BibTeX records: Zhihua Xia

download as .bib file

@article{DBLP:journals/ijaacs/XiaGXZ24,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Lizhi Xiong and
                  Wenhao Zhou},
  title        = {Privacy-preserving image retrieval based on additive secret sharing},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {99--126},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJAACS.2024.137065},
  doi          = {10.1504/IJAACS.2024.137065},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijaacs/XiaGXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/ShenFX24,
  author       = {Zixuan Shen and
                  Jianwei Fei and
                  Zhihua Xia},
  title        = {{SNGPLDP:} Social network graph generation based on personalised local
                  differential privacy},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {159--180},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJAACS.2024.137062},
  doi          = {10.1504/IJAACS.2024.137062},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijaacs/ShenFX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/XiaGZXWX24,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Wenhao Zhou and
                  Lizhi Xiong and
                  Jian Weng and
                  Naixue Xiong},
  title        = {{STR:} Secure Computation on Additive Shares Using the Share-Transform-Reveal
                  Strategy},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {2},
  pages        = {340--352},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2021.3073171},
  doi          = {10.1109/TC.2021.3073171},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/XiaGZXWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/YangSYLLXSF24,
  author       = {Wenyuan Yang and
                  Shuo Shao and
                  Yue Yang and
                  Xiyao Liu and
                  Ximeng Liu and
                  Zhihua Xia and
                  Gerald Schaefer and
                  Hui Fang},
  title        = {Watermarking in Secure Federated Learning: {A} Verification Framework
                  Based on Client-Side Backdooring},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {15},
  number       = {1},
  pages        = {5:1--5:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3630636},
  doi          = {10.1145/3630636},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/YangSYLLXSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/GaoZXLS24,
  author       = {Guangyong Gao and
                  Hui Zhang and
                  Zhihua Xia and
                  Xiangyang Luo and
                  Yun{-}Qing Shi},
  title        = {Reversible Data Hiding-Based Contrast Enhancement With Multi-Group
                  Stretching for {ROI} of Medical Image},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {3909--3923},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3318048},
  doi          = {10.1109/TMM.2023.3318048},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/GaoZXLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15430,
  author       = {Shuren Qi and
                  Yushu Zhang and
                  Chao Wang and
                  Zhihua Xia and
                  Jian Weng and
                  Xiaochun Cao},
  title        = {Hierarchical Invariance for Robust and Interpretable Vision Tasks
                  at Larger Scales},
  journal      = {CoRR},
  volume       = {abs/2402.15430},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15430},
  doi          = {10.48550/ARXIV.2402.15430},
  eprinttype    = {arXiv},
  eprint       = {2402.15430},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-00239,
  author       = {Qian Feng and
                  Zhihua Xia and
                  Zhifeng Xu and
                  Jiasi Weng and
                  Jian Weng},
  title        = {{OPAF:} Optimized Secure Two-Party Computation Protocols for Nonlinear
                  Activation Functions in Recurrent Neural Network},
  journal      = {CoRR},
  volume       = {abs/2403.00239},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.00239},
  doi          = {10.48550/ARXIV.2403.00239},
  eprinttype    = {arXiv},
  eprint       = {2403.00239},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-00239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoX23,
  author       = {Xueli Zhao and
                  Zhihua Xia},
  title        = {Secure outsourced {NB:} Accurate and efficient privacy-preserving
                  Naive Bayes classification},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103011},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103011},
  doi          = {10.1016/J.COSE.2022.103011},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/GaoHWFX23,
  author       = {Guangyong Gao and
                  Tingting Han and
                  Bin Wu and
                  Jiaxin Fu and
                  Zhihua Xia},
  title        = {A hue preservation lossless contrast enhancement method with {RDH}
                  for color images},
  journal      = {Digit. Signal Process.},
  volume       = {136},
  pages        = {103965},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dsp.2023.103965},
  doi          = {10.1016/J.DSP.2023.103965},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/GaoHWFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/ChenLXZ23,
  author       = {Beijing Chen and
                  Xin Liu and
                  Zhihua Xia and
                  Guoying Zhao},
  title        = {Privacy-preserving DeepFake face image detection},
  journal      = {Digit. Signal Process.},
  volume       = {143},
  pages        = {104233},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dsp.2023.104233},
  doi          = {10.1016/J.DSP.2023.104233},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/ChenLXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/GeFXTWL23,
  author       = {Sulong Ge and
                  Jianwei Fei and
                  Zhihua Xia and
                  Yao Tong and
                  Jian Weng and
                  Jia{-}Nan Liu},
  title        = {A screen-shooting resilient document image watermarking scheme using
                  deep neural network},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {2},
  pages        = {323--336},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12653},
  doi          = {10.1049/IPR2.12653},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/GeFXTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GaoHFWX23,
  author       = {Guangyong Gao and
                  Tingting Han and
                  Zhao Feng and
                  Min Wang and
                  Zhihua Xia},
  title        = {A Data Integrity Authentication Scheme in WSNs Based on Double Watermark},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {9, May 1},
  pages        = {8245--8256},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3230754},
  doi          = {10.1109/JIOT.2022.3230754},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GaoHFWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GeXFTWL23,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Jianwei Fei and
                  Yao Tong and
                  Jian Weng and
                  Ming Li},
  title        = {A robust document image watermarking scheme using deep neural network},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {25},
  pages        = {38589--38612},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-15048-y},
  doi          = {10.1007/S11042-023-15048-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/GeXFTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/speech/XiaHL23,
  author       = {Zhihua Xia and
                  Julia Hirschberg and
                  Rivka Levitan},
  title        = {Investigating prosodic entrainment from global conversations to local
                  turns and tones in Mandarin conversations},
  journal      = {Speech Commun.},
  volume       = {153},
  pages        = {102961},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.specom.2023.102961},
  doi          = {10.1016/J.SPECOM.2023.102961},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/speech/XiaHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/YuanGZFX23,
  author       = {Chengsheng Yuan and
                  Qiang Guo and
                  Zhili Zhou and
                  Zhangjie Fu and
                  Zhihua Xia},
  title        = {Deepfake Fingerprint Detection Model Intellectual Property Protection
                  via Ridge Texture Enhancement},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {30},
  pages        = {843--847},
  year         = {2023},
  url          = {https://doi.org/10.1109/LSP.2023.3293471},
  doi          = {10.1109/LSP.2023.3293471},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/YuanGZFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/GaoTXS23,
  author       = {Guangyong Gao and
                  Shikun Tong and
                  Zhihua Xia and
                  Yun{-}Qing Shi},
  title        = {A Universal Reversible Data Hiding Method in Encrypted Image Based
                  on {MSB} Prediction and Error Embedding},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {2},
  pages        = {1692--1706},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3155744},
  doi          = {10.1109/TCC.2022.3155744},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/GaoTXS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YuTXLW23,
  author       = {Peipeng Yu and
                  Jian Tang and
                  Zhihua Xia and
                  Zhetao Li and
                  Jian Weng},
  title        = {A Privacy-Preserving {JPEG} Image Retrieval Scheme Using the Local
                  Markov Feature and Bag-of-Words Model in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2885--2896},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3233421},
  doi          = {10.1109/TCC.2022.3233421},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YuTXLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/GaoFX23,
  author       = {Guangyong Gao and
                  Zhao Feng and
                  Zhihua Xia},
  title        = {Energy Efficient Three-Factor Authentication in Wireless Sensor Networks
                  With Resisting Insider Attacks},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {7},
  number       = {3},
  pages        = {1297--1308},
  year         = {2023},
  url          = {https://doi.org/10.1109/TGCN.2023.3265661},
  doi          = {10.1109/TGCN.2023.3265661},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/GaoFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZCGBXCR23,
  author       = {Wenyuan Yang and
                  Xiaoyu Zhou and
                  Zhikai Chen and
                  Bofei Guo and
                  Zhongjie Ba and
                  Zhihua Xia and
                  Xiaochun Cao and
                  Kui Ren},
  title        = {AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2015--2029},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3262148},
  doi          = {10.1109/TIFS.2023.3262148},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangZCGBXCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiuZXFYW23,
  author       = {Xiang Liu and
                  Xueli Zhao and
                  Zhihua Xia and
                  Qian Feng and
                  Peipeng Yu and
                  Jian Weng},
  title        = {Secure Outsourced {SIFT:} Accurate and Efficient Privacy-Preserving
                  Image {SIFT} Feature Extraction},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {32},
  pages        = {4635--4648},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIP.2023.3295741},
  doi          = {10.1109/TIP.2023.3295741},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/LiuZXFYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LongZDPOX23,
  author       = {Saiqin Long and
                  Ying Zhang and
                  Qingyong Deng and
                  Tingrui Pei and
                  Jinzhi Ouyang and
                  Zhihua Xia},
  title        = {An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary
                  Algorithm in Cloud-Edge Collaborative Environment},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {645--657},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3217085},
  doi          = {10.1109/TNSE.2022.3217085},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LongZDPOX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/XiongHYX23,
  author       = {Lizhi Xiong and
                  Xiao Han and
                  Ching{-}Nung Yang and
                  Zhihua Xia},
  title        = {{RDH-DES:} Reversible Data Hiding over Distributed Encrypted-Image
                  Servers Based on Secret Sharing},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {5:1--5:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3512797},
  doi          = {10.1145/3512797},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/XiongHYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WangFDLX23,
  author       = {Huaming Wang and
                  Jianwei Fei and
                  Yunshu Dai and
                  Lingyun Leng and
                  Zhihua Xia},
  title        = {General GAN-generated Image Detection by Data Augmentation in Fingerprint
                  Domain},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023,
                  Brisbane, Australia, July 10-14, 2023},
  pages        = {1187--1192},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICME55011.2023.00207},
  doi          = {10.1109/ICME55011.2023.00207},
  timestamp    = {Tue, 05 Sep 2023 20:33:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/WangFDLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiXTB23,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Robust Retraining-free {GAN} Fingerprinting via Personalized Normalization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WIFS58808.2023.10374953},
  doi          = {10.1109/WIFS58808.2023.10374953},
  timestamp    = {Tue, 09 Jan 2024 17:57:28 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiXTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12008,
  author       = {Peipeng Yu and
                  Jiahan Chen and
                  Xuan Feng and
                  Zhihua Xia},
  title        = {{CHEAT:} {A} Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts},
  journal      = {CoRR},
  volume       = {abs/2304.12008},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12008},
  doi          = {10.48550/ARXIV.2304.12008},
  eprinttype    = {arXiv},
  eprint       = {2304.12008},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-09435,
  author       = {Tao Wang and
                  Yushu Zhang and
                  Shuren Qi and
                  Ruoyu Zhao and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Security and Privacy on Generative Data in {AIGC:} {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2309.09435},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.09435},
  doi          = {10.48550/ARXIV.2309.09435},
  eprinttype    = {arXiv},
  eprint       = {2309.09435},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-09435.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-16919,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Wide Flat Minimum Watermarking for Robust Ownership Verification of
                  GANs},
  journal      = {CoRR},
  volume       = {abs/2310.16919},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.16919},
  doi          = {10.48550/ARXIV.2310.16919},
  eprinttype    = {arXiv},
  eprint       = {2310.16919},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-16919.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-05478,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Robust Retraining-free {GAN} Fingerprinting via Personalized Normalization},
  journal      = {CoRR},
  volume       = {abs/2311.05478},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.05478},
  doi          = {10.48550/ARXIV.2311.05478},
  eprinttype    = {arXiv},
  eprint       = {2311.05478},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-05478.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuXS22,
  author       = {Qi Gu and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {{MSPPIR:} Multi-Source Privacy-Preserving Image Retrieval in cloud
                  computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {78--92},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.03.040},
  doi          = {10.1016/J.FUTURE.2022.03.040},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GuXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouSZXDGQ22,
  author       = {Zhili Zhou and
                  Yuecheng Su and
                  Yulan Zhang and
                  Zhihua Xia and
                  Shan Du and
                  Brij B. Gupta and
                  Lianyong Qi},
  title        = {Coverless Information Hiding Based on Probability Graph Learning for
                  Secure Communication in IoT Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {12},
  pages        = {9332--9341},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3103779},
  doi          = {10.1109/JIOT.2021.3103779},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouSZXDGQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/YuanYXSW22,
  author       = {Chengsheng Yuan and
                  Peipeng Yu and
                  Zhihua Xia and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {{FLD-SRC:} Fingerprint Liveness Detection for {AFIS} Based on Spatial
                  Ridges Continuity},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {16},
  number       = {4},
  pages        = {817--827},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSTSP.2022.3174655},
  doi          = {10.1109/JSTSP.2022.3174655},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jstsp/YuanYXSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuFXZW22,
  author       = {Peipeng Yu and
                  Jianwei Fei and
                  Zhihua Xia and
                  Zhili Zhou and
                  Jian Weng},
  title        = {Improving Generalization by Commonality Learning in Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {547--558},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3146781},
  doi          = {10.1109/TIFS.2022.3146781},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuFXZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ChenZQXX22,
  author       = {Xianyi Chen and
                  Zhentian Zhang and
                  Anqi Qiu and
                  Zhihua Xia and
                  Neal N. Xiong},
  title        = {Novel Coverless Steganography Method Based on Image Selection and
                  StarGAN},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {219--230},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2020.3041529},
  doi          = {10.1109/TNSE.2020.3041529},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/ChenZQXX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/XiaJGYX22,
  author       = {Zhihua Xia and
                  Qiuju Ji and
                  Qi Gu and
                  Chengsheng Yuan and
                  Fengjun Xiao},
  title        = {A Format-compatible Searchable Encryption Scheme for {JPEG} Images
                  Using Bag-of-words},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {18},
  number       = {3},
  pages        = {85:1--85:18},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492705},
  doi          = {10.1145/3492705},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/XiaJGYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/XiaJLLJ22,
  author       = {Zhihua Xia and
                  Leqi Jiang and
                  Dandan Liu and
                  Lihua Lu and
                  Byeungwoo Jeon},
  title        = {{BOEW:} {A} Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {202--214},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2927215},
  doi          = {10.1109/TSC.2019.2927215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/XiaJLLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/FeiDYSX022,
  author       = {Jianwei Fei and
                  Yunshu Dai and
                  Peipeng Yu and
                  Tianrun Shen and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Learning Second Order Local Anomaly for General Face Forgery Detection},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {20238--20248},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01963},
  doi          = {10.1109/CVPR52688.2022.01963},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/FeiDYSX022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/DaiFWX22,
  author       = {Yunshu Dai and
                  Jianwei Fei and
                  Huaming Wang and
                  Zhihua Xia},
  editor       = {Elias Pimenidis and
                  Plamen P. Angelov and
                  Chrisina Jayne and
                  Antonios Papaleonidas and
                  Mehmet Aydin},
  title        = {Attentional Local Contrastive Learning for Face Forgery Detection},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2022 - 31st
                  International Conference on Artificial Neural Networks, Bristol, UK,
                  September 6-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13529},
  pages        = {709--721},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15919-0\_59},
  doi          = {10.1007/978-3-031-15919-0\_59},
  timestamp    = {Wed, 21 Sep 2022 21:26:03 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/DaiFWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FeiXTB22,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Supervised {GAN} Watermarking for Intellectual Property Protection},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975409},
  doi          = {10.1109/WIFS55849.2022.9975409},
  timestamp    = {Wed, 21 Dec 2022 18:19:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/FeiXTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-1,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13338},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06794-5},
  doi          = {10.1007/978-3-031-06794-5},
  isbn         = {978-3-031-06793-8},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-2,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13339},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06788-4},
  doi          = {10.1007/978-3-031-06788-4},
  isbn         = {978-3-031-06787-7},
  timestamp    = {Thu, 28 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2022-3,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13340},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06791-4},
  doi          = {10.1007/978-3-031-06791-4},
  isbn         = {978-3-031-06790-7},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-13067,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Jianwei Fei and
                  Xingming Sun and
                  Jian Weng},
  title        = {A Robust Document Image Watermarking Scheme using Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2202.13067},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.13067},
  eprinttype    = {arXiv},
  eprint       = {2202.13067},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05198,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Yao Tong and
                  Jian Weng and
                  Jia{-}Nan Liu},
  title        = {A Screen-Shooting Resilient Document Image Watermarking Scheme using
                  Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2203.05198},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05198},
  doi          = {10.48550/ARXIV.2203.05198},
  eprinttype    = {arXiv},
  eprint       = {2203.05198},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05198.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-12587,
  author       = {Yong Xu and
                  Zhihua Xia and
                  Zichi Wang and
                  Xinpeng Zhang and
                  Jian Weng},
  title        = {Deniable Steganography},
  journal      = {CoRR},
  volume       = {abs/2205.12587},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.12587},
  doi          = {10.48550/ARXIV.2205.12587},
  eprinttype    = {arXiv},
  eprint       = {2205.12587},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-12587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03466,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Supervised {GAN} Watermarking for Intellectual Property Protection},
  journal      = {CoRR},
  volume       = {abs/2209.03466},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03466},
  doi          = {10.48550/ARXIV.2209.03466},
  eprinttype    = {arXiv},
  eprint       = {2209.03466},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03466.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-15490,
  author       = {Jianwei Fei and
                  Yunshu Dai and
                  Peipeng Yu and
                  Tianrun Shen and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Learning Second Order Local Anomaly for General Face Forgery Detection},
  journal      = {CoRR},
  volume       = {abs/2209.15490},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.15490},
  doi          = {10.48550/ARXIV.2209.15490},
  eprinttype    = {arXiv},
  eprint       = {2209.15490},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-15490.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-07138,
  author       = {Wenyuan Yang and
                  Shuo Shao and
                  Yue Yang and
                  Xiyao Liu and
                  Zhihua Xia and
                  Gerald Schaefer and
                  Hui Fang},
  title        = {Watermarking in Secure Federated Learning: {A} Verification Framework
                  Based on Client-Side Backdooring},
  journal      = {CoRR},
  volume       = {abs/2211.07138},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.07138},
  doi          = {10.48550/ARXIV.2211.07138},
  eprinttype    = {arXiv},
  eprint       = {2211.07138},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-07138.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-13466,
  author       = {Huaming Wang and
                  Jianwei Fei and
                  Yunshu Dai and
                  Lingyun Leng and
                  Zhihua Xia},
  title        = {General GAN-generated image detection by data augmentation in fingerprint
                  domain},
  journal      = {CoRR},
  volume       = {abs/2212.13466},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.13466},
  doi          = {10.48550/ARXIV.2212.13466},
  eprinttype    = {arXiv},
  eprint       = {2212.13466},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-13466.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-14309,
  author       = {Jianwei Fei and
                  Yunshu Dai and
                  Huaming Wang and
                  Zhihua Xia},
  title        = {Learning to mask: Towards generalized face forgery detection},
  journal      = {CoRR},
  volume       = {abs/2212.14309},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.14309},
  doi          = {10.48550/ARXIV.2212.14309},
  eprinttype    = {arXiv},
  eprint       = {2212.14309},
  timestamp    = {Sun, 08 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-14309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/JiangXS21,
  author       = {Leqi Jiang and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {Chapter Three - Review on privacy-preserving data comparison protocols
                  in cloud computing},
  journal      = {Adv. Comput.},
  volume       = {120},
  pages        = {81--119},
  year         = {2021},
  url          = {https://doi.org/10.1016/bs.adcom.2020.09.002},
  doi          = {10.1016/BS.ADCOM.2020.09.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/JiangXS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-bmt/YuXFL21,
  author       = {Peipeng Yu and
                  Zhihua Xia and
                  Jianwei Fei and
                  Yujiang Lu},
  title        = {A Survey on Deepfake Video Detection},
  journal      = {{IET} Biom.},
  volume       = {10},
  number       = {6},
  pages        = {607--624},
  year         = {2021},
  url          = {https://doi.org/10.1049/bme2.12031},
  doi          = {10.1049/BME2.12031},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-bmt/YuXFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FeiXYX21,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Peipeng Yu and
                  Fengjun Xiao},
  title        = {Exposing AI-generated videos with motion magnification},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {20},
  pages        = {30789--30802},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-09147-3},
  doi          = {10.1007/S11042-020-09147-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FeiXYX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLFX21,
  author       = {Yujiang Lu and
                  Yaju Liu and
                  Jianwei Fei and
                  Zhihua Xia},
  title        = {Channel-Wise Spatiotemporal Aggregation Technology for Face Video
                  Forensics},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5524930:1--5524930:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5524930},
  doi          = {10.1155/2021/5524930},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuLFX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenXY21,
  author       = {Zixuan Shen and
                  Zhihua Xia and
                  Peipeng Yu},
  title        = {{PLDP:} Personalized Local Differential Privacy for Multidimensional
                  Data Aggregation},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6684179:1--6684179:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6684179},
  doi          = {10.1155/2021/6684179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/GaoTXWXZ21,
  author       = {Guangyong Gao and
                  Shikun Tong and
                  Zhihua Xia and
                  Bin Wu and
                  Liya Xu and
                  Zhiqiang Zhao},
  title        = {Reversible data hiding with automatic contrast enhancement for medical
                  images},
  journal      = {Signal Process.},
  volume       = {178},
  pages        = {107817},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107817},
  doi          = {10.1016/J.SIGPRO.2020.107817},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/GaoTXWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/XiaWTXW21,
  author       = {Zhihua Xia and
                  Lan Wang and
                  Jian Tang and
                  Neal N. Xiong and
                  Jian Weng},
  title        = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary
                  Pattern in Cloud Computing},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {318--330},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3038218},
  doi          = {10.1109/TNSE.2020.3038218},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2021-1,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 7th International Conference,
                  {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12736},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78609-0},
  doi          = {10.1007/978-3-030-78609-0},
  isbn         = {978-3-030-78608-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2021-2,
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Artificial Intelligence and Security - 7th International Conference,
                  {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12737},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78612-0},
  doi          = {10.1007/978-3-030-78612-0},
  isbn         = {978-3-030-78611-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangXFX20,
  author       = {Hua Wang and
                  Zhihua Xia and
                  Jianwei Fei and
                  Fengjun Xiao},
  title        = {An AES-Based Secure Image Retrieval Scheme Using Random Mapping and
                  {BOW} in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {61138--61147},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2983194},
  doi          = {10.1109/ACCESS.2020.2983194},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangXFX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/FeiXYX20,
  author       = {Jianwei Fei and
                  Zhihua Xia and
                  Peipeng Yu and
                  Fengjun Xiao},
  title        = {Adversarial attacks on fingerprint liveness detection},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2020},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13640-020-0490-z},
  doi          = {10.1186/S13640-020-0490-Z},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/FeiXYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/GuXFYZ20,
  author       = {Fei Gu and
                  Zhihua Xia and
                  Jianwei Fei and
                  Chengsheng Yuan and
                  Qiang Zhang},
  title        = {Face spoof detection using feature map superposition and {CNN}},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {22},
  number       = {2/3},
  pages        = {355--363},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCSE.2020.107356},
  doi          = {10.1504/IJCSE.2020.107356},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/GuXFYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/YuanXSW20,
  author       = {Chengsheng Yuan and
                  Zhihua Xia and
                  Xingming Sun and
                  Q. M. Jonathan Wu},
  title        = {Deep Residual Network With Adaptive Learning Framework for Fingerprint
                  Liveness Detection},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {461--473},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCDS.2019.2920364},
  doi          = {10.1109/TCDS.2019.2920364},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tamd/YuanXSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/XiaJMYJX20,
  author       = {Zhihua Xia and
                  Leqi Jiang and
                  Xiaohe Ma and
                  Wenyuan Yang and
                  Puzhao Ji and
                  Neal Naixue Xiong},
  title        = {A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern
                  in Secure Industrial Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {1},
  pages        = {629--638},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2913217},
  doi          = {10.1109/TII.2019.2913217},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/XiaJMYJX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/XiaYLSXS20,
  author       = {Zhihua Xia and
                  Chengsheng Yuan and
                  Rui Lv and
                  Xingming Sun and
                  Neal N. Xiong and
                  Yun{-}Qing Shi},
  title        = {A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {50},
  number       = {4},
  pages        = {1526--1536},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSMC.2018.2874281},
  doi          = {10.1109/TSMC.2018.2874281},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/XiaYLSXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-12416,
  author       = {Qi Gu and
                  Zhihua Xia and
                  Xingming Sun and
                  Jian Weng},
  title        = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud
                  computing},
  journal      = {CoRR},
  volume       = {abs/2007.12416},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.12416},
  eprinttype    = {arXiv},
  eprint       = {2007.12416},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05356,
  author       = {Lizhi Xiong and
                  Wenhao Zhou and
                  Zhihua Xia and
                  Qi Gu and
                  Jian Weng},
  title        = {Efficient Privacy-Preserving Computation Based on Additive Secret
                  Sharing},
  journal      = {CoRR},
  volume       = {abs/2009.05356},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05356},
  eprinttype    = {arXiv},
  eprint       = {2009.05356},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-06893,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Lizhi Xiong and
                  Wenhao Zhou and
                  Jian Weng},
  title        = {Privacy-Preserving Image Retrieval Based on Additive Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/2009.06893},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.06893},
  eprinttype    = {arXiv},
  eprint       = {2009.06893},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-06893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13153,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Wenhao Zhou and
                  Lizhi Xiong and
                  Jian Weng},
  title        = {Secure Computation on Additive Shares},
  journal      = {CoRR},
  volume       = {abs/2009.13153},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13153},
  eprinttype    = {arXiv},
  eprint       = {2009.13153},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuanXJCWS19,
  author       = {Chengsheng Yuan and
                  Zhihua Xia and
                  Leqi Jiang and
                  Yi Cao and
                  Q. M. Jonathan Wu and
                  Xingming Sun},
  title        = {Fingerprint Liveness Detection Using an Improved {CNN} With Image
                  Scale Equalization},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {26953--26966},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2901235},
  doi          = {10.1109/ACCESS.2019.2901235},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YuanXJCWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiongXCS19,
  author       = {Lizhi Xiong and
                  Zhihua Xia and
                  Xianyi Chen and
                  Hiuk Jae Shim},
  title        = {Secure multimedia distribution in cloud computing using re-encryption
                  and fingerprinting},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {21},
  pages        = {30297--30313},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6981-6},
  doi          = {10.1007/S11042-018-6981-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiongXCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiaMSSXJ18,
  author       = {Zhihua Xia and
                  Xiaohe Ma and
                  Zixuan Shen and
                  Xingming Sun and
                  Neal N. Xiong and
                  Byeungwoo Jeon},
  title        = {Secure Image {LBP} Feature Extraction in Cloud-Based Smart Campus},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {30392--30401},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2845456},
  doi          = {10.1109/ACCESS.2018.2845456},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiaMSSXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiaSXSJ18,
  author       = {Zhihua Xia and
                  Tianjiao Shi and
                  Neal N. Xiong and
                  Xingming Sun and
                  Byeungwoo Jeon},
  title        = {A Privacy-Preserving Handwritten Signature Verification Method Using
                  Combinational Features and Secure {KNN}},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {46695--46705},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2866411},
  doi          = {10.1109/ACCESS.2018.2866411},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiaSXSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiongDXC18,
  author       = {Lizhi Xiong and
                  Danping Dong and
                  Zhihua Xia and
                  Xianyi Chen},
  title        = {High-Capacity Reversible Data Hiding for Encrypted Multimedia Data
                  With Somewhat Homomorphic Encryption},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {60635--60644},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2876036},
  doi          = {10.1109/ACCESS.2018.2876036},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiongDXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangSGXC18,
  author       = {Bin Yang and
                  Xingming Sun and
                  Honglei Guo and
                  Zhihua Xia and
                  Xianyi Chen},
  title        = {A copy-move forgery detection method based on {CMFD-SIFT}},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {1},
  pages        = {837--855},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-016-4289-y},
  doi          = {10.1007/S11042-016-4289-Y},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/YangSGXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiaLS18,
  author       = {Zhihua Xia and
                  Rui Lv and
                  Xingming Sun},
  title        = {Rotation-invariant Weber pattern and Gabor feature for fingerprint
                  liveness detection},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18187--18200},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5517-9},
  doi          = {10.1007/S11042-017-5517-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiaLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenZXX18,
  author       = {Xianyi Chen and
                  Haidong Zhong and
                  Lizhi Xiong and
                  Zhihua Xia},
  title        = {Improved Encrypted-Signals-Based Reversible Data Hiding Using Code
                  Division Multiplexing and Value Expansion},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {1326235:1--1326235:9},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/1326235},
  doi          = {10.1155/2018/1326235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenZXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiaZSQR18,
  author       = {Zhihua Xia and
                  Yi Zhu and
                  Xingming Sun and
                  Zhan Qin and
                  Kui Ren},
  title        = {Towards Privacy-Preserving Content-Based Image Retrieval in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {1},
  pages        = {276--286},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2491933},
  doi          = {10.1109/TCC.2015.2491933},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/XiaZSQR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangJWX18,
  author       = {Xiaoliang Wang and
                  Jianming Jiang and
                  Baowei Wang and
                  Zhihua Xia},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A {VANET} Anonymous Authentication Mechanism for Multi-level Application
                  Scenarios},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {706--717},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_61},
  doi          = {10.1007/978-3-030-00015-8\_61},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangJWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/ShenLLXZ18,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Qi Liu and
                  Zhihua Xia and
                  Tianqi Zhou},
  title        = {A Novel Authentication Protocol with Tree-based Signature for Green
                  Cloud Computing},
  booktitle    = {2018 International Conference on Computing, Networking and Communications,
                  {ICNC} 2018, Maui, HI, USA, March 5-8, 2018},
  pages        = {843--848},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCNC.2018.8390319},
  doi          = {10.1109/ICCNC.2018.8390319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/ShenLLXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WangLZXB17,
  author       = {Xiaoliang Wang and
                  Shuifan Li and
                  Shujing Zhao and
                  Zhihua Xia and
                  Liang Bai},
  title        = {A vehicular ad hoc network privacy protection scheme without a trusted
                  third party},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {12},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717743696},
  doi          = {10.1177/1550147717743696},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WangLZXB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/LiuSXS17,
  author       = {Dandan Liu and
                  Jian Shen and
                  Zhihua Xia and
                  Xingming Sun},
  title        = {A Content-Based Image Retrieval Scheme Using an Encrypted Difference
                  Histogram in Cloud Computing},
  journal      = {Inf.},
  volume       = {8},
  number       = {3},
  pages        = {96},
  year         = {2017},
  url          = {https://doi.org/10.3390/info8030096},
  doi          = {10.3390/INFO8030096},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/LiuSXS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XiaXVS17,
  author       = {Zhihua Xia and
                  Neal N. Xiong and
                  Athanasios V. Vasilakos and
                  Xingming Sun},
  title        = {{EPCBIR:} An efficient and privacy-preserving content-based image
                  retrieval scheme in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {387},
  pages        = {195--204},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.12.030},
  doi          = {10.1016/J.INS.2016.12.030},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XiaXVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhangWWX17,
  author       = {Jiliang Zhang and
                  Weizheng Wang and
                  Xing{-}Wei Wang and
                  Zhihua Xia},
  title        = {Enhancing Security of FPGA-Based Embedded Systems with Combinational
                  Logic Binding},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {32},
  number       = {2},
  pages        = {329--339},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11390-017-1700-8},
  doi          = {10.1007/S11390-017-1700-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhangWWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/LiuX17,
  author       = {Jianxiao Liu and
                  Zhihua Xia},
  title        = {An Approach of Web Service Organization Using Bayesian Network Learning},
  journal      = {J. Web Eng.},
  volume       = {16},
  number       = {3{\&}4},
  pages        = {253--277},
  year         = {2017},
  url          = {http://www.rintonpress.com/xjwe16/jwe-16-34/253-277.pdf},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwe/LiuX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/XiaLZJSS17,
  author       = {Zhihua Xia and
                  Rui Lv and
                  Yafeng Zhu and
                  Peng Ji and
                  Huiyu Sun and
                  Yun{-}Qing Shi},
  title        = {Fingerprint liveness detection using gradient-based texture features},
  journal      = {Signal Image Video Process.},
  volume       = {11},
  number       = {2},
  pages        = {381--388},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11760-016-0936-z},
  doi          = {10.1007/S11760-016-0936-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sivp/XiaLZJSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/XiaLZJSS17a,
  author       = {Zhihua Xia and
                  Rui Lv and
                  Yafeng Zhu and
                  Peng Ji and
                  Huiyu Sun and
                  Yun{-}Qing Shi},
  title        = {Erratum to: Fingerprint liveness detection using gradient-based texture
                  features},
  journal      = {Signal Image Video Process.},
  volume       = {11},
  number       = {2},
  pages        = {389},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11760-016-0968-4},
  doi          = {10.1007/S11760-016-0968-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sivp/XiaLZJSS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhangWDLZXSW16,
  author       = {Jiliang Zhang and
                  Qiang Wu and
                  Yipeng Ding and
                  Yong{-}Qiang Lv and
                  Qiang Zhou and
                  Zhihua Xia and
                  Xingming Sun and
                  Xing{-}Wei Wang},
  title        = {Techniques for Design and Implementation of an FPGA-Specific Physical
                  Unclonable Function},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {1},
  pages        = {124--136},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1616-8},
  doi          = {10.1007/S11390-016-1616-8},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhangWDLZXSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiaWSLX16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Quansheng Liu and
                  Naixue Xiong},
  title        = {Steganalysis of {LSB} matching using differences between nonadjacent
                  pixels},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {4},
  pages        = {1947--1962},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2381-8},
  doi          = {10.1007/S11042-014-2381-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiaWSLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaWZQSR16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Liangao Zhang and
                  Zhan Qin and
                  Xingming Sun and
                  Kui Ren},
  title        = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval
                  Scheme in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2594--2608},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2590944},
  doi          = {10.1109/TIFS.2016.2590944},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XiaWSW16,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Qian Wang},
  title        = {A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted
                  Cloud Data},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {2},
  pages        = {340--352},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2401003},
  doi          = {10.1109/TPDS.2015.2401003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XiaWSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscslp/XiaM16,
  author       = {Zhihua Xia and
                  Qiu Wu Ma},
  title        = {Gender and prosodic entrainment in Mandarin conversations},
  booktitle    = {10th International Symposium on Chinese Spoken Language Processing,
                  {ISCSLP} 2016, Tianjin, China, October 17-20, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCSLP.2016.7918494},
  doi          = {10.1109/ISCSLP.2016.7918494},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iscslp/XiaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/FangZX18,
  author       = {Zhongjin Fang and
                  Shu Zhou and
                  Zhihua Xia},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{20851}}{\unicode{38190}}{\unicode{35789}}{\unicode{30340}}{\unicode{21152}}{\unicode{23494}}{\unicode{20113}}{\unicode{25968}}{\unicode{25454}}{\unicode{27169}}{\unicode{31946}}{\unicode{25628}}{\unicode{32034}}{\unicode{31574}}{\unicode{30053}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {3},
  pages        = {136--139},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.028},
  doi          = {10.11896/J.ISSN.1002-137X.2015.03.028},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/FangZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphs/MaXW15,
  author       = {Qiuwu Ma and
                  Zhihua Xia and
                  Ting Wang},
  editor       = {Maria Wolters and
                  Judy Livingstone and
                  Bernie Beattie and
                  Rachel Smith and
                  Mike MacMahon and
                  Jane Stuart{-}Smith and
                  James M. Scobbie},
  title        = {Absolute and relative entrainment in Mandarin conversations},
  booktitle    = {18th International Congress of Phonetic Sciences, ICPhS 2015, Glasgow,
                  UK, August 10-14, 2015},
  publisher    = {University of Glasgow},
  year         = {2015},
  url          = {https://www.internationalphoneticassociation.org/icphs-proceedings/ICPhS2015/Papers/ICPHS0221.pdf},
  timestamp    = {Thu, 12 Mar 2020 12:19:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icphs/MaXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/XiaZSC14,
  author       = {Zhihua Xia and
                  Yanling Zhu and
                  Xingming Sun and
                  Lihong Chen},
  title        = {Secure semantic expansion based search over encrypted cloud data supporting
                  similarity ranking},
  journal      = {J. Cloud Comput.},
  volume       = {3},
  pages        = {8},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13677-014-0008-2},
  doi          = {10.1186/S13677-014-0008-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/XiaZSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiaWSW14,
  author       = {Zhihua Xia and
                  Xinhui Wang and
                  Xingming Sun and
                  Baowei Wang},
  title        = {Steganalysis of least significant bit matching using multi-order differences},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1283--1291},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.864},
  doi          = {10.1002/SEC.864},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiaWSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/XiaWSW13,
  author       = {Zhihua Xia and
                  Shufang Wang and
                  Xingming Sun and
                  Baowei Wang},
  title        = {Steganalysis of least significant bit matching based on image histogram
                  and correlation},
  journal      = {J. Electronic Imaging},
  volume       = {22},
  number       = {3},
  pages        = {033008},
  year         = {2013},
  url          = {https://doi.org/10.1117/1.JEI.22.3.033008},
  doi          = {10.1117/1.JEI.22.3.033008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/XiaWSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/FuSXZS13,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Zhihua Xia and
                  Lu Zhou and
                  Jiangang Shu},
  title        = {Multi-keyword ranked search supporting synonym query over encrypted
                  data in cloud computing},
  booktitle    = {{IEEE} 32nd International Performance Computing and Communications
                  Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PCCC.2013.6742783},
  doi          = {10.1109/PCCC.2013.6742783},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/FuSXZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/XiaoSLWXL10,
  author       = {Xiangrong Xiao and
                  Xingming Sun and
                  Fan Li and
                  Baowei Wang and
                  Zhihua Xia and
                  Wei Liang},
  title        = {Watermarking-based intellectual property protection for sensor streaming
                  data},
  journal      = {Int. J. Comput. Appl. Technol.},
  volume       = {39},
  number       = {4},
  pages        = {213--223},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJCAT.2010.036025},
  doi          = {10.1504/IJCAT.2010.036025},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcat/XiaoSLWXL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/XiaSLQL10,
  author       = {Zhihua Xia and
                  Xingming Sun and
                  Wei Liang and
                  Jiaohua Qin and
                  Feng Li},
  title        = {{JPEG} image steganalysis using joint discrete cosine transform domain
                  features},
  journal      = {J. Electronic Imaging},
  volume       = {19},
  number       = {2},
  pages        = {023006},
  year         = {2010},
  url          = {https://doi.org/10.1117/1.3421972},
  doi          = {10.1117/1.3421972},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/XiaSLQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics