default search action
Zhihua Xia
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou:
Privacy-preserving image retrieval based on additive secret sharing. Int. J. Auton. Adapt. Commun. Syst. 17(2): 99-126 (2024) - [j77]Zixuan Shen, Jianwei Fei, Zhihua Xia:
SNGPLDP: Social network graph generation based on personalised local differential privacy. Int. J. Auton. Adapt. Commun. Syst. 17(2): 159-180 (2024) - [j76]Fenghua Zhang, Bingwen Feng, Zhihua Xia, Jian Weng, Wei Lu, Bing Chen:
Conditional image hiding network based on style transfer. Inf. Sci. 662: 120225 (2024) - [j75]Tiewei Qin, Bingwen Feng, Bing Chen, Zecheng Peng, Zhihua Xia, Wei Lu:
Moiré pattern generation-based image steganography. J. Inf. Secur. Appl. 82: 103753 (2024) - [j74]Jingfa Pang, Chengsheng Yuan, Zhihua Xia, Xinting Li, Zhangjie Fu:
Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack. Knowl. Based Syst. 301: 112241 (2024) - [j73]Wenyan Pan, Zhihua Xia, Wentao Ma, Yuwei Wang, Lichuan Gu, Guolong Shi, Shan Zhao:
Auto-focus tracing: Image manipulation detection with artifact graph contrastive. Knowl. Based Syst. 304: 112545 (2024) - [j72]Yunshu Dai, Jianwei Fei, Fangjun Huang, Zhihua Xia:
Face Omron Ring: Proactive defense against face forgery with identity awareness. Neural Networks 180: 106639 (2024) - [j71]Xiaobin Zeng, Bingwen Feng, Zhihua Xia, Zecheng Peng, Tiewei Qin, Wei Lu:
Robust image hiding network with Frequency and Spatial Attentions. Pattern Recognit. 155: 110691 (2024) - [j70]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, Naixue Xiong:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. IEEE Trans. Computers 73(2): 340-352 (2024) - [j69]Wenyan Pan, Wentao Ma, Shan Zhao, Lichuan Gu, Guolong Shi, Zhihua Xia, Meng Wang:
Image Manipulation Detection With Cascade Hierarchical Graph Representation. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8672-8683 (2024) - [j68]Zhili Zhou, Meimin Wang, Zewen Ni, Zhihua Xia, Brij Bhooshan Gupta:
Reliable and Sustainable Product Evaluation Management System Based on Blockchain. IEEE Trans. Engineering Management 71: 12259-12271 (2024) - [j67]Yushu Zhang, Junhao Ji, Wenying Wen, Youwen Zhu, Zhihua Xia, Jian Weng:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. IEEE Trans. Inf. Forensics Secur. 19: 5046-5059 (2024) - [j66]Xiangli Xiao, Yushu Zhang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. IEEE Trans. Inf. Forensics Secur. 19: 5357-5372 (2024) - [j65]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. IEEE Trans. Inf. Forensics Secur. 19: 8322-8337 (2024) - [j64]Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Ximeng Liu, Zhihua Xia, Gerald Schaefer, Hui Fang:
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring. ACM Trans. Intell. Syst. Technol. 15(1): 5:1-5:25 (2024) - [j63]Guangyong Gao, Hui Zhang, Zhihua Xia, Xiangyang Luo, Yun-Qing Shi:
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image. IEEE Trans. Multim. 26: 3909-3923 (2024) - [j62]Wenyuan Yang, Shaocong Wu, Jianwei Fei, Xianwang Zeng, Yuemin Ding, Zhihua Xia:
A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 152:1-152:23 (2024) - [c12]Zixuan Yang, Yushu Zhang, Tao Wang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils. ACM Multimedia 2024: 7705-7713 - [c11]Tao Wang, Yushu Zhang, Xiangli Xiao, Lin Yuan, Zhihua Xia, Jian Weng:
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition. ACM Multimedia 2024: 10268-10276 - [i18]Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao:
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales. CoRR abs/2402.15430 (2024) - [i17]Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng:
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network. CoRR abs/2403.00239 (2024) - 2023
- [j61]Xueli Zhao, Zhihua Xia:
Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification. Comput. Secur. 124: 103011 (2023) - [j60]Guangyong Gao, Tingting Han, Bin Wu, Jiaxin Fu, Zhihua Xia:
A hue preservation lossless contrast enhancement method with RDH for color images. Digit. Signal Process. 136: 103965 (2023) - [j59]Beijing Chen, Xin Liu, Zhihua Xia, Guoying Zhao:
Privacy-preserving DeepFake face image detection. Digit. Signal Process. 143: 104233 (2023) - [j58]Sulong Ge, Jianwei Fei, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Process. 17(2): 323-336 (2023) - [j57]Guangyong Gao, Tingting Han, Zhao Feng, Min Wang, Zhihua Xia:
A Data Integrity Authentication Scheme in WSNs Based on Double Watermark. IEEE Internet Things J. 10(9, May 1): 8245-8256 (2023) - [j56]Sulong Ge, Zhihua Xia, Jianwei Fei, Yao Tong, Jian Weng, Ming Li:
A robust document image watermarking scheme using deep neural network. Multim. Tools Appl. 82(25): 38589-38612 (2023) - [j55]Zhihua Xia, Julia Hirschberg, Rivka Levitan:
Investigating prosodic entrainment from global conversations to local turns and tones in Mandarin conversations. Speech Commun. 153: 102961 (2023) - [j54]Chengsheng Yuan, Qiang Guo, Zhili Zhou, Zhangjie Fu, Zhihua Xia:
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement. IEEE Signal Process. Lett. 30: 843-847 (2023) - [j53]Guangyong Gao, Shikun Tong, Zhihua Xia, Yun-Qing Shi:
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding. IEEE Trans. Cloud Comput. 11(2): 1692-1706 (2023) - [j52]Peipeng Yu, Jian Tang, Zhihua Xia, Zhetao Li, Jian Weng:
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2885-2896 (2023) - [j51]Guangyong Gao, Zhao Feng, Zhihua Xia:
Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks. IEEE Trans. Green Commun. Netw. 7(3): 1297-1308 (2023) - [j50]Wenyuan Yang, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba, Zhihua Xia, Xiaochun Cao, Kui Ren:
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake. IEEE Trans. Inf. Forensics Secur. 18: 2015-2029 (2023) - [j49]Xiang Liu, Xueli Zhao, Zhihua Xia, Qian Feng, Peipeng Yu, Jian Weng:
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction. IEEE Trans. Image Process. 32: 4635-4648 (2023) - [j48]Saiqin Long, Ying Zhang, Qingyong Deng, Tingrui Pei, Jinzhi Ouyang, Zhihua Xia:
An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment. IEEE Trans. Netw. Sci. Eng. 10(2): 645-657 (2023) - [j47]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Zhihua Xia:
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing. ACM Trans. Multim. Comput. Commun. Appl. 19(1): 5:1-5:19 (2023) - [c10]Huaming Wang, Jianwei Fei, Yunshu Dai, Lingyun Leng, Zhihua Xia:
General GAN-generated Image Detection by Data Augmentation in Fingerprint Domain. ICME 2023: 1187-1192 - [c9]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Robust Retraining-free GAN Fingerprinting via Personalized Normalization. WIFS 2023: 1-6 - [i16]Peipeng Yu, Jiahan Chen, Xuan Feng, Zhihua Xia:
CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts. CoRR abs/2304.12008 (2023) - [i15]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i14]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. CoRR abs/2310.16919 (2023) - [i13]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Robust Retraining-free GAN Fingerprinting via Personalized Normalization. CoRR abs/2311.05478 (2023) - 2022
- [j46]Qi Gu, Zhihua Xia, Xingming Sun:
MSPPIR: Multi-Source Privacy-Preserving Image Retrieval in cloud computing. Future Gener. Comput. Syst. 134: 78-92 (2022) - [j45]Zhili Zhou, Yuecheng Su, Yulan Zhang, Zhihua Xia, Shan Du, Brij B. Gupta, Lianyong Qi:
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment. IEEE Internet Things J. 9(12): 9332-9341 (2022) - [j44]Chengsheng Yuan, Peipeng Yu, Zhihua Xia, Xingming Sun, Q. M. Jonathan Wu:
FLD-SRC: Fingerprint Liveness Detection for AFIS Based on Spatial Ridges Continuity. IEEE J. Sel. Top. Signal Process. 16(4): 817-827 (2022) - [j43]Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, Jian Weng:
Improving Generalization by Commonality Learning in Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 17: 547-558 (2022) - [j42]Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia, Neal N. Xiong:
Novel Coverless Steganography Method Based on Image Selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 9(1): 219-230 (2022) - [j41]Zhihua Xia, Qiuju Ji, Qi Gu, Chengsheng Yuan, Fengjun Xiao:
A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words. ACM Trans. Multim. Comput. Commun. Appl. 18(3): 85:1-85:18 (2022) - [j40]Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, Byeungwoo Jeon:
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing. IEEE Trans. Serv. Comput. 15(1): 202-214 (2022) - [c8]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CVPR 2022: 20238-20248 - [c7]Yunshu Dai, Jianwei Fei, Huaming Wang, Zhihua Xia:
Attentional Local Contrastive Learning for Face Forgery Detection. ICANN (1) 2022: 709-721 - [c6]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Supervised GAN Watermarking for Intellectual Property Protection. WIFS 2022: 1-6 - [e5]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e4]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e3]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i12]Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng:
A Robust Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2202.13067 (2022) - [i11]Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2203.05198 (2022) - [i10]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng:
Deniable Steganography. CoRR abs/2205.12587 (2022) - [i9]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Supervised GAN Watermarking for Intellectual Property Protection. CoRR abs/2209.03466 (2022) - [i8]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CoRR abs/2209.15490 (2022) - [i7]Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Zhihua Xia, Gerald Schaefer, Hui Fang:
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring. CoRR abs/2211.07138 (2022) - [i6]Huaming Wang, Jianwei Fei, Yunshu Dai, Lingyun Leng, Zhihua Xia:
General GAN-generated image detection by data augmentation in fingerprint domain. CoRR abs/2212.13466 (2022) - [i5]Jianwei Fei, Yunshu Dai, Huaming Wang, Zhihua Xia:
Learning to mask: Towards generalized face forgery detection. CoRR abs/2212.14309 (2022) - 2021
- [j39]Leqi Jiang, Zhihua Xia, Xingming Sun:
Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing. Adv. Comput. 120: 81-119 (2021) - [j38]Peipeng Yu, Zhihua Xia, Jianwei Fei, Yujiang Lu:
A Survey on Deepfake Video Detection. IET Biom. 10(6): 607-624 (2021) - [j37]Jianwei Fei, Zhihua Xia, Peipeng Yu, Fengjun Xiao:
Exposing AI-generated videos with motion magnification. Multim. Tools Appl. 80(20): 30789-30802 (2021) - [j36]Yujiang Lu, Yaju Liu, Jianwei Fei, Zhihua Xia:
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics. Secur. Commun. Networks 2021: 5524930:1-5524930:13 (2021) - [j35]Zixuan Shen, Zhihua Xia, Peipeng Yu:
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation. Secur. Commun. Networks 2021: 6684179:1-6684179:13 (2021) - [j34]Guangyong Gao, Shikun Tong, Zhihua Xia, Bin Wu, Liya Xu, Zhiqiang Zhao:
Reversible data hiding with automatic contrast enhancement for medical images. Signal Process. 178: 107817 (2021) - [j33]Zhihua Xia, Lan Wang, Jian Tang, Neal N. Xiong, Jian Weng:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. IEEE Trans. Netw. Sci. Eng. 8(1): 318-330 (2021) - [e2]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12736, Springer 2021, ISBN 978-3-030-78608-3 [contents] - [e1]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3 [contents] - 2020
- [j32]Hua Wang, Zhihua Xia, Jianwei Fei, Fengjun Xiao:
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing. IEEE Access 8: 61138-61147 (2020) - [j31]Jianwei Fei, Zhihua Xia, Peipeng Yu, Fengjun Xiao:
Adversarial attacks on fingerprint liveness detection. EURASIP J. Image Video Process. 2020(1): 1 (2020) - [j30]Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang:
Face spoof detection using feature map superposition and CNN. Int. J. Comput. Sci. Eng. 22(2/3): 355-363 (2020) - [j29]Chengsheng Yuan, Zhihua Xia, Xingming Sun, Q. M. Jonathan Wu:
Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection. IEEE Trans. Cogn. Dev. Syst. 12(3): 461-473 (2020) - [j28]Zhihua Xia, Leqi Jiang, Xiaohe Ma, Wenyuan Yang, Puzhao Ji, Neal Naixue Xiong:
A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(1): 629-638 (2020) - [j27]Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi:
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection. IEEE Trans. Syst. Man Cybern. Syst. 50(4): 1526-1536 (2020) - [i4]Qi Gu, Zhihua Xia, Xingming Sun, Jian Weng:
MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. CoRR abs/2007.12416 (2020) - [i3]Lizhi Xiong, Wenhao Zhou, Zhihua Xia, Qi Gu, Jian Weng:
Efficient Privacy-Preserving Computation Based on Additive Secret Sharing. CoRR abs/2009.05356 (2020) - [i2]Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou, Jian Weng:
Privacy-Preserving Image Retrieval Based on Additive Secret Sharing. CoRR abs/2009.06893 (2020) - [i1]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng:
Secure Computation on Additive Shares. CoRR abs/2009.13153 (2020)
2010 – 2019
- 2019
- [j26]Chengsheng Yuan, Zhihua Xia, Leqi Jiang, Yi Cao, Q. M. Jonathan Wu, Xingming Sun:
Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization. IEEE Access 7: 26953-26966 (2019) - [j25]Lizhi Xiong, Zhihua Xia, Xianyi Chen, Hiuk Jae Shim:
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multim. Tools Appl. 78(21): 30297-30313 (2019) - 2018
- [j24]Zhihua Xia, Xiaohe Ma, Zixuan Shen, Xingming Sun, Neal N. Xiong, Byeungwoo Jeon:
Secure Image LBP Feature Extraction in Cloud-Based Smart Campus. IEEE Access 6: 30392-30401 (2018) - [j23]Zhihua Xia, Tianjiao Shi, Neal N. Xiong, Xingming Sun, Byeungwoo Jeon:
A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN. IEEE Access 6: 46695-46705 (2018) - [j22]Lizhi Xiong, Danping Dong, Zhihua Xia, Xianyi Chen:
High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644 (2018) - [j21]Bin Yang, Xingming Sun, Honglei Guo, Zhihua Xia, Xianyi Chen:
A copy-move forgery detection method based on CMFD-SIFT. Multim. Tools Appl. 77(1): 837-855 (2018) - [j20]Zhihua Xia, Rui Lv, Xingming Sun:
Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection. Multim. Tools Appl. 77(14): 18187-18200 (2018) - [j19]Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. Secur. Commun. Networks 2018: 1326235:1-1326235:9 (2018) - [j18]Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, Kui Ren:
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing. IEEE Trans. Cloud Comput. 6(1): 276-286 (2018) - [c5]Xiaoliang Wang, Jianming Jiang, Baowei Wang, Zhihua Xia:
A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios. ICCCS (4) 2018: 706-717 - [c4]Jian Shen, Dengzhi Liu, Qi Liu, Zhihua Xia, Tianqi Zhou:
A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing. ICNC 2018: 843-848 - 2017
- [j17]Xiaoliang Wang, Shuifan Li, Shujing Zhao, Zhihua Xia, Liang Bai:
A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distributed Sens. Networks 13(12) (2017) - [j16]Dandan Liu, Jian Shen, Zhihua Xia, Xingming Sun:
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing. Inf. 8(3): 96 (2017) - [j15]Zhihua Xia, Neal N. Xiong, Athanasios V. Vasilakos, Xingming Sun:
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387: 195-204 (2017) - [j14]Jiliang Zhang, Weizheng Wang, Xing-Wei Wang, Zhihua Xia:
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding. J. Comput. Sci. Technol. 32(2): 329-339 (2017) - [j13]Jianxiao Liu, Zhihua Xia:
An Approach of Web Service Organization Using Bayesian Network Learning. J. Web Eng. 16(3&4): 253-277 (2017) - [j12]Zhihua Xia, Rui Lv, Yafeng Zhu, Peng Ji, Huiyu Sun, Yun-Qing Shi:
Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process. 11(2): 381-388 (2017) - [j11]Zhihua Xia, Rui Lv, Yafeng Zhu, Peng Ji, Huiyu Sun, Yun-Qing Shi:
Erratum to: Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process. 11(2): 389 (2017) - 2016
- [j10]Jiliang Zhang, Qiang Wu, Yipeng Ding, Yong-Qiang Lv, Qiang Zhou, Zhihua Xia, Xingming Sun, Xing-Wei Wang:
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function. J. Comput. Sci. Technol. 31(1): 124-136 (2016) - [j9]Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, Naixue Xiong:
Steganalysis of LSB matching using differences between nonadjacent pixels. Multim. Tools Appl. 75(4): 1947-1962 (2016) - [j8]Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren:
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(11): 2594-2608 (2016) - [j7]Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang:
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 27(2): 340-352 (2016) - [c3]Zhihua Xia, Qiu Wu Ma:
Gender and prosodic entrainment in Mandarin conversations. ISCSLP 2016: 1-4 - 2015
- [j6]Zhongjin Fang, Shu Zhou, Zhihua Xia:
基于关键词的加密云数据模糊搜索策略研究 (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords). 计算机科学 42(3): 136-139 (2015) - [c2]Qiuwu Ma, Zhihua Xia, Ting Wang:
Absolute and relative entrainment in Mandarin conversations. ICPhS 2015 - 2014
- [j5]Zhihua Xia, Yanling Zhu, Xingming Sun, Lihong Chen:
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3: 8 (2014) - [j4]Zhihua Xia, Xinhui Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Networks 7(8): 1283-1291 (2014) - 2013
- [j3]Zhihua Xia, Shufang Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching based on image histogram and correlation. J. Electronic Imaging 22(3): 033008 (2013) - [c1]Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu:
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. IPCCC 2013: 1-8 - 2010
- [j2]Xiangrong Xiao, Xingming Sun, Fan Li, Baowei Wang, Zhihua Xia, Wei Liang:
Watermarking-based intellectual property protection for sensor streaming data. Int. J. Comput. Appl. Technol. 39(4): 213-223 (2010) - [j1]Zhihua Xia, Xingming Sun, Wei Liang, Jiaohua Qin, Feng Li:
JPEG image steganalysis using joint discrete cosine transform domain features. J. Electronic Imaging 19(2): 023006 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint