao and Weifeng Hu and Xianyi Chen}, title = {Convolutional neural network for smooth filtering detection}, journal = {{IET} Image Process.}, volume = {12}, number = {8}, pages = {1432--1438}, year = {2018}, url = {https://doi.org/10.1049/iet-ipr.2017.0683}, doi = {10.1049/IET-IPR.2017.0683}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/YangSCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ChenYTLWS18, author = {Beijing Chen and Ming Yu and Yuhang Tian and Leida Li and Dingcheng Wang and Xingming Sun}, title = {Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption}, journal = {{IET} Image Process.}, volume = {12}, number = {12}, pages = {2238--2249}, year = {2018}, url = {https://doi.org/10.1049/iet-ipr.2018.5440}, doi = {10.1049/IET-IPR.2018.5440}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/ChenYTLWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ZhangSY18, author = {Yanhua Zhang and Xingming Sun and Zhanke Yu}, title = {K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation}, journal = {Int. J. Sens. Networks}, volume = {27}, number = {4}, pages = {250--258}, year = {2018}, url = {https://doi.org/10.1504/IJSNET.2018.10014900}, doi = {10.1504/IJSNET.2018.10014900}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/ZhangSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/LiS18, author = {Chuanlong Li and Xingming Sun}, title = {A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle}, journal = {Int. J. Sens. Networks}, volume = {28}, number = {2}, pages = {80--88}, year = {2018}, url = {https://doi.org/10.1504/IJSNET.2018.096226}, doi = {10.1504/IJSNET.2018.096226}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/LiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShenZWSX18, author = {Jian Shen and Tianqi Zhou and Fushan Wei and Xingming Sun and Yang Xiang}, title = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G} in the Social Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {2526--2536}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2775248}, doi = {10.1109/JIOT.2017.2775248}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShenZWSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinCLZS18, author = {Chuan Qin and Xueqin Chen and Xiangyang Luo and Xinpeng Zhang and Xingming Sun}, title = {Perceptual image hashing via dual-cross pattern encoding and salient structure detection}, journal = {Inf. Sci.}, volume = {423}, pages = {284--302}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2017.09.060}, doi = {10.1016/J.INS.2017.09.060}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/QinCLZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangSGXC18, author = {Bin Yang and Xingming Sun and Honglei Guo and Zhihua Xia and Xianyi Chen}, title = {A copy-move forgery detection method based on {CMFD-SIFT}}, journal = {Multim. Tools Appl.}, volume = {77}, number = {1}, pages = {837--855}, year = {2018}, url = {https://doi.org/10.1007/s11042-016-4289-y}, doi = {10.1007/S11042-016-4289-Y}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/YangSGXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangLYLLS18, author = {Dengyong Zhang and Zaoshan Liang and Gaobo Yang and Qingguo Li and Leida Li and Xingming Sun}, title = {A robust forgery detection algorithm for object removal by exemplar-based image inpainting}, journal = {Multim. Tools Appl.}, volume = {77}, number = {10}, pages = {11823--11842}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4829-0}, doi = {10.1007/S11042-017-4829-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangLYLLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiWWSQ18, author = {Jin{-}Feng Li and Hong{-}Xia Wang and Tao Wu and Xingming Sun and Qing Qian}, title = {Norm ratio-based audio watermarking scheme in {DWT} domain}, journal = {Multim. Tools Appl.}, volume = {77}, number = {12}, pages = {14481--14497}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5024-z}, doi = {10.1007/S11042-017-5024-Z}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiWWSQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiaLS18, author = {Zhihua Xia and Rui Lv and Xingming Sun}, title = {Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18187--18200}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5517-9}, doi = {10.1007/S11042-017-5517-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiaLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/ZhouWS18, author = {Zhili Zhou and Q. M. Jonathan Wu and Xingming Sun}, title = {Encoding multiple contextual clues for partial-duplicate image retrieval}, journal = {Pattern Recognit. Lett.}, volume = {109}, pages = {18--26}, year = {2018}, url = {https://doi.org/10.1016/j.patrec.2017.08.013}, doi = {10.1016/J.PATREC.2017.08.013}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/ZhouWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangFS18, author = {Zhenghong Wang and Zhangjie Fu and Xingming Sun}, title = {Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {1420930:1--1420930:10}, year = {2018}, url = {https://doi.org/10.1155/2018/1420930}, doi = {10.1155/2018/1420930}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XiaZSQR18, author = {Zhihua Xia and Yi Zhu and Xingming Sun and Zhan Qin and Kui Ren}, title = {Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {1}, pages = {276--286}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2491933}, doi = {10.1109/TCC.2015.2491933}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/XiaZSQR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/DingYLZLS18, author = {Xiangling Ding and Gaobo Yang and Ran Li and Lebing Zhang and Yue Li and Xingming Sun}, title = {Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {7}, pages = {1497--1512}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2017.2676162}, doi = {10.1109/TCSVT.2017.2676162}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/DingYLZLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/QianWSCWS18, author = {Qing Qian and Hongxia Wang and Xingming Sun and Yunhe Cui and Huan Wang and Canghong Shi}, title = {Speech authentication and content recovery scheme for security communication and storage}, journal = {Telecommun. Syst.}, volume = {67}, number = {4}, pages = {635--649}, year = {2018}, url = {https://doi.org/10.1007/s11235-017-0360-x}, doi = {10.1007/S11235-017-0360-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/QianWSCWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ChenWWS18, author = {Yanli Chen and Hongxia Wang and Hanzhou Wu and Xingming Sun}, title = {A video error concealment method using data hiding based on compressed sensing over lossy channel}, journal = {Telecommun. Syst.}, volume = {68}, number = {2}, pages = {337--349}, year = {2018}, url = {https://doi.org/10.1007/s11235-017-0393-1}, doi = {10.1007/S11235-017-0393-1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/ChenWWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuXSLX18, author = {Zhangjie Fu and Lili Xia and Xingming Sun and Alex X. Liu and Guowu Xie}, title = {Semantic-Aware Searching Over Encrypted Data for Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2359--2371}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819121}, doi = {10.1109/TIFS.2018.2819121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuXSLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/XuFCTLDSL18, author = {Xiaolong Xu and Shucun Fu and Qing Cai and Wei Tian and Wenjie Liu and Wanchun Dou and Xingming Sun and Alex X. Liu}, title = {Dynamic Resource Allocation for Load Balancing in Fog Environment}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, year = {2018}, url = {https://doi.org/10.1155/2018/6421607}, doi = {10.1155/2018/6421607}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/XuFCTLDSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-1, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11063}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00006-6}, doi = {10.1007/978-3-030-00006-6}, isbn = {978-3-030-00005-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-2, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7}, doi = {10.1007/978-3-030-00009-7}, isbn = {978-3-030-00008-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-3, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7}, doi = {10.1007/978-3-030-00012-7}, isbn = {978-3-030-00011-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-4, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8}, doi = {10.1007/978-3-030-00015-8}, isbn = {978-3-030-00014-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-5, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {11067}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00018-9}, doi = {10.1007/978-3-030-00018-9}, isbn = {978-3-030-00017-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2018-6, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {11068}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00021-9}, doi = {10.1007/978-3-030-00021-9}, isbn = {978-3-030-00020-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2018-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShenWWSMH17, author = {Jian Shen and Chen Wang and Anxi Wang and Xingming Sun and Sangman Moh and Patrick C. K. Hung}, title = {Organized topology based routing protocol in incompletely predictable ad-hoc networks}, journal = {Comput. Commun.}, volume = {99}, pages = {107--118}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2016.07.009}, doi = {10.1016/J.COMCOM.2016.07.009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ShenWWSMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DingDYSHS17, author = {Xiangling Ding and Yingzhuo Deng and Gaobo Yang and Yun Song and Dajiang He and Xingming Sun}, title = {Design of new scan orders for perceptual encryption of {H.264/AVC} videos}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {2}, pages = {55--65}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2015.0492}, doi = {10.1049/IET-IFS.2015.0492}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/DingDYSHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhouWHS17, author = {Zhili Zhou and Q. M. Jonathan Wu and Fang Huang and Xingming Sun}, title = {Fast and accurate near-duplicate image elimination for visual sensor networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {2}, year = {2017}, url = {https://doi.org/10.1177/1550147717694172}, doi = {10.1177/1550147717694172}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhouWHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LiuSXS17, author = {Dandan Liu and Jian Shen and Zhihua Xia and Xingming Sun}, title = {A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing}, journal = {Inf.}, volume = {8}, number = {3}, pages = {96}, year = {2017}, url = {https://doi.org/10.3390/info8030096}, doi = {10.3390/INFO8030096}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LiuSXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GaoWYCZS17, author = {Guangyong Gao and Xiangdong Wan and Shimao Yao and Zongmin Cui and Caixue Zhou and Xingming Sun}, title = {Reversible data hiding with contrast enhancement and tamper localization for medical images}, journal = {Inf. Sci.}, volume = {385}, pages = {250--265}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.01.009}, doi = {10.1016/J.INS.2017.01.009}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/GaoWYCZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XiaXVS17, author = {Zhihua Xia and Neal N. Xiong and Athanasios V. Vasilakos and Xingming Sun}, title = {{EPCBIR:} An efficient and privacy-preserving content-based image retrieval scheme in cloud computing}, journal = {Inf. Sci.}, volume = {387}, pages = {195--204}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.12.030}, doi = {10.1016/J.INS.2016.12.030}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/XiaXVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLYLS17, author = {Dengyong Zhang and Qingguo Li and Gaobo Yang and Leida Li and Xingming Sun}, title = {Detection of image seam carving by using weber local descriptor and local binary patterns}, journal = {J. Inf. Secur. Appl.}, volume = {36}, pages = {135--144}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.09.003}, doi = {10.1016/J.JISA.2017.09.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangLYLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ShenLLHS17, author = {Jian Shen and Dengzhi Liu and Qi Liu and Debiao He and Xingming Sun}, title = {An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {923--938}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2050}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ShenLLHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ZhangYYXLS17, author = {Dengyong Zhang and Ting Yin and Gaobo Yang and Ming Xia and Leida Li and Xingming Sun}, title = {Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies}, journal = {J. Vis. Commun. Image Represent.}, volume = {48}, pages = {281--291}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.07.006}, doi = {10.1016/J.JVCIR.2017.07.006}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/ZhangYYXLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ChenQSS17, author = {Beijing Chen and Xiaoming Qi and Xingming Sun and Yun{-}Qing Shi}, title = {Quaternion pseudo-Zernike moments combining both of {RGB} information and depth information for color image splicing detection}, journal = {J. Vis. Commun. Image Represent.}, volume = {49}, pages = {283--290}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.08.011}, doi = {10.1016/J.JVCIR.2017.08.011}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/ChenQSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PengGLS17, author = {Fei Peng and Xiaoqing Gong and Min Long and Xingming Sun}, title = {A selective encryption scheme for protecting {H.264/AVC} video in multimedia social network}, journal = {Multim. Tools Appl.}, volume = {76}, number = {3}, pages = {3235--3253}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3710-x}, doi = {10.1007/S11042-016-3710-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PengGLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiaYLLS17, author = {Min Xia and Gaobo Yang and Leida Li and Ran Li and Xingming Sun}, title = {Detecting video frame rate up-conversion based on frame-level analysis of average texture variation}, journal = {Multim. Tools Appl.}, volume = {76}, number = {6}, pages = {8399--8421}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3468-1}, doi = {10.1007/S11042-016-3468-1}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/XiaYLLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuHSQ17, author = {Zhenghui Liu and Jiwu Huang and Xingming Sun and Chuanda Qi}, title = {A security watermark scheme used for digital speech forensics}, journal = {Multim. Tools Appl.}, volume = {76}, number = {7}, pages = {9297--9317}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3533-9}, doi = {10.1007/S11042-016-3533-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuHSQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SongYXZS17, author = {Yun Song and Gaobo Yang and Hongtao Xie and Dengyong Zhang and Xingming Sun}, title = {Residual domain dictionary learning for compressed sensing video recovery}, journal = {Multim. Tools Appl.}, volume = {76}, number = {7}, pages = {10083--10096}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3599-4}, doi = {10.1007/S11042-016-3599-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SongYXZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangWSQ17, author = {Huan Wang and Hong{-}Xia Wang and Xingming Sun and Qing Qian}, title = {A passive authentication scheme for copy-move forgery based on package clustering algorithm}, journal = {Multim. Tools Appl.}, volume = {76}, number = {10}, pages = {12627--12644}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3687-5}, doi = {10.1007/S11042-016-3687-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangWSQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MohammadSYYYJ17, author = {Nur Mohammad and Xingming Sun and Hengfu Yang and Jianping Yin and Gaobo Yang and Mingfang Jiang}, title = {Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images}, journal = {Multim. Tools Appl.}, volume = {76}, number = {11}, pages = {13301--13313}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3757-8}, doi = {10.1007/S11042-016-3757-8}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MohammadSYYYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShenTZSX17, author = {Jian Shen and Haowen Tan and Yan Zhang and Xingming Sun and Yang Xiang}, title = {A new lightweight {RFID} grouping authentication protocol for multiple tags in mobile environment}, journal = {Multim. Tools Appl.}, volume = {76}, number = {21}, pages = {22761--22783}, year = {2017}, url = {https://doi.org/10.1007/s11042-017-4386-6}, doi = {10.1007/S11042-017-4386-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShenTZSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShenTZSX17a, author = {Jian Shen and Haowen Tan and Yan Zhang and Xingming Sun and Yang Xiang}, title = {Erratum to: {A} new lightweight {RFID} grouping authentication protocol for multiple tags in mobile environment}, journal = {Multim. Tools Appl.}, volume = {76}, number = {21}, pages = {22785}, year = {2017}, url = {https://doi.org/10.1007/s11042-017-4602-4}, doi = {10.1007/S11042-017-4602-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShenTZSX17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/ShenLSLS17, author = {Jian Shen and Dengzhi Liu and Jun Shen and Qi Liu and Xingming Sun}, title = {A secure cloud-assisted urban data sharing framework for ubiquitous-cities}, journal = {Pervasive Mob. Comput.}, volume = {41}, pages = {219--230}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2017.03.013}, doi = {10.1016/J.PMCJ.2017.03.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/ShenLSLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/LiYZDS17, author = {Yue Li and Gaobo Yang and Yapei Zhu and Xiangling Ding and Xingming Sun}, title = {Adaptive Inter {CU} Depth Decision for {HEVC} Using Optimal Selection Model and Encoding Parameters}, journal = {{IEEE} Trans. Broadcast.}, volume = {63}, number = {3}, pages = {535--546}, year = {2017}, url = {https://doi.org/10.1109/TBC.2017.2704423}, doi = {10.1109/TBC.2017.2704423}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbc/LiYZDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouWWYS17, author = {Zhili Zhou and Yunlong Wang and Q. M. Jonathan Wu and Ching{-}Nung Yang and Xingming Sun}, title = {Effective and Efficient Global Context Verification for Image Copy Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {48--63}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601065}, doi = {10.1109/TIFS.2016.2601065}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouWWYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/LiYZDS17, author = {Yue Li and Gaobo Yang and Yapei Zhu and Xiangling Ding and Xingming Sun}, title = {Unimodal Stopping Model-Based Early {SKIP} Mode Decision for High-Efficiency Video Coding}, journal = {{IEEE} Trans. Multim.}, volume = {19}, number = {7}, pages = {1431--1441}, year = {2017}, url = {https://doi.org/10.1109/TMM.2017.2669863}, doi = {10.1109/TMM.2017.2669863}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/LiYZDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/GuSS17, author = {Bin Gu and Xingming Sun and Victor S. Sheng}, title = {Structural Minimax Probability Machine}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {28}, number = {7}, pages = {1646--1656}, year = {2017}, url = {https://doi.org/10.1109/TNNLS.2016.2544779}, doi = {10.1109/TNNLS.2016.2544779}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/GuSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ShenYLS17, author = {Linchuan Shen and Gaobo Yang and Leida Li and Xingming Sun}, editor = {Yong Liu and Liang Zhao and Guoyong Cai and Guoqing Xiao and Kenli Li and Lipo Wang}, title = {Robust detection for object removal with post-processing by exemplar-based image inpainting}, booktitle = {13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, {ICNC-FSKD} 2017, Guilin, China, July 29-31, 2017}, pages = {2730--2736}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/FSKD.2017.8393211}, doi = {10.1109/FSKD.2017.8393211}, timestamp = {Mon, 08 Mar 2021 17:45:50 +0100}, biburl = {https://dblp.org/rec/conf/icnc/ShenYLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShenFLWJS17, author = {Jian Shen and Meng Feng and Dengzhi Liu and Chen Wang and Jiachen Jiang and Xingming Sun}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {454--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_27}, doi = {10.1007/978-3-319-72359-4\_27}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShenFLWJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2017-1, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10602}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68505-2}, doi = {10.1007/978-3-319-68505-2}, isbn = {978-3-319-68504-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2017-2, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7}, doi = {10.1007/978-3-319-68542-7}, isbn = {978-3-319-68541-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiCSLY16, author = {Jing Li and Xiubo Chen and Xingming Sun and Zongpeng Li and Yixian Yang}, title = {Quantum network coding for multi-unicast problem based on 2D and 3D cluster states}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {4}, pages = {042301:1--042301:15}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5539-3}, doi = {10.1007/S11432-016-5539-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiCSLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiXCSY16, author = {Zhen{-}Zhen Li and Gang Xu and Xiu{-}Bo Chen and Xingming Sun and Yi{-}Xian Yang}, title = {Multi-User Quantum Wireless Network Communication Based on Multi-Qubit {GHZ} State}, journal = {{IEEE} Commun. Lett.}, volume = {20}, number = {12}, pages = {2470--2473}, year = {2016}, url = {https://doi.org/10.1109/LCOMM.2016.2610434}, doi = {10.1109/LCOMM.2016.2610434}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiXCSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhouYCSLW16, author = {Zhili Zhou and Ching{-}Nung Yang and Beijing Chen and Xingming Sun and Qi Liu and Q. M. Jonathan Wu}, title = {Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {6}, pages = {1531--1540}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDP7341}, doi = {10.1587/TRANSINF.2015EDP7341}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhouYCSLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/PanZLXS16, author = {Zhaoqing Pan and Yun Zhang and Jianjun Lei and Long Xu and Xingming Sun}, title = {Early {DIRECT} mode decision based on all-zero block and rate distortion cost for multiview video coding}, journal = {{IET} Image Process.}, volume = {10}, number = {1}, pages = {9--15}, year = {2016}, url = {https://doi.org/10.1049/iet-ipr.2014.1018}, doi = {10.1049/IET-IPR.2014.1018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/PanZLXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinCYWS16, author = {Chuan Qin and Xueqin Chen and Dengpan Ye and Jinwei Wang and Xingming Sun}, title = {A novel image hashing scheme with perceptual robustness using block truncation coding}, journal = {Inf. Sci.}, volume = {361-362}, pages = {84--99}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.04.036}, doi = {10.1016/J.INS.2016.04.036}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/QinCYWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinWZS16, author = {Chuan Qin and Huili Wang and Xinpeng Zhang and Xingming Sun}, title = {Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode}, journal = {Inf. Sci.}, volume = {373}, pages = {233--250}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.09.001}, doi = {10.1016/J.INS.2016.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/QinWZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YaoYSL16, author = {Yuxuan Yao and Gaobo Yang and Xingming Sun and Leida Li}, title = {Detecting video frame-rate up-conversion based on periodic properties of edge-intensity}, journal = {J. Inf. Secur. Appl.}, volume = {26}, pages = {39--50}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2015.12.001}, doi = {10.1016/J.JISA.2015.12.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YaoYSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GaoSSZCX16, author = {Guangyong Gao and Yun{-}Qing Shi and Xingming Sun and Caixue Zhou and Zongmin Cui and Liya Xu}, title = {Reversible Watermarking with Adaptive Embedding Threshold Matrix}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {9}, pages = {4603--4624}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.09.031}, doi = {10.3837/TIIS.2016.09.031}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GaoSSZCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhangWDLZXSW16, author = {Jiliang Zhang and Qiang Wu and Yipeng Ding and Yong{-}Qiang Lv and Qiang Zhou and Zhihua Xia and Xingming Sun and Xing{-}Wei Wang}, title = {Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {1}, pages = {124--136}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1616-8}, doi = {10.1007/S11390-016-1616-8}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/ZhangWDLZXSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/CaoFS16, author = {Xinyue Cao and Zhangjie Fu and Xingming Sun}, title = {A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing}, journal = {J. Electr. Comput. Eng.}, volume = {2016}, pages = {3219042:1--3219042:7}, year = {2016}, url = {https://doi.org/10.1155/2016/3219042}, doi = {10.1155/2016/3219042}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jece/CaoFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/TangLGSZ16, author = {Lijuan Tang and Leida Li and Ke Gu and Xingming Sun and Jianying Zhang}, title = {Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment}, journal = {J. Vis. Commun. Image Represent.}, volume = {40}, pages = {335--344}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.07.007}, doi = {10.1016/J.JVCIR.2016.07.007}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/TangLGSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/PanJLZSK16, author = {Zhaoqing Pan and Peng Jin and Jianjun Lei and Yun Zhang and Xingming Sun and Sam Kwong}, title = {Fast reference frame selection based on content similarity for low complexity {HEVC} encoder}, journal = {J. Vis. Commun. Image Represent.}, volume = {40}, pages = {516--524}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.07.018}, doi = {10.1016/J.JVCIR.2016.07.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/PanJLZSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiaWSLX16, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Quansheng Liu and Naixue Xiong}, title = {Steganalysis of {LSB} matching using differences between nonadjacent pixels}, journal = {Multim. Tools Appl.}, volume = {75}, number = {4}, pages = {1947--1962}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2381-8}, doi = {10.1007/S11042-014-2381-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiaWSLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangFSY16, author = {Fengxiao Huang and Zhangjie Fu and Xingming Sun and Ching{-}Nung Yang}, title = {Privacy-preserving outsourced gene data search in encryption domain}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5178--5186}, year = {2016}, url = {https://doi.org/10.1002/sec.1687}, doi = {10.1002/SEC.1687}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangFSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/PanLZSK16, author = {Zhaoqing Pan and Jianjun Lei and Yun Zhang and Xingming Sun and Sam Kwong}, title = {Fast Motion Estimation Based on Content Property for Low-Complexity {H.265/HEVC} Encoder}, journal = {{IEEE} Trans. Broadcast.}, volume = {62}, number = {3}, pages = {675--684}, year = {2016}, url = {https://doi.org/10.1109/TBC.2016.2580920}, doi = {10.1109/TBC.2016.2580920}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/PanLZSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/FanLWS16, author = {Mingquan Fan and Peipei Liu and Hongxia Wang and Xingming Sun}, title = {Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography}, journal = {Telecommun. Syst.}, volume = {63}, number = {4}, pages = {523--529}, year = {2016}, url = {https://doi.org/10.1007/s11235-016-0139-5}, doi = {10.1007/S11235-016-0139-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/FanLWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaWZQSR16, author = {Zhihua Xia and Xinhui Wang and Liangao Zhang and Zhan Qin and Xingming Sun and Kui Ren}, title = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2594--2608}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2590944}, doi = {10.1109/TIFS.2016.2590944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuWGSR16, author = {Zhangjie Fu and Xinle Wu and Chaowen Guan and Xingming Sun and Kui Ren}, title = {Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2706--2716}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2596138}, doi = {10.1109/TIFS.2016.2596138}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuWGSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiCZLKS16, author = {Leida Li and Hao Cai and Yabin Zhang and Weisi Lin and Alex C. Kot and Xingming Sun}, title = {Sparse Representation-Based Image Quality Index With Adaptive Sub-Dictionaries}, journal = {{IEEE} Trans. Image Process.}, volume = {25}, number = {8}, pages = {3775--3786}, year = {2016}, url = {https://doi.org/10.1109/TIP.2016.2577891}, doi = {10.1109/TIP.2016.2577891}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/LiCZLKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/XiaWSW16, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Qian Wang}, title = {A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {2}, pages = {340--352}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2401003}, doi = {10.1109/TPDS.2015.2401003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/XiaWSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/FuRSSH16, author = {Zhangjie Fu and Kui Ren and Jiangang Shu and Xingming Sun and Fengxiao Huang}, title = {Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {9}, pages = {2546--2559}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2506573}, doi = {10.1109/TPDS.2015.2506573}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/FuRSSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/YangLYLXWS16, author = {Panlong Yang and Qingyu Li and Yubo Yan and Xiang{-}Yang Li and Yan Xiong and Baowei Wang and Xingming Sun}, title = {"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {65}, number = {7}, pages = {5485--5496}, year = {2016}, url = {https://doi.org/10.1109/TVT.2015.2465392}, doi = {10.1109/TVT.2015.2465392}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/YangLYLXWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenWWRS16, author = {Jian Shen and Anxi Wang and Chen Wang and Yongjun Ren and Xingming Sun}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A {RFID} Based Localization Algorithm for Wireless Sensor Networks}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10040}, pages = {275--285}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48674-1\_25}, doi = {10.1007/978-3-319-48674-1\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShenWWRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FuSJX16, author = {Zhangjie Fu and Xingming Sun and Sai Ji and Guowu Xie}, title = {Towards efficient content-aware search over encrypted outsourced data in cloud}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524606}, doi = {10.1109/INFOCOM.2016.7524606}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/FuSJX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2016-1, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0}, doi = {10.1007/978-3-319-48671-0}, isbn = {978-3-319-48670-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2016-2, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10040}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48674-1}, doi = {10.1007/978-3-319-48674-1}, isbn = {978-3-319-48673-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangSCZL15, author = {Bin Yang and Xingming Sun and Xianyi Chen and Jianjun Zhang and Xu Li}, title = {Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {588--600}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu146}, doi = {10.1093/COMJNL/BXU146}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangSCZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinYLZS15, author = {Ting Yin and Gaobo Yang and Leida Li and Dengyong Zhang and Xingming Sun}, title = {Detecting seam carving based image resizing using local binary patterns}, journal = {Comput. Secur.}, volume = {55}, pages = {130--141}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.003}, doi = {10.1016/J.COSE.2015.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinYLZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FuSLZS15, author = {Zhangjie Fu and Xingming Sun and Qi Liu and Lu Zhou and Jiangang Shu}, title = {Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing}, journal = {{IEICE} Trans. Commun.}, volume = {98-B}, number = {1}, pages = {190--200}, year = {2015}, url = {https://doi.org/10.1587/transcom.E98.B.190}, doi = {10.1587/TRANSCOM.E98.B.190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FuSLZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/ShenTMCLS15, author = {Jian Shen and Haowen Tan and Sangman Moh and Ilyong Chung and Qi Liu and Xingming Sun}, title = {Enhanced secure sensor association and key management in wireless body area networks}, journal = {J. Commun. Networks}, volume = {17}, number = {5}, pages = {453--462}, year = {2015}, url = {https://doi.org/10.1109/JCN.2015.000083}, doi = {10.1109/JCN.2015.000083}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/ShenTMCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/FuSX15, author = {Zhangjie Fu and Xingming Sun and Jie Xi}, title = {Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication}, journal = {J. Commun. Networks}, volume = {17}, number = {5}, pages = {525--533}, year = {2015}, url = {https://doi.org/10.1109/JCN.2015.000091}, doi = {10.1109/JCN.2015.000091}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/FuSX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/YangSXHW15, author = {Bin Yang and Xingming Sun and Xiangyang Xin and Weifeng Hu and Youxin Wu}, title = {Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression}, journal = {J. Electronic Imaging}, volume = {24}, number = {6}, pages = {063016}, year = {2015}, url = {https://doi.org/10.1117/1.JEI.24.6.063016}, doi = {10.1117/1.JEI.24.6.063016}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jei/YangSXHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmiv/ChenSCCSC15, author = {Beijing Chen and Huazhong Shu and Gouenou Coatrieux and Gang Chen and Xingming Sun and Jean{-}Louis Coatrieux}, title = {Color Image Analysis by Quaternion-Type Moments}, journal = {J. Math. Imaging Vis.}, volume = {51}, number = {1}, pages = {124--144}, year = {2015}, url = {https://doi.org/10.1007/s10851-014-0511-6}, doi = {10.1007/S10851-014-0511-6}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmiv/ChenSCCSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenSSXY15, author = {Xianyi Chen and Xingming Sun and Huiyu Sun and Lingyun Xiang and Bin Yang}, title = {Histogram shifting based reversible data hiding method using directed-prediction scheme}, journal = {Multim. Tools Appl.}, volume = {74}, number = {15}, pages = {5747--5765}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1881-x}, doi = {10.1007/S11042-014-1881-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChenSSXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SunYWXLZ15, author = {Xingming Sun and Shuangshuang Yan and Baowei Wang and Li Xia and Qi Liu and Hui Zhang}, title = {Air Temperature Error Correction Based on Solar Radiation in an Economical Meteorological Wireless Sensor Network}, journal = {Sensors}, volume = {15}, number = {8}, pages = {18114--18139}, year = {2015}, url = {https://doi.org/10.3390/s150818114}, doi = {10.3390/S150818114}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/SunYWXLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/PanCS15, author = {Zhaoqing Pan and Liming Chen and Xingming Sun}, title = {Low Complexity {HEVC} Encoder for Visual Sensor Networks}, journal = {Sensors}, volume = {15}, number = {12}, pages = {30115--30125}, year = {2015}, url = {https://doi.org/10.3390/s151229788}, doi = {10.3390/S151229788}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/PanCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLYS15, author = {Jian Li and Xiaolong Li and Bin Yang and Xingming Sun}, title = {Segmentation-Based Image Copy-Move Forgery Detection Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {507--518}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2381872}, doi = {10.1109/TIFS.2014.2381872}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiSL15, author = {Xu Li and Xingming Sun and Quansheng Liu}, title = {Image Integrity Authentication Scheme Based on Fixed Point Theory}, journal = {{IEEE} Trans. Image Process.}, volume = {24}, number = {2}, pages = {632--645}, year = {2015}, url = {https://doi.org/10.1109/TIP.2014.2372473}, doi = {10.1109/TIP.2014.2372473}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/LiSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouSHCS15, author = {Zhili Zhou and Huiyu Sun and Rohan Harit and Xianyi Chen and Xingming Sun}, editor = {Zhiqiu Huang and Xingming Sun and Junzhou Luo and Jian Wang}, title = {Coverless Image Steganography Without Embedding}, booktitle = {Cloud Computing and Security - First International Conference, {ICCCS} 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9483}, pages = {123--132}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27051-7\_11}, doi = {10.1007/978-3-319-27051-7\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouSHCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenSTZS15, author = {Xianyi Chen and Huiyu Sun and Yoshito Tobe and Zhili Zhou and Xingming Sun}, editor = {Zhiqiu Huang and Xingming Sun and Junzhou Luo and Jian Wang}, title = {Coverless Information Hiding Method Based on the Chinese Mathematical Expression}, booktitle = {Cloud Computing and Security - First International Conference, {ICCCS} 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9483}, pages = {133--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27051-7\_12}, doi = {10.1007/978-3-319-27051-7\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenSTZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2015, editor = {Zhiqiu Huang and Xingming Sun and Junzhou Luo and Jian Wang}, title = {Cloud Computing and Security - First International Conference, {ICCCS} 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9483}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27051-7}, doi = {10.1007/978-3-319-27051-7}, isbn = {978-3-319-27050-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/ChenCCSCS14, author = {Beijing Chen and Gouenou Coatrieux and Gang Chen and Xingming Sun and Jean{-}Louis Coatrieux and Huazhong Shu}, title = {Full 4-D quaternion discrete Fourier transform based watermarking for color images}, journal = {Digit. Signal Process.}, volume = {28}, pages = {106--119}, year = {2014}, url = {https://doi.org/10.1016/j.dsp.2014.02.010}, doi = {10.1016/J.DSP.2014.02.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/ChenCCSCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ChenLSLS14, author = {Beijing Chen and Quansheng Liu and Xingming Sun and Xu Li and Huazhong Shu}, title = {Removing Gaussian noise for colour images by quaternion representation and optimisation of weights in non-local means filter}, journal = {{IET} Image Process.}, volume = {8}, number = {10}, pages = {591--600}, year = {2014}, url = {https://doi.org/10.1049/iet-ipr.2013.0521}, doi = {10.1049/IET-IPR.2013.0521}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/ChenLSLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/XiaZSC14, author = {Zhihua Xia and Yanling Zhu and Xingming Sun and Lihong Chen}, title = {Secure semantic expansion based search over encrypted cloud data supporting similarity ranking}, journal = {J. Cloud Comput.}, volume = {3}, pages = {8}, year = {2014}, url = {https://doi.org/10.1186/s13677-014-0008-2}, doi = {10.1186/S13677-014-0008-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/XiaZSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/ShenMCS14, author = {Jian Shen and Sangman Moh and Ilyong Chung and Xingming Sun}, title = {Buffer scheme optimization of epidemic routing in delay tolerant networks}, journal = {J. Commun. Networks}, volume = {16}, number = {6}, pages = {656--666}, year = {2014}, url = {https://doi.org/10.1109/JCN.2014.000112}, doi = {10.1109/JCN.2014.000112}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/ShenMCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiangSLX14, author = {Lingyun Xiang and Xingming Sun and Gang Luo and Bin Xia}, title = {Linguistic steganalysis using the features derived from synonym frequency}, journal = {Multim. Tools Appl.}, volume = {71}, number = {3}, pages = {1893--1911}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1313-8}, doi = {10.1007/S11042-012-1313-8}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiangSLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiaWSW14, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Baowei Wang}, title = {Steganalysis of least significant bit matching using multi-order differences}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1283--1291}, year = {2014}, url = {https://doi.org/10.1002/sec.864}, doi = {10.1002/SEC.864}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiaWSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhouSCCF14, author = {Zhili Zhou and Xingming Sun and Xianyi Chen and Cheng Chang and Zhangjie Fu}, title = {A novel signature based on the combination of global and local signatures for image copy detection}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1702--1711}, year = {2014}, url = {https://doi.org/10.1002/sec.866}, doi = {10.1002/SEC.866}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhouSCCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/FuSLZ14, author = {Zhangjie Fu and Xingming Sun and Nigel Linge and Lu Zhou}, title = {Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {60}, number = {1}, pages = {164--172}, year = {2014}, url = {https://doi.org/10.1109/TCE.2014.6780939}, doi = {10.1109/TCE.2014.6780939}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/FuSLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/FuSSL14, author = {Zhangjie Fu and Jiangang Shu and Xingming Sun and Nigel Linge}, title = {Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {60}, number = {4}, pages = {762--770}, year = {2014}, url = {https://doi.org/10.1109/TCE.2014.7027353}, doi = {10.1109/TCE.2014.7027353}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/FuSSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/ZhangWNS14, author = {Hui Zhang and Q. M. Jonathan Wu and Thanh Minh Nguyen and Xingming Sun}, title = {Synthetic Aperture Radar Image Segmentation by Modified Student's t-Mixture Model}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {52}, number = {7}, pages = {4391--4403}, year = {2014}, url = {https://doi.org/10.1109/TGRS.2013.2281854}, doi = {10.1109/TGRS.2013.2281854}, timestamp = {Sat, 15 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/ZhangWNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FuSSZ14, author = {Zhangjie Fu and Jiangang Shu and Xingming Sun and Daxing Zhang}, editor = {Robert H. Deng and Elaine Shi and Kui Ren}, title = {Semantic keyword search based on trie over encrypted cloud data}, booktitle = {Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014}, pages = {59--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600075.2600081}, doi = {10.1145/2600075.2600081}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FuSSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/FuCWS14, author = {Zhangjie Fu and Xinyue Cao and Jin Wang and Xingming Sun}, editor = {Junzo Watada and Akinori Ito and Jeng{-}Shyang Pan and Han{-}Chieh Chao and Chien{-}Ming Chen}, title = {Secure Storage of Data in Cloud Computing}, booktitle = {2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan, August 27-29, 2014}, pages = {783--786}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IIH-MSP.2014.199}, doi = {10.1109/IIH-MSP.2014.199}, timestamp = {Thu, 22 Oct 2020 13:52:00 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/FuCWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/FuXWS14a, author = {Zhangjie Fu and Jie Xi and Jin Wang and Xingming Sun}, editor = {Junzo Watada and Akinori Ito and Jeng{-}Shyang Pan and Han{-}Chieh Chao and Chien{-}Ming Chen}, title = {Document Attribute-Based Keyword Search over Encrypted Data}, booktitle = {2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan, August 27-29, 2014}, pages = {787--790}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IIH-MSP.2014.200}, doi = {10.1109/IIH-MSP.2014.200}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/FuXWS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/FuSWS14, author = {Zhangjie Fu and Jiangang Shu and Jin Wang and Xingming Sun}, editor = {Junzo Watada and Akinori Ito and Jeng{-}Shyang Pan and Han{-}Chieh Chao and Chien{-}Ming Chen}, title = {A Similarity Search Method for Encrypted Cloud Document}, booktitle = {2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan, August 27-29, 2014}, pages = {791--794}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IIH-MSP.2014.201}, doi = {10.1109/IIH-MSP.2014.201}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/FuSWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhouSWFS14, author = {Zhili Zhou and Xingming Sun and Yunlong Wang and Zhangjie Fu and Yun{-}Qing Shi}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Combination of {SIFT} Feature and Convex Region-Based Global Context Feature for Image Copy Detection}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {60--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_5}, doi = {10.1007/978-3-319-19321-2\_5}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhouSWFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FuSS14, author = {Zhangjie Fu and Jiangang Shu and Xingming Sun}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {45--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_4}, doi = {10.1007/978-3-319-23829-6\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/FuSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/RuanSL13, author = {Zhiqiang Ruan and Xingming Sun and Wei Liang}, title = {Securing sensor data storage and query based on \emph{k}-out-of- \emph{n} coding}, journal = {Int. J. Commun. Syst.}, volume = {26}, number = {5}, pages = {549--566}, year = {2013}, url = {https://doi.org/10.1002/dac.1358}, doi = {10.1002/DAC.1358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/RuanSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/XiaWSW13, author = {Zhihua Xia and Shufang Wang and Xingming Sun and Baowei Wang}, title = {Steganalysis of least significant bit matching based on image histogram and correlation}, journal = {J. Electronic Imaging}, volume = {22}, number = {3}, pages = {033008}, year = {2013}, url = {https://doi.org/10.1117/1.JEI.22.3.033008}, doi = {10.1117/1.JEI.22.3.033008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/XiaWSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChenSSZZ13, author = {Xianyi Chen and Xingming Sun and Huiyu Sun and Zhili Zhou and Jianjun Zhang}, title = {Reversible watermarking method based on asymmetric-histogram shifting of prediction errors}, journal = {J. Syst. Softw.}, volume = {86}, number = {10}, pages = {2620--2626}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.04.086}, doi = {10.1016/J.JSS.2013.04.086}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChenSSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/FuSXZS13, author = {Zhangjie Fu and Xingming Sun and Zhihua Xia and Lu Zhou and Jiangang Shu}, title = {Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing}, booktitle = {{IEEE} 32nd International Performance Computing and Communications Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PCCC.2013.6742783}, doi = {10.1109/PCCC.2013.6742783}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/FuSXZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiLS13, author = {Jian Li and Xiaolong Li and Xingming Sun}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {A New Reversible Data Hiding Scheme Based on Efficient Prediction}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {326--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_24}, doi = {10.1007/978-3-662-43886-2\_24}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FuSZS13, author = {Zhangjie Fu and Xingming Sun and Lu Zhou and Jiangang Shu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {New Forensic Methods for {OOXML} Format Documents}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {503--513}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_36}, doi = {10.1007/978-3-662-43886-2\_36}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/FuSZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013scc, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484402}, isbn = {978-1-4503-2067-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013scc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiSL13, author = {Xu Li and Xingming Sun and Quansheng Liu}, title = {Image Integrity Authentication Scheme Based On Fixed Point Theory}, journal = {CoRR}, volume = {abs/1308.0679}, year = {2013}, url = {http://arxiv.org/abs/1308.0679}, eprinttype = {arXiv}, eprint = {1308.0679}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiSLC13, author = {Xu Li and Xingming Sun and Quansheng Liu and Beijing Chen}, title = {A Novel Method for Image Integrity Authentication Based on Fixed Point Theory}, journal = {CoRR}, volume = {abs/1308.5326}, year = {2013}, url = {http://arxiv.org/abs/1308.5326}, eprinttype = {arXiv}, eprint = {1308.5326}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiSLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WandjiSK13, author = {Nathalie Diane Wandji and Xingming Sun and Moise Fah Kue}, title = {Detection of copy-move forgery in digital images based on {DCT}}, journal = {CoRR}, volume = {abs/1308.5661}, year = {2013}, url = {http://arxiv.org/abs/1308.5661}, eprinttype = {arXiv}, eprint = {1308.5661}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WandjiSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FuSLL12, author = {Zhangjie Fu and Xingming Sun and Yuling Liu and Bo Li}, title = {Text split-based steganography in {OOXML} format documents for covert communication}, journal = {Secur. Commun. Networks}, volume = {5}, number = {9}, pages = {957--968}, year = {2012}, url = {https://doi.org/10.1002/sec.378}, doi = {10.1002/SEC.378}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FuSLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/LiZDS12, author = {Sujun Li and Boqing Zhou and Jingguo Dai and Xingming Sun}, title = {A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {1}, number = {5}, pages = {416--419}, year = {2012}, url = {https://doi.org/10.1109/WCL.2012.061212.120201}, doi = {10.1109/WCL.2012.061212.120201}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/LiZDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cad/PengLLS11, author = {Fei Peng and Yu{-}Zhou Lei and Min Long and Xingming Sun}, title = {A reversible watermarking scheme for two-dimensional {CAD} engineering graphics based on improved difference expansion}, journal = {Comput. Aided Des.}, volume = {43}, number = {8}, pages = {1018--1024}, year = {2011}, url = {https://doi.org/10.1016/j.cad.2011.03.011}, doi = {10.1016/J.CAD.2011.03.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cad/PengLLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FuSLL11, author = {Zhangjie Fu and Xingming Sun and Yuling Liu and Bo Li}, title = {Forensic investigation of {OOXML} format documents}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {48--55}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.04.001}, doi = {10.1016/J.DIIN.2011.04.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FuSLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/HanZXS11, author = {Jinsong Han and Jizhong Zhao and Min Xi and Xingming Sun}, title = {Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {8}, number = {1/2}, pages = {106--113}, year = {2011}, url = {https://doi.org/10.1504/IJAHUC.2011.041626}, doi = {10.1504/IJAHUC.2011.041626}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/HanZXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/ShahSHM11, author = {S. A. Shah and Xingming Sun and Ali Hamadou and Abdul Majid}, title = {Query Preserving Relational Database Watermarking}, journal = {Informatica (Slovenia)}, volume = {35}, number = {3}, pages = {391--396}, year = {2011}, url = {http://www.informatica.si/index.php/informatica/article/view/363}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/ShahSHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/LiaoLSZ10, author = {Bo Liao and Benyou Liao and Xingming Sun and Qingguang Zeng}, title = {A Novel method for similarity analysis and protein sub-cellular localization prediction}, journal = {Bioinform.}, volume = {26}, number = {21}, pages = {2678--2683}, year = {2010}, url = {https://doi.org/10.1093/bioinformatics/btq521}, doi = {10.1093/BIOINFORMATICS/BTQ521}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/LiaoLSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/XiaoSLWXL10, author = {Xiangrong Xiao and Xingming Sun and Fan Li and Baowei Wang and Zhihua Xia and Wei Liang}, title = {Watermarking-based intellectual property protection for sensor streaming data}, journal = {Int. J. Comput. Appl. Technol.}, volume = {39}, number = {4}, pages = {213--223}, year = {2010}, url = {https://doi.org/10.1504/IJCAT.2010.036025}, doi = {10.1504/IJCAT.2010.036025}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcat/XiaoSLWXL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdcta/HosamYLS10, author = {Osama Hosam and Lincong Yang and Wei Liang and Xingming Sun}, title = {Watermarking 3D Triangular Mesh with High Visual Quality}, journal = {J. Digit. Content Technol. its Appl.}, volume = {4}, number = {4}, pages = {107--116}, year = {2010}, url = {http://www.aicit.org/jdcta/ppl/11.\%20JDCTA2-337067.pdf}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdcta/HosamYLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/XiaSLQL10, author = {Zhihua Xia and Xingming Sun and Wei Liang and Jiaohua Qin and Feng Li}, title = {{JPEG} image steganalysis using joint discrete cosine transform domain features}, journal = {J. Electronic Imaging}, volume = {19}, number = {2}, pages = {023006}, year = {2010}, url = {https://doi.org/10.1117/1.3421972}, doi = {10.1117/1.3421972}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/XiaSLQL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhouLLSW09, author = {Boqing Zhou and Sujun Li and Qiaoliang Li and Xingming Sun and Xiaoming Wang}, title = {An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge}, journal = {Comput. Commun.}, volume = {32}, number = {1}, pages = {124--133}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2008.09.035}, doi = {10.1016/J.COMCOM.2008.09.035}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhouLLSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuSCW09, author = {Yuling Liu and Xingming Sun and Ingemar J. Cox and Hong Wang}, title = {Natural Language Information Hiding Based on Chinese Mathematical Expression}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {10--15}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p10-15.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuSCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcc/LiaoCSZ09, author = {Bo Liao and Weiyang Chen and Xingming Sun and Wen Zhu}, title = {A binary coding method of {RNA} secondary structure and its application}, journal = {J. Comput. Chem.}, volume = {30}, number = {14}, pages = {2205--2212}, year = {2009}, url = {https://doi.org/10.1002/jcc.21227}, doi = {10.1002/JCC.21227}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcc/LiaoCSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/QinSXN09, author = {Jiaohua Qin and Xingming Sun and Xuyu Xiang and Changming Niu}, title = {Principal feature selection and fusion method for image steganalysis}, journal = {J. Electronic Imaging}, volume = {18}, number = {3}, pages = {033009}, year = {2009}, url = {https://doi.org/10.1117/1.3206961}, doi = {10.1117/1.3206961}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/QinSXN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YangSYLX09, author = {Ying Yang and Xingming Sun and Hengfu Yang and Chang{-}Tsun Li and Rong Xiao}, title = {A Contrast-Sensitive Reversible Visible Image Watermarking Technique}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {19}, number = {5}, pages = {656--667}, year = {2009}, url = {https://doi.org/10.1109/TCSVT.2009.2017401}, doi = {10.1109/TCSVT.2009.2017401}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YangSYLX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/HosamS09, author = {Osama Hosam and Xingming Sun}, editor = {Huaikou Miao and Gongzhu Hu}, title = {Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique}, booktitle = {8th {IEEE/ACIS} International Conference on Computer and Information Science, {IEEE/ACIS} {ICIS} 2009, June 1-3, 2009, Shanghai, China}, pages = {627--632}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICIS.2009.166}, doi = {10.1109/ICIS.2009.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/HosamS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/YangSYL08, author = {Ying Yang and Xingming Sun and Hengfu Yang and Chang{-}Tsun Li}, title = {Removable visible image watermarking algorithm in the discrete cosine transform domain}, journal = {J. Electronic Imaging}, volume = {17}, number = {3}, pages = {033008}, year = {2008}, url = {https://doi.org/10.1117/1.2952843}, doi = {10.1117/1.2952843}, timestamp = {Fri, 08 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/YangSYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/BaiSSDZ08, author = {Yameng Bai and Xingming Sun and Guang Sun and Xiaohong Deng and Xiaoming Zhou}, title = {Dynamic K-Gram Based Software Birthmark}, booktitle = {19th Australian Software Engineering Conference {(ASWEC} 2008), March 25-28, 2008, Perth, Australia}, pages = {644--649}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.ieeecomputersociety.org/10.1109/ASWEC.2008.21}, doi = {10.1109/ASWEC.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/BaiSSDZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WangSWX08, author = {Baowei Wang and Xingming Sun and Xinbing Wang and Bin Xiao}, title = {Time-Based Privacy Protection for Multi-attribute Data in WSNs}, booktitle = {14th International Conference on Parallel and Distributed Systems, {ICPADS} 2008, Melbourne, Victoria, Australia, December 8-10, 2008}, pages = {615--622}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPADS.2008.67}, doi = {10.1109/ICPADS.2008.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/WangSWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/XiaoSY08, author = {Rong Xiao and Xingming Sun and Ying Yang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Copyright Protection in Wireless Sensor Networks by Watermarking}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {7--10}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.139}, doi = {10.1109/IIH-MSP.2008.139}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/XiaoSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LiuSLX08, author = {Yongping Liu and Xingming Sun and Yuling Liu and Rong Xiao}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {File-Update Based Steganography for Microsoft PowerPoint Files}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {11--15}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.150}, doi = {10.1109/IIH-MSP.2008.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LiuSLX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LiSWW08, author = {Zishuai Li and Xingming Sun and Baowei Wang and Xiaoliang Wang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {A Steganography Scheme in {P2P} Network}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {20--24}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.144}, doi = {10.1109/IIH-MSP.2008.144}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/LiSWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/HuangZS08, author = {Huajun Huang and Shaohong Zhong and Xingming Sun}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {An Algorithm of Webpage Information Hiding Based on Attributes Permutation}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {257--260}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.195}, doi = {10.1109/IIH-MSP.2008.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/HuangZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/XieSXL08, author = {Yuhua Xie and Xingming Sun and Lingyun Xiang and Gang Luo}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {294--297}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.147}, doi = {10.1109/IIH-MSP.2008.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/XieSXL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhouSSY08, author = {Xiaoming Zhou and Xingming Sun and Guang Sun and Ying Yang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1416--1421}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.145}, doi = {10.1109/IIH-MSP.2008.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhouSSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/PengS08, author = {Fei Peng and Xingming Sun}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1516--1519}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.115}, doi = {10.1109/IIH-MSP.2008.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/PengS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/HuangZS08, author = {Huajun Huang and Shaohong Zhong and Xingming Sun}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {957--960}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.169}, doi = {10.1109/ISECS.2008.169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/HuangZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangTSL08, author = {Huajun Huang and Junshan Tan and Xingming Sun and Lingxi Liu}, editor = {Hyoung{-}Joong Kim and Stefan Katzenbeisser and Anthony Tung Shuen Ho}, title = {Detection of Hidden Information in Webpage Based on Higher-Order Statistics}, booktitle = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan, Korea, November 10-12, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5450}, pages = {293--302}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04438-0\_25}, doi = {10.1007/978-3-642-04438-0\_25}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangTSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/XiaoSC07, author = {Xiangrong Xiao and Xingming Sun and Minggang Chen}, editor = {Ning Zhang and Ajith Abraham}, title = {Second-LSB-Dependent Robust Watermarking for Relational Database}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {292--300}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.25}, doi = {10.1109/IAS.2007.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/XiaoSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HuangSHL07, author = {Junwei Huang and Xingming Sun and Huajun Huang and Gang Luo}, editor = {Ning Zhang and Ajith Abraham}, title = {Detection of Hidden Information in Webpages Based on Randomness}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {447--452}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.74}, doi = {10.1109/IAS.2007.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HuangSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/XiangSLG07, author = {Lingyun Xiang and Xingming Sun and Gang Luo and Can Gan}, editor = {Ning Zhang and Ajith Abraham}, title = {Research on Steganalysis for Text Steganography Based on Font Format}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {490--495}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.48}, doi = {10.1109/IAS.2007.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/XiangSLG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/HuangSLS07, author = {Huajun Huang and Xingming Sun and Zishuai Li and Guang Sun}, editor = {J. Lei}, title = {Detection of Hidden Information in Webpage}, booktitle = {Fourth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 4}, pages = {317--321}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FSKD.2007.247}, doi = {10.1109/FSKD.2007.247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fskd/HuangSLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/YangSWQ07, author = {Hengfu Yang and Xingming Sun and Bin Wang and Zheng Qin}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4707}, pages = {1066--1075}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74484-9\_93}, doi = {10.1007/978-3-540-74484-9\_93}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/YangSWQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YulingXCH07, author = {Yuling Liu and Xingming Sun and Can Gan and Hong Wang}, title = {An Efficient Linguistic Steganography for Chinese Text}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {2094--2097}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4285095}, doi = {10.1109/ICME.2007.4285095}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YulingXCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LuoSXH07, author = {Gang Luo and Xingming Sun and Lingyun Xiang and Junwei Huang}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {126--129}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.85}, doi = {10.1109/IIH-MSP.2007.85}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LuoSXH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/HuangSSH07, author = {Huajun Huang and Xingming Sun and Guang Sun and Junwei Huang}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {257--260}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIHMSP.2007.4457539}, doi = {10.1109/IIHMSP.2007.4457539}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/HuangSSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoscale/Hua-junXGJ07, author = {Huajun Huang and Xingming Sun and Guang Sun and Junwei Huang}, editor = {Jianzhong Li and Wang{-}Chien Lee and Fabrizio Silvestri}, title = {Detection of steganographic information in tags of webpage}, booktitle = {Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {304}, pages = {72}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.4108/infoscale.2007.959}, doi = {10.4108/INFOSCALE.2007.959}, timestamp = {Wed, 28 Nov 2018 12:57:13 +0100}, biburl = {https://dblp.org/rec/conf/infoscale/Hua-junXGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/XiaoSYC07, author = {Xiangrong Xiao and Xingming Sun and Lincong Yang and Minggang Chen}, title = {Secure Data Transmission of Wireless Sensor Network Based on Information Hiding}, booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBIQ.2007.4451044}, doi = {10.1109/MOBIQ.2007.4451044}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/XiaoSYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/AiSLCSL07, author = {Jieqing Ai and Xingming Sun and Yunhao Liu and Ingemar J. Cox and Guang Sun and Yi Luo}, title = {A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {813--818}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.53}, doi = {10.1109/MUE.2007.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/AiSLCSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/YangS07, author = {Hengfu Yang and Xingming Sun}, title = {Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using {HVS} Model}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {1112--1117}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.189}, doi = {10.1109/MUE.2007.189}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/YangS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/LiuSW05, author = {Yuling Liu and Xingming Sun and Yong Wu}, editor = {Lipo Wang and Ke Chen and Yew{-}Soon Ong}, title = {A Natural Language Watermarking Based on Chinese Syntax}, booktitle = {Advances in Natural Computation, First International Conference, {ICNC} 2005, Changsha, China, August 27-29, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3612}, pages = {958--961}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539902\_119}, doi = {10.1007/11539902\_119}, timestamp = {Sun, 02 Jun 2019 21:14:27 +0200}, biburl = {https://dblp.org/rec/conf/icnc/LiuSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/SunA05, author = {Xingming Sun and Alex Jessey Asiimwe}, editor = {Lipo Wang and Ke Chen and Yew{-}Soon Ong}, title = {Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers}, booktitle = {Advances in Natural Computation, First International Conference, {ICNC} 2005, Changsha, China, August 27-29, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3612}, pages = {968--971}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539902\_121}, doi = {10.1007/11539902\_121}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnc/SunA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/SunLH04, author = {Xingming Sun and Gang Luo and Huajun Huang}, editor = {John R. White and Huanye Sheng}, title = {Component-based digital watermarking of Chinese texts}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {76--81}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046306}, doi = {10.1145/1046290.1046306}, timestamp = {Tue, 15 Feb 2022 16:17:26 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/SunLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/YangYS03, author = {Lihua Yang and Zhihua Yang and Xingming Sun}, title = {Construction of wavelets for width-invariant characterization of curves}, journal = {Pattern Recognit. Lett.}, volume = {24}, number = {15}, pages = {2751--2760}, year = {2003}, url = {https://doi.org/10.1016/S0167-8655(03)00118-1}, doi = {10.1016/S0167-8655(03)00118-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/YangYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/SunCYT02, author = {Xingming Sun and Huowang Chen and Lihua Yang and Yuan Yan Tang}, title = {Mathematical Representation of a Chinese Character and its Applications}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {16}, number = {6}, pages = {735--748}, year = {2002}, url = {https://doi.org/10.1142/S0218001402001939}, doi = {10.1142/S0218001402001939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/SunCYT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/SunYTH01, author = {Xingming Sun and Lihua Yang and Yuan Yan Tang and Yunfa Hu}, title = {A New Stroke Extraction Method of Chinese Characters}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {15}, number = {4}, pages = {707--721}, year = {2001}, url = {https://doi.org/10.1142/S0218001401001064}, doi = {10.1142/S0218001401001064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/SunYTH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.