Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhihua Xia
@article{DBLP:journals/ijaacs/XiaGXZ24, author = {Zhihua Xia and Qi Gu and Lizhi Xiong and Wenhao Zhou}, title = {Privacy-preserving image retrieval based on additive secret sharing}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {17}, number = {2}, pages = {99--126}, year = {2024}, url = {https://doi.org/10.1504/IJAACS.2024.137065}, doi = {10.1504/IJAACS.2024.137065}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijaacs/XiaGXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/ShenFX24, author = {Zixuan Shen and Jianwei Fei and Zhihua Xia}, title = {{SNGPLDP:} Social network graph generation based on personalised local differential privacy}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {17}, number = {2}, pages = {159--180}, year = {2024}, url = {https://doi.org/10.1504/IJAACS.2024.137062}, doi = {10.1504/IJAACS.2024.137062}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijaacs/ShenFX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/XiaGZXWX24, author = {Zhihua Xia and Qi Gu and Wenhao Zhou and Lizhi Xiong and Jian Weng and Naixue Xiong}, title = {{STR:} Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {2}, pages = {340--352}, year = {2024}, url = {https://doi.org/10.1109/TC.2021.3073171}, doi = {10.1109/TC.2021.3073171}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/XiaGZXWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/YangSYLLXSF24, author = {Wenyuan Yang and Shuo Shao and Yue Yang and Xiyao Liu and Ximeng Liu and Zhihua Xia and Gerald Schaefer and Hui Fang}, title = {Watermarking in Secure Federated Learning: {A} Verification Framework Based on Client-Side Backdooring}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {15}, number = {1}, pages = {5:1--5:25}, year = {2024}, url = {https://doi.org/10.1145/3630636}, doi = {10.1145/3630636}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/YangSYLLXSF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/GaoZXLS24, author = {Guangyong Gao and Hui Zhang and Zhihua Xia and Xiangyang Luo and Yun{-}Qing Shi}, title = {Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for {ROI} of Medical Image}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {3909--3923}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3318048}, doi = {10.1109/TMM.2023.3318048}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/GaoZXLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15430, author = {Shuren Qi and Yushu Zhang and Chao Wang and Zhihua Xia and Jian Weng and Xiaochun Cao}, title = {Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales}, journal = {CoRR}, volume = {abs/2402.15430}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15430}, doi = {10.48550/ARXIV.2402.15430}, eprinttype = {arXiv}, eprint = {2402.15430}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00239, author = {Qian Feng and Zhihua Xia and Zhifeng Xu and Jiasi Weng and Jian Weng}, title = {{OPAF:} Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network}, journal = {CoRR}, volume = {abs/2403.00239}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00239}, doi = {10.48550/ARXIV.2403.00239}, eprinttype = {arXiv}, eprint = {2403.00239}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoX23, author = {Xueli Zhao and Zhihua Xia}, title = {Secure outsourced {NB:} Accurate and efficient privacy-preserving Naive Bayes classification}, journal = {Comput. Secur.}, volume = {124}, pages = {103011}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103011}, doi = {10.1016/J.COSE.2022.103011}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/GaoHWFX23, author = {Guangyong Gao and Tingting Han and Bin Wu and Jiaxin Fu and Zhihua Xia}, title = {A hue preservation lossless contrast enhancement method with {RDH} for color images}, journal = {Digit. Signal Process.}, volume = {136}, pages = {103965}, year = {2023}, url = {https://doi.org/10.1016/j.dsp.2023.103965}, doi = {10.1016/J.DSP.2023.103965}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/GaoHWFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/ChenLXZ23, author = {Beijing Chen and Xin Liu and Zhihua Xia and Guoying Zhao}, title = {Privacy-preserving DeepFake face image detection}, journal = {Digit. Signal Process.}, volume = {143}, pages = {104233}, year = {2023}, url = {https://doi.org/10.1016/j.dsp.2023.104233}, doi = {10.1016/J.DSP.2023.104233}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/ChenLXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/GeFXTWL23, author = {Sulong Ge and Jianwei Fei and Zhihua Xia and Yao Tong and Jian Weng and Jia{-}Nan Liu}, title = {A screen-shooting resilient document image watermarking scheme using deep neural network}, journal = {{IET} Image Process.}, volume = {17}, number = {2}, pages = {323--336}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12653}, doi = {10.1049/IPR2.12653}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/GeFXTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GaoHFWX23, author = {Guangyong Gao and Tingting Han and Zhao Feng and Min Wang and Zhihua Xia}, title = {A Data Integrity Authentication Scheme in WSNs Based on Double Watermark}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {9, May 1}, pages = {8245--8256}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3230754}, doi = {10.1109/JIOT.2022.3230754}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GaoHFWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GeXFTWL23, author = {Sulong Ge and Zhihua Xia and Jianwei Fei and Yao Tong and Jian Weng and Ming Li}, title = {A robust document image watermarking scheme using deep neural network}, journal = {Multim. Tools Appl.}, volume = {82}, number = {25}, pages = {38589--38612}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-15048-y}, doi = {10.1007/S11042-023-15048-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/GeXFTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/speech/XiaHL23, author = {Zhihua Xia and Julia Hirschberg and Rivka Levitan}, title = {Investigating prosodic entrainment from global conversations to local turns and tones in Mandarin conversations}, journal = {Speech Commun.}, volume = {153}, pages = {102961}, year = {2023}, url = {https://doi.org/10.1016/j.specom.2023.102961}, doi = {10.1016/J.SPECOM.2023.102961}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/speech/XiaHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/YuanGZFX23, author = {Chengsheng Yuan and Qiang Guo and Zhili Zhou and Zhangjie Fu and Zhihua Xia}, title = {Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement}, journal = {{IEEE} Signal Process. Lett.}, volume = {30}, pages = {843--847}, year = {2023}, url = {https://doi.org/10.1109/LSP.2023.3293471}, doi = {10.1109/LSP.2023.3293471}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/YuanGZFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/GaoTXS23, author = {Guangyong Gao and Shikun Tong and Zhihua Xia and Yun{-}Qing Shi}, title = {A Universal Reversible Data Hiding Method in Encrypted Image Based on {MSB} Prediction and Error Embedding}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {2}, pages = {1692--1706}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3155744}, doi = {10.1109/TCC.2022.3155744}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/GaoTXS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YuTXLW23, author = {Peipeng Yu and Jian Tang and Zhihua Xia and Zhetao Li and Jian Weng}, title = {A Privacy-Preserving {JPEG} Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2885--2896}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3233421}, doi = {10.1109/TCC.2022.3233421}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YuTXLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/GaoFX23, author = {Guangyong Gao and Zhao Feng and Zhihua Xia}, title = {Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {7}, number = {3}, pages = {1297--1308}, year = {2023}, url = {https://doi.org/10.1109/TGCN.2023.3265661}, doi = {10.1109/TGCN.2023.3265661}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/GaoFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangZCGBXCR23, author = {Wenyuan Yang and Xiaoyu Zhou and Zhikai Chen and Bofei Guo and Zhongjie Ba and Zhihua Xia and Xiaochun Cao and Kui Ren}, title = {AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2015--2029}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3262148}, doi = {10.1109/TIFS.2023.3262148}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangZCGBXCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiuZXFYW23, author = {Xiang Liu and Xueli Zhao and Zhihua Xia and Qian Feng and Peipeng Yu and Jian Weng}, title = {Secure Outsourced {SIFT:} Accurate and Efficient Privacy-Preserving Image {SIFT} Feature Extraction}, journal = {{IEEE} Trans. Image Process.}, volume = {32}, pages = {4635--4648}, year = {2023}, url = {https://doi.org/10.1109/TIP.2023.3295741}, doi = {10.1109/TIP.2023.3295741}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/LiuZXFYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LongZDPOX23, author = {Saiqin Long and Ying Zhang and Qingyong Deng and Tingrui Pei and Jinzhi Ouyang and Zhihua Xia}, title = {An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {2}, pages = {645--657}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3217085}, doi = {10.1109/TNSE.2022.3217085}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LongZDPOX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/XiongHYX23, author = {Lizhi Xiong and Xiao Han and Ching{-}Nung Yang and Zhihua Xia}, title = {{RDH-DES:} Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {1}, pages = {5:1--5:19}, year = {2023}, url = {https://doi.org/10.1145/3512797}, doi = {10.1145/3512797}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/XiongHYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WangFDLX23, author = {Huaming Wang and Jianwei Fei and Yunshu Dai and Lingyun Leng and Zhihua Xia}, title = {General GAN-generated Image Detection by Data Augmentation in Fingerprint Domain}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023, Brisbane, Australia, July 10-14, 2023}, pages = {1187--1192}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICME55011.2023.00207}, doi = {10.1109/ICME55011.2023.00207}, timestamp = {Tue, 05 Sep 2023 20:33:33 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/WangFDLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FeiXTB23, author = {Jianwei Fei and Zhihua Xia and Benedetta Tondi and Mauro Barni}, title = {Robust Retraining-free {GAN} Fingerprinting via Personalized Normalization}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2023, N{\"{u}}rnberg, Germany, December 4-7, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WIFS58808.2023.10374953}, doi = {10.1109/WIFS58808.2023.10374953}, timestamp = {Tue, 09 Jan 2024 17:57:28 +0100}, biburl = {https://dblp.org/rec/conf/wifs/FeiXTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12008, author = {Peipeng Yu and Jiahan Chen and Xuan Feng and Zhihua Xia}, title = {{CHEAT:} {A} Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts}, journal = {CoRR}, volume = {abs/2304.12008}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12008}, doi = {10.48550/ARXIV.2304.12008}, eprinttype = {arXiv}, eprint = {2304.12008}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-09435, author = {Tao Wang and Yushu Zhang and Shuren Qi and Ruoyu Zhao and Zhihua Xia and Jian Weng}, title = {Security and Privacy on Generative Data in {AIGC:} {A} Survey}, journal = {CoRR}, volume = {abs/2309.09435}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.09435}, doi = {10.48550/ARXIV.2309.09435}, eprinttype = {arXiv}, eprint = {2309.09435}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-09435.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-16919, author = {Jianwei Fei and Zhihua Xia and Benedetta Tondi and Mauro Barni}, title = {Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs}, journal = {CoRR}, volume = {abs/2310.16919}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.16919}, doi = {10.48550/ARXIV.2310.16919}, eprinttype = {arXiv}, eprint = {2310.16919}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-16919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-05478, author = {Jianwei Fei and Zhihua Xia and Benedetta Tondi and Mauro Barni}, title = {Robust Retraining-free {GAN} Fingerprinting via Personalized Normalization}, journal = {CoRR}, volume = {abs/2311.05478}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.05478}, doi = {10.48550/ARXIV.2311.05478}, eprinttype = {arXiv}, eprint = {2311.05478}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-05478.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GuXS22, author = {Qi Gu and Zhihua Xia and Xingming Sun}, title = {{MSPPIR:} Multi-Source Privacy-Preserving Image Retrieval in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {78--92}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.03.040}, doi = {10.1016/J.FUTURE.2022.03.040}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GuXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouSZXDGQ22, author = {Zhili Zhou and Yuecheng Su and Yulan Zhang and Zhihua Xia and Shan Du and Brij B. Gupta and Lianyong Qi}, title = {Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {12}, pages = {9332--9341}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3103779}, doi = {10.1109/JIOT.2021.3103779}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouSZXDGQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/YuanYXSW22, author = {Chengsheng Yuan and Peipeng Yu and Zhihua Xia and Xingming Sun and Q. M. Jonathan Wu}, title = {{FLD-SRC:} Fingerprint Liveness Detection for {AFIS} Based on Spatial Ridges Continuity}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {16}, number = {4}, pages = {817--827}, year = {2022}, url = {https://doi.org/10.1109/JSTSP.2022.3174655}, doi = {10.1109/JSTSP.2022.3174655}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jstsp/YuanYXSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuFXZW22, author = {Peipeng Yu and Jianwei Fei and Zhihua Xia and Zhili Zhou and Jian Weng}, title = {Improving Generalization by Commonality Learning in Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {547--558}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3146781}, doi = {10.1109/TIFS.2022.3146781}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuFXZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ChenZQXX22, author = {Xianyi Chen and Zhentian Zhang and Anqi Qiu and Zhihua Xia and Neal N. Xiong}, title = {Novel Coverless Steganography Method Based on Image Selection and StarGAN}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {1}, pages = {219--230}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2020.3041529}, doi = {10.1109/TNSE.2020.3041529}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/ChenZQXX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/XiaJGYX22, author = {Zhihua Xia and Qiuju Ji and Qi Gu and Chengsheng Yuan and Fengjun Xiao}, title = {A Format-compatible Searchable Encryption Scheme for {JPEG} Images Using Bag-of-words}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {18}, number = {3}, pages = {85:1--85:18}, year = {2022}, url = {https://doi.org/10.1145/3492705}, doi = {10.1145/3492705}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/XiaJGYX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/XiaJLLJ22, author = {Zhihua Xia and Leqi Jiang and Dandan Liu and Lihua Lu and Byeungwoo Jeon}, title = {{BOEW:} {A} Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {1}, pages = {202--214}, year = {2022}, url = {https://doi.org/10.1109/TSC.2019.2927215}, doi = {10.1109/TSC.2019.2927215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/XiaJLLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/FeiDYSX022, author = {Jianwei Fei and Yunshu Dai and Peipeng Yu and Tianrun Shen and Zhihua Xia and Jian Weng}, title = {Learning Second Order Local Anomaly for General Face Forgery Detection}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {20238--20248}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01963}, doi = {10.1109/CVPR52688.2022.01963}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/FeiDYSX022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/DaiFWX22, author = {Yunshu Dai and Jianwei Fei and Huaming Wang and Zhihua Xia}, editor = {Elias Pimenidis and Plamen P. Angelov and Chrisina Jayne and Antonios Papaleonidas and Mehmet Aydin}, title = {Attentional Local Contrastive Learning for Face Forgery Detection}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2022 - 31st International Conference on Artificial Neural Networks, Bristol, UK, September 6-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13529}, pages = {709--721}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15919-0\_59}, doi = {10.1007/978-3-031-15919-0\_59}, timestamp = {Wed, 21 Sep 2022 21:26:03 +0200}, biburl = {https://dblp.org/rec/conf/icann/DaiFWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FeiXTB22, author = {Jianwei Fei and Zhihua Xia and Benedetta Tondi and Mauro Barni}, title = {Supervised {GAN} Watermarking for Intellectual Property Protection}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2022, Shanghai, China, December 12-16, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WIFS55849.2022.9975409}, doi = {10.1109/WIFS55849.2022.9975409}, timestamp = {Wed, 21 Dec 2022 18:19:11 +0100}, biburl = {https://dblp.org/rec/conf/wifs/FeiXTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-1, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13338}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06794-5}, doi = {10.1007/978-3-031-06794-5}, isbn = {978-3-031-06793-8}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-2, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13339}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06788-4}, doi = {10.1007/978-3-031-06788-4}, isbn = {978-3-031-06787-7}, timestamp = {Thu, 28 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2022-3, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4}, doi = {10.1007/978-3-031-06791-4}, isbn = {978-3-031-06790-7}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-13067, author = {Sulong Ge and Zhihua Xia and Jianwei Fei and Xingming Sun and Jian Weng}, title = {A Robust Document Image Watermarking Scheme using Deep Neural Network}, journal = {CoRR}, volume = {abs/2202.13067}, year = {2022}, url = {https://arxiv.org/abs/2202.13067}, eprinttype = {arXiv}, eprint = {2202.13067}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05198, author = {Sulong Ge and Zhihua Xia and Yao Tong and Jian Weng and Jia{-}Nan Liu}, title = {A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network}, journal = {CoRR}, volume = {abs/2203.05198}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05198}, doi = {10.48550/ARXIV.2203.05198}, eprinttype = {arXiv}, eprint = {2203.05198}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05198.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-12587, author = {Yong Xu and Zhihua Xia and Zichi Wang and Xinpeng Zhang and Jian Weng}, title = {Deniable Steganography}, journal = {CoRR}, volume = {abs/2205.12587}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.12587}, doi = {10.48550/ARXIV.2205.12587}, eprinttype = {arXiv}, eprint = {2205.12587}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-12587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03466, author = {Jianwei Fei and Zhihua Xia and Benedetta Tondi and Mauro Barni}, title = {Supervised {GAN} Watermarking for Intellectual Property Protection}, journal = {CoRR}, volume = {abs/2209.03466}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03466}, doi = {10.48550/ARXIV.2209.03466}, eprinttype = {arXiv}, eprint = {2209.03466}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03466.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-15490, author = {Jianwei Fei and Yunshu Dai and Peipeng Yu and Tianrun Shen and Zhihua Xia and Jian Weng}, title = {Learning Second Order Local Anomaly for General Face Forgery Detection}, journal = {CoRR}, volume = {abs/2209.15490}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.15490}, doi = {10.48550/ARXIV.2209.15490}, eprinttype = {arXiv}, eprint = {2209.15490}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-15490.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-07138, author = {Wenyuan Yang and Shuo Shao and Yue Yang and Xiyao Liu and Zhihua Xia and Gerald Schaefer and Hui Fang}, title = {Watermarking in Secure Federated Learning: {A} Verification Framework Based on Client-Side Backdooring}, journal = {CoRR}, volume = {abs/2211.07138}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.07138}, doi = {10.48550/ARXIV.2211.07138}, eprinttype = {arXiv}, eprint = {2211.07138}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-07138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-13466, author = {Huaming Wang and Jianwei Fei and Yunshu Dai and Lingyun Leng and Zhihua Xia}, title = {General GAN-generated image detection by data augmentation in fingerprint domain}, journal = {CoRR}, volume = {abs/2212.13466}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.13466}, doi = {10.48550/ARXIV.2212.13466}, eprinttype = {arXiv}, eprint = {2212.13466}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-13466.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-14309, author = {Jianwei Fei and Yunshu Dai and Huaming Wang and Zhihua Xia}, title = {Learning to mask: Towards generalized face forgery detection}, journal = {CoRR}, volume = {abs/2212.14309}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.14309}, doi = {10.48550/ARXIV.2212.14309}, eprinttype = {arXiv}, eprint = {2212.14309}, timestamp = {Sun, 08 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-14309.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/JiangXS21, author = {Leqi Jiang and Zhihua Xia and Xingming Sun}, title = {Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing}, journal = {Adv. Comput.}, volume = {120}, pages = {81--119}, year = {2021}, url = {https://doi.org/10.1016/bs.adcom.2020.09.002}, doi = {10.1016/BS.ADCOM.2020.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/JiangXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-bmt/YuXFL21, author = {Peipeng Yu and Zhihua Xia and Jianwei Fei and Yujiang Lu}, title = {A Survey on Deepfake Video Detection}, journal = {{IET} Biom.}, volume = {10}, number = {6}, pages = {607--624}, year = {2021}, url = {https://doi.org/10.1049/bme2.12031}, doi = {10.1049/BME2.12031}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-bmt/YuXFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FeiXYX21, author = {Jianwei Fei and Zhihua Xia and Peipeng Yu and Fengjun Xiao}, title = {Exposing AI-generated videos with motion magnification}, journal = {Multim. Tools Appl.}, volume = {80}, number = {20}, pages = {30789--30802}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09147-3}, doi = {10.1007/S11042-020-09147-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FeiXYX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLFX21, author = {Yujiang Lu and Yaju Liu and Jianwei Fei and Zhihua Xia}, title = {Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5524930:1--5524930:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5524930}, doi = {10.1155/2021/5524930}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuLFX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenXY21, author = {Zixuan Shen and Zhihua Xia and Peipeng Yu}, title = {{PLDP:} Personalized Local Differential Privacy for Multidimensional Data Aggregation}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6684179:1--6684179:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6684179}, doi = {10.1155/2021/6684179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/GaoTXWXZ21, author = {Guangyong Gao and Shikun Tong and Zhihua Xia and Bin Wu and Liya Xu and Zhiqiang Zhao}, title = {Reversible data hiding with automatic contrast enhancement for medical images}, journal = {Signal Process.}, volume = {178}, pages = {107817}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2020.107817}, doi = {10.1016/J.SIGPRO.2020.107817}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/GaoTXWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/XiaWTXW21, author = {Zhihua Xia and Lan Wang and Jian Tang and Neal N. Xiong and Jian Weng}, title = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {1}, pages = {318--330}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3038218}, doi = {10.1109/TNSE.2020.3038218}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2021-1, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 7th International Conference, {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12736}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78609-0}, doi = {10.1007/978-3-030-78609-0}, isbn = {978-3-030-78608-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2021-2, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Artificial Intelligence and Security - 7th International Conference, {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12737}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78612-0}, doi = {10.1007/978-3-030-78612-0}, isbn = {978-3-030-78611-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangXFX20, author = {Hua Wang and Zhihua Xia and Jianwei Fei and Fengjun Xiao}, title = {An AES-Based Secure Image Retrieval Scheme Using Random Mapping and {BOW} in Cloud Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {61138--61147}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2983194}, doi = {10.1109/ACCESS.2020.2983194}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangXFX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/FeiXYX20, author = {Jianwei Fei and Zhihua Xia and Peipeng Yu and Fengjun Xiao}, title = {Adversarial attacks on fingerprint liveness detection}, journal = {{EURASIP} J. Image Video Process.}, volume = {2020}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.1186/s13640-020-0490-z}, doi = {10.1186/S13640-020-0490-Z}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/FeiXYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/GuXFYZ20, author = {Fei Gu and Zhihua Xia and Jianwei Fei and Chengsheng Yuan and Qiang Zhang}, title = {Face spoof detection using feature map superposition and {CNN}}, journal = {Int. J. Comput. Sci. Eng.}, volume = {22}, number = {2/3}, pages = {355--363}, year = {2020}, url = {https://doi.org/10.1504/IJCSE.2020.107356}, doi = {10.1504/IJCSE.2020.107356}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/GuXFYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamd/YuanXSW20, author = {Chengsheng Yuan and Zhihua Xia and Xingming Sun and Q. M. Jonathan Wu}, title = {Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection}, journal = {{IEEE} Trans. Cogn. Dev. Syst.}, volume = {12}, number = {3}, pages = {461--473}, year = {2020}, url = {https://doi.org/10.1109/TCDS.2019.2920364}, doi = {10.1109/TCDS.2019.2920364}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tamd/YuanXSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/XiaJMYJX20, author = {Zhihua Xia and Leqi Jiang and Xiaohe Ma and Wenyuan Yang and Puzhao Ji and Neal Naixue Xiong}, title = {A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {1}, pages = {629--638}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2913217}, doi = {10.1109/TII.2019.2913217}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/XiaJMYJX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/XiaYLSXS20, author = {Zhihua Xia and Chengsheng Yuan and Rui Lv and Xingming Sun and Neal N. Xiong and Yun{-}Qing Shi}, title = {A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {50}, number = {4}, pages = {1526--1536}, year = {2020}, url = {https://doi.org/10.1109/TSMC.2018.2874281}, doi = {10.1109/TSMC.2018.2874281}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/XiaYLSXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-12416, author = {Qi Gu and Zhihua Xia and Xingming Sun and Jian Weng}, title = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud computing}, journal = {CoRR}, volume = {abs/2007.12416}, year = {2020}, url = {https://arxiv.org/abs/2007.12416}, eprinttype = {arXiv}, eprint = {2007.12416}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05356, author = {Lizhi Xiong and Wenhao Zhou and Zhihua Xia and Qi Gu and Jian Weng}, title = {Efficient Privacy-Preserving Computation Based on Additive Secret Sharing}, journal = {CoRR}, volume = {abs/2009.05356}, year = {2020}, url = {https://arxiv.org/abs/2009.05356}, eprinttype = {arXiv}, eprint = {2009.05356}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-06893, author = {Zhihua Xia and Qi Gu and Lizhi Xiong and Wenhao Zhou and Jian Weng}, title = {Privacy-Preserving Image Retrieval Based on Additive Secret Sharing}, journal = {CoRR}, volume = {abs/2009.06893}, year = {2020}, url = {https://arxiv.org/abs/2009.06893}, eprinttype = {arXiv}, eprint = {2009.06893}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-06893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13153, author = {Zhihua Xia and Qi Gu and Wenhao Zhou and Lizhi Xiong and Jian Weng}, title = {Secure Computation on Additive Shares}, journal = {CoRR}, volume = {abs/2009.13153}, year = {2020}, url = {https://arxiv.org/abs/2009.13153}, eprinttype = {arXiv}, eprint = {2009.13153}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuanXJCWS19, author = {Chengsheng Yuan and Zhihua Xia and Leqi Jiang and Yi Cao and Q. M. Jonathan Wu and Xingming Sun}, title = {Fingerprint Liveness Detection Using an Improved {CNN} With Image Scale Equalization}, journal = {{IEEE} Access}, volume = {7}, pages = {26953--26966}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2901235}, doi = {10.1109/ACCESS.2019.2901235}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuanXJCWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiongXCS19, author = {Lizhi Xiong and Zhihua Xia and Xianyi Chen and Hiuk Jae Shim}, title = {Secure multimedia distribution in cloud computing using re-encryption and fingerprinting}, journal = {Multim. Tools Appl.}, volume = {78}, number = {21}, pages = {30297--30313}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6981-6}, doi = {10.1007/S11042-018-6981-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiongXCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiaMSSXJ18, author = {Zhihua Xia and Xiaohe Ma and Zixuan Shen and Xingming Sun and Neal N. Xiong and Byeungwoo Jeon}, title = {Secure Image {LBP} Feature Extraction in Cloud-Based Smart Campus}, journal = {{IEEE} Access}, volume = {6}, pages = {30392--30401}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2845456}, doi = {10.1109/ACCESS.2018.2845456}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiaMSSXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiaSXSJ18, author = {Zhihua Xia and Tianjiao Shi and Neal N. Xiong and Xingming Sun and Byeungwoo Jeon}, title = {A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure {KNN}}, journal = {{IEEE} Access}, volume = {6}, pages = {46695--46705}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2866411}, doi = {10.1109/ACCESS.2018.2866411}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiaSXSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiongDXC18, author = {Lizhi Xiong and Danping Dong and Zhihua Xia and Xianyi Chen}, title = {High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption}, journal = {{IEEE} Access}, volume = {6}, pages = {60635--60644}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2876036}, doi = {10.1109/ACCESS.2018.2876036}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiongDXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangSGXC18, author = {Bin Yang and Xingming Sun and Honglei Guo and Zhihua Xia and Xianyi Chen}, title = {A copy-move forgery detection method based on {CMFD-SIFT}}, journal = {Multim. Tools Appl.}, volume = {77}, number = {1}, pages = {837--855}, year = {2018}, url = {https://doi.org/10.1007/s11042-016-4289-y}, doi = {10.1007/S11042-016-4289-Y}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/YangSGXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiaLS18, author = {Zhihua Xia and Rui Lv and Xingming Sun}, title = {Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18187--18200}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5517-9}, doi = {10.1007/S11042-017-5517-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiaLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenZXX18, author = {Xianyi Chen and Haidong Zhong and Lizhi Xiong and Zhihua Xia}, title = {Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {1326235:1--1326235:9}, year = {2018}, url = {https://doi.org/10.1155/2018/1326235}, doi = {10.1155/2018/1326235}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenZXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XiaZSQR18, author = {Zhihua Xia and Yi Zhu and Xingming Sun and Zhan Qin and Kui Ren}, title = {Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {1}, pages = {276--286}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2491933}, doi = {10.1109/TCC.2015.2491933}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/XiaZSQR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangJWX18, author = {Xiaoliang Wang and Jianming Jiang and Baowei Wang and Zhihua Xia}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A {VANET} Anonymous Authentication Mechanism for Multi-level Application Scenarios}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {706--717}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_61}, doi = {10.1007/978-3-030-00015-8\_61}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangJWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/ShenLLXZ18, author = {Jian Shen and Dengzhi Liu and Qi Liu and Zhihua Xia and Tianqi Zhou}, title = {A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing}, booktitle = {2018 International Conference on Computing, Networking and Communications, {ICNC} 2018, Maui, HI, USA, March 5-8, 2018}, pages = {843--848}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCNC.2018.8390319}, doi = {10.1109/ICCNC.2018.8390319}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/ShenLLXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WangLZXB17, author = {Xiaoliang Wang and Shuifan Li and Shujing Zhao and Zhihua Xia and Liang Bai}, title = {A vehicular ad hoc network privacy protection scheme without a trusted third party}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {12}, year = {2017}, url = {https://doi.org/10.1177/1550147717743696}, doi = {10.1177/1550147717743696}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WangLZXB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LiuSXS17, author = {Dandan Liu and Jian Shen and Zhihua Xia and Xingming Sun}, title = {A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing}, journal = {Inf.}, volume = {8}, number = {3}, pages = {96}, year = {2017}, url = {https://doi.org/10.3390/info8030096}, doi = {10.3390/INFO8030096}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LiuSXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XiaXVS17, author = {Zhihua Xia and Neal N. Xiong and Athanasios V. Vasilakos and Xingming Sun}, title = {{EPCBIR:} An efficient and privacy-preserving content-based image retrieval scheme in cloud computing}, journal = {Inf. Sci.}, volume = {387}, pages = {195--204}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.12.030}, doi = {10.1016/J.INS.2016.12.030}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/XiaXVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhangWWX17, author = {Jiliang Zhang and Weizheng Wang and Xing{-}Wei Wang and Zhihua Xia}, title = {Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding}, journal = {J. Comput. Sci. Technol.}, volume = {32}, number = {2}, pages = {329--339}, year = {2017}, url = {https://doi.org/10.1007/s11390-017-1700-8}, doi = {10.1007/S11390-017-1700-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZhangWWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/LiuX17, author = {Jianxiao Liu and Zhihua Xia}, title = {An Approach of Web Service Organization Using Bayesian Network Learning}, journal = {J. Web Eng.}, volume = {16}, number = {3{\&}4}, pages = {253--277}, year = {2017}, url = {http://www.rintonpress.com/xjwe16/jwe-16-34/253-277.pdf}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwe/LiuX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/XiaLZJSS17, author = {Zhihua Xia and Rui Lv and Yafeng Zhu and Peng Ji and Huiyu Sun and Yun{-}Qing Shi}, title = {Fingerprint liveness detection using gradient-based texture features}, journal = {Signal Image Video Process.}, volume = {11}, number = {2}, pages = {381--388}, year = {2017}, url = {https://doi.org/10.1007/s11760-016-0936-z}, doi = {10.1007/S11760-016-0936-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/XiaLZJSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/XiaLZJSS17a, author = {Zhihua Xia and Rui Lv and Yafeng Zhu and Peng Ji and Huiyu Sun and Yun{-}Qing Shi}, title = {Erratum to: Fingerprint liveness detection using gradient-based texture features}, journal = {Signal Image Video Process.}, volume = {11}, number = {2}, pages = {389}, year = {2017}, url = {https://doi.org/10.1007/s11760-016-0968-4}, doi = {10.1007/S11760-016-0968-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/XiaLZJSS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhangWDLZXSW16, author = {Jiliang Zhang and Qiang Wu and Yipeng Ding and Yong{-}Qiang Lv and Qiang Zhou and Zhihua Xia and Xingming Sun and Xing{-}Wei Wang}, title = {Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {1}, pages = {124--136}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1616-8}, doi = {10.1007/S11390-016-1616-8}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/ZhangWDLZXSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiaWSLX16, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Quansheng Liu and Naixue Xiong}, title = {Steganalysis of {LSB} matching using differences between nonadjacent pixels}, journal = {Multim. Tools Appl.}, volume = {75}, number = {4}, pages = {1947--1962}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2381-8}, doi = {10.1007/S11042-014-2381-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiaWSLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaWZQSR16, author = {Zhihua Xia and Xinhui Wang and Liangao Zhang and Zhan Qin and Xingming Sun and Kui Ren}, title = {A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2594--2608}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2590944}, doi = {10.1109/TIFS.2016.2590944}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaWZQSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/XiaWSW16, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Qian Wang}, title = {A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {2}, pages = {340--352}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2401003}, doi = {10.1109/TPDS.2015.2401003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/XiaWSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscslp/XiaM16, author = {Zhihua Xia and Qiu Wu Ma}, title = {Gender and prosodic entrainment in Mandarin conversations}, booktitle = {10th International Symposium on Chinese Spoken Language Processing, {ISCSLP} 2016, Tianjin, China, October 17-20, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISCSLP.2016.7918494}, doi = {10.1109/ISCSLP.2016.7918494}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/iscslp/XiaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/FangZX18, author = {Zhongjin Fang and Shu Zhou and Zhihua Xia}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{20851}}{\unicode{38190}}{\unicode{35789}}{\unicode{30340}}{\unicode{21152}}{\unicode{23494}}{\unicode{20113}}{\unicode{25968}}{\unicode{25454}}{\unicode{27169}}{\unicode{31946}}{\unicode{25628}}{\unicode{32034}}{\unicode{31574}}{\unicode{30053}}{\unicode{30740}}{\unicode{31350}} (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {3}, pages = {136--139}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.028}, doi = {10.11896/J.ISSN.1002-137X.2015.03.028}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/FangZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphs/MaXW15, author = {Qiuwu Ma and Zhihua Xia and Ting Wang}, editor = {Maria Wolters and Judy Livingstone and Bernie Beattie and Rachel Smith and Mike MacMahon and Jane Stuart{-}Smith and James M. Scobbie}, title = {Absolute and relative entrainment in Mandarin conversations}, booktitle = {18th International Congress of Phonetic Sciences, ICPhS 2015, Glasgow, UK, August 10-14, 2015}, publisher = {University of Glasgow}, year = {2015}, url = {https://www.internationalphoneticassociation.org/icphs-proceedings/ICPhS2015/Papers/ICPHS0221.pdf}, timestamp = {Thu, 12 Mar 2020 12:19:12 +0100}, biburl = {https://dblp.org/rec/conf/icphs/MaXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/XiaZSC14, author = {Zhihua Xia and Yanling Zhu and Xingming Sun and Lihong Chen}, title = {Secure semantic expansion based search over encrypted cloud data supporting similarity ranking}, journal = {J. Cloud Comput.}, volume = {3}, pages = {8}, year = {2014}, url = {https://doi.org/10.1186/s13677-014-0008-2}, doi = {10.1186/S13677-014-0008-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/XiaZSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiaWSW14, author = {Zhihua Xia and Xinhui Wang and Xingming Sun and Baowei Wang}, title = {Steganalysis of least significant bit matching using multi-order differences}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1283--1291}, year = {2014}, url = {https://doi.org/10.1002/sec.864}, doi = {10.1002/SEC.864}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiaWSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/XiaWSW13, author = {Zhihua Xia and Shufang Wang and Xingming Sun and Baowei Wang}, title = {Steganalysis of least significant bit matching based on image histogram and correlation}, journal = {J. Electronic Imaging}, volume = {22}, number = {3}, pages = {033008}, year = {2013}, url = {https://doi.org/10.1117/1.JEI.22.3.033008}, doi = {10.1117/1.JEI.22.3.033008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/XiaWSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/FuSXZS13, author = {Zhangjie Fu and Xingming Sun and Zhihua Xia and Lu Zhou and Jiangang Shu}, title = {Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing}, booktitle = {{IEEE} 32nd International Performance Computing and Communications Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PCCC.2013.6742783}, doi = {10.1109/PCCC.2013.6742783}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/FuSXZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/XiaoSLWXL10, author = {Xiangrong Xiao and Xingming Sun and Fan Li and Baowei Wang and Zhihua Xia and Wei Liang}, title = {Watermarking-based intellectual property protection for sensor streaming data}, journal = {Int. J. Comput. Appl. Technol.}, volume = {39}, number = {4}, pages = {213--223}, year = {2010}, url = {https://doi.org/10.1504/IJCAT.2010.036025}, doi = {10.1504/IJCAT.2010.036025}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcat/XiaoSLWXL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/XiaSLQL10, author = {Zhihua Xia and Xingming Sun and Wei Liang and Jiaohua Qin and Feng Li}, title = {{JPEG} image steganalysis using joint discrete cosine transform domain features}, journal = {J. Electronic Imaging}, volume = {19}, number = {2}, pages = {023006}, year = {2010}, url = {https://doi.org/10.1117/1.3421972}, doi = {10.1117/1.3421972}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/XiaSLQL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.