default search action
Xingming Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j151]Yi Cao, Zhili Zhou, Chinmay Chakraborty, Meimin Wang, Q. M. Jonathan Wu, Xingming Sun, Keping Yu:
Generative Steganography Based on Long Readable Text Generation. IEEE Trans. Comput. Soc. Syst. 11(4): 4584-4594 (2024) - 2023
- [j150]Xiang Zhang, Xiaona Zhang, Xiaorui Zhang, Wei Sun, Ruohan Meng, Xingming Sun:
A Derivative Matrix-Based Covert Communication Method in Blockchain. Comput. Syst. Sci. Eng. 46(1): 225-239 (2023) - [j149]Zhili Zhou, Jianyu Zhu, Yuecheng Su, Meimin Wang, Xingming Sun:
Geometric correction code-based robust image watermarking. IET Image Process. 17(13): 3660-3669 (2023) - [j148]Zhiqing Guo, Gaobo Yang, Jiyou Chen, Xingming Sun:
Exposing Deepfake Face Forgeries With Guided Residuals. IEEE Trans. Multim. 25: 8458-8470 (2023) - 2022
- [j147]Xiaorui Zhang, Wenfang Zhang, Wei Sun, Xingming Sun, Sunil Kumar Jha:
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection. Comput. Syst. Sci. Eng. 41(3): 1043-1056 (2022) - [j146]Zhangjie Fu, Yan Wang, Xingming Sun, Xiaosong Zhang:
Semantic and secure search over encrypted outsourcing cloud based on BERT. Frontiers Comput. Sci. 16(2): 162802 (2022) - [j145]Qi Gu, Zhihua Xia, Xingming Sun:
MSPPIR: Multi-Source Privacy-Preserving Image Retrieval in cloud computing. Future Gener. Comput. Syst. 134: 78-92 (2022) - [j144]Chengsheng Yuan, Peipeng Yu, Zhihua Xia, Xingming Sun, Q. M. Jonathan Wu:
FLD-SRC: Fingerprint Liveness Detection for AFIS Based on Spatial Ridges Continuity. IEEE J. Sel. Top. Signal Process. 16(4): 817-827 (2022) - [j143]Chengsheng Yuan, Shengming Jiao, Xingming Sun, Q. M. Jonathan Wu:
MFFFLD: A Multimodal-Feature-Fusion-Based Fingerprint Liveness Detection. IEEE Trans. Cogn. Dev. Syst. 14(2): 648-661 (2022) - [j142]Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. IEEE Trans. Dependable Secur. Comput. 19(5): 3125-3135 (2022) - [j141]Ruohan Meng, Qi Cui, Zhili Zhou, Zhetao Li, Q. M. Jonathan Wu, Xingming Sun:
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks. IEEE Trans. Netw. Sci. Eng. 9(2): 848-862 (2022) - [e23]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e22]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e21]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i7]Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng:
A Robust Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2202.13067 (2022) - [i6]Zhiqing Guo, Gaobo Yang, Jiyou Chen, Xingming Sun:
Exposing Deepfake Face Forgeries with Guided Residuals. CoRR abs/2205.00753 (2022) - 2021
- [j140]Leqi Jiang, Zhihua Xia, Xingming Sun:
Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing. Adv. Comput. 120: 81-119 (2021) - [j139]Chengsheng Yuan, Qi Cui, Xingming Sun, Q. M. Jonathan Wu, Sheng Wu:
Chapter Five - Fingerprint liveness detection using an improved CNN with the spatial pyramid pooling structure. Adv. Comput. 120: 157-193 (2021) - [j138]Zhiqing Guo, Gaobo Yang, Jiyou Chen, Xingming Sun:
Fake face detection via adaptive manipulation traces extraction network. Comput. Vis. Image Underst. 204: 103170 (2021) - [j137]Zhili Zhou, Meimin Wang, Ching-Nung Yang, Zhangjie Fu, Xingming Sun, Q. M. Jonathan Wu:
Blockchain-based decentralized reputation system in E-commerce environment. Future Gener. Comput. Syst. 124: 155-167 (2021) - [j136]Zhongliang Yang, Lingyun Xiang, Si-yu Zhang, Xingming Sun, Yongfeng Huang:
Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility. IEEE Signal Process. Lett. 28: 409-413 (2021) - [j135]Zhili Zhou, Q. M. Jonathan Wu, Xingming Sun:
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search. IEEE Trans. Big Data 7(3): 559-573 (2021) - [j134]Jian Shen, Dengzhi Liu, Qi Liu, Xingming Sun, Yan Zhang:
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure. IEEE Trans. Big Data 7(4): 668-677 (2021) - [c44]Junfu Chen, Zhangjie Fu, Xingming Sun, Enlu Li:
Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain. ICIG (1) 2021: 641-653 - [c43]Junfu Chen, Zhangjie Fu, Xingming Sun, Enlu Li:
Multi-scale Extracting and Second-Order Statistics for Lightweight Steganalysis. PRCV (2) 2021: 548-559 - [e20]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12736, Springer 2021, ISBN 978-3-030-78608-3 [contents] - [e19]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3 [contents] - 2020
- [j133]Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan, Xingming Sun:
Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020(1): 36 (2020) - [j132]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener. Comput. Syst. 109: 450-456 (2020) - [j131]Chengsheng Yuan, Xianyi Chen, Peipeng Yu, Ruohan Meng, Weijin Cheng, Q. M. Jonathan Wu, Xingming Sun:
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. J. Real Time Image Process. 17(1): 55-71 (2020) - [j130]Chuanlong Li, Xingming Sun, Zhili Zhou, Yimin Yang:
Real-time image carrier generation based on generative adversarial network and fast object detection. J. Real Time Image Process. 17(3): 655-665 (2020) - [j129]Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu:
Security and Privacy Issues of UAV: A Survey. Mob. Networks Appl. 25(1): 95-101 (2020) - [j128]Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian:
Confusing-Keyword Based Secure Search over Encrypted Cloud Data. Mob. Networks Appl. 25(1): 125-132 (2020) - [j127]Chengsheng Yuan, Zhihua Xia, Xingming Sun, Q. M. Jonathan Wu:
Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection. IEEE Trans. Cogn. Dev. Syst. 12(3): 461-473 (2020) - [j126]Jian Shen, Dengzhi Liu, Md. Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, Aniello Castiglione:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 8(2): 280-290 (2020) - [j125]Zhili Zhou, Q. M. Jonathan Wu, Shaohua Wan, Wendi Sun, Xingming Sun:
Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 593-604 (2020) - [j124]Zhili Zhou, Q. M. Jonathan Wu, Yimin Yang, Xingming Sun:
Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search. ACM Trans. Multim. Comput. Commun. Appl. 16(2): 54:1-54:25 (2020) - [j123]Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi:
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection. IEEE Trans. Syst. Man Cybern. Syst. 50(4): 1526-1536 (2020) - [e18]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12239, Springer 2020, ISBN 978-3-030-57883-1 [contents] - [e17]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0 [contents] - [i5]Zhiqing Guo, Gaobo Yang, Jiyou Chen, Xingming Sun:
Fake Face Detection via Adaptive Residuals Extraction Network. CoRR abs/2005.04945 (2020) - [i4]Qi Gu, Zhihua Xia, Xingming Sun, Jian Weng:
MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. CoRR abs/2007.12416 (2020)
2010 – 2019
- 2019
- [j122]Chengsheng Yuan, Zhihua Xia, Leqi Jiang, Yi Cao, Q. M. Jonathan Wu, Xingming Sun:
Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization. IEEE Access 7: 26953-26966 (2019) - [j121]Ruohan Meng, Qi Cui, Zhili Zhou, Zhangjie Fu, Xingming Sun:
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things. IEEE Access 7: 90574-90584 (2019) - [j120]Qi Cui, Zhili Zhou, Zhangjie Fu, Ruohan Meng, Xingming Sun, Q. M. Jonathan Wu:
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things. IEEE Access 7: 90815-90824 (2019) - [j119]Zhili Zhou, Jingcheng Chen, Ching-Nung Yang, Xingming Sun:
Video Copy Detection Using Spatio-Temporal CNN Features. IEEE Access 7: 100658-100665 (2019) - [j118]Zhili Zhou, Ching-Nung Yang, Yimin Yang, Xingming Sun:
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment. Complex. 2019: 2875676:1-2875676:8 (2019) - [j117]Leqi Jiang, Yi Cao, Chengsheng Yuan, Xingming Sun, Xiaoli Zhu:
An effective comparison protocol over encrypted data in cloud computing. J. Inf. Secur. Appl. 48 (2019) - [j116]Chengsheng Yuan, Xingming Sun, Q. M. Jonathan Wu:
Difference co-occurrence matrix using BP neural network for fingerprint liveness detection. Soft Comput. 23(13): 5157-5169 (2019) - [j115]Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(6): 996-1010 (2019) - [j114]Zhangjie Fu, Jiashuang Xu, Zhuangdi Zhu, Alex X. Liu, Xingming Sun:
Writing in the Air with WiFi Signals for Virtual Reality Devices. IEEE Trans. Mob. Comput. 18(2): 473-484 (2019) - [j113]Zhangjie Fu, Fengxiao Huang, Xingming Sun, Athanasios V. Vasilakos, Ching-Nung Yang:
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data. IEEE Trans. Serv. Comput. 12(5): 813-823 (2019) - [e16]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11632, Springer 2019, ISBN 978-3-030-24273-2 [contents] - [e15]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11633, Springer 2019, ISBN 978-3-030-24264-0 [contents] - [e14]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1 [contents] - [e13]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1 [contents] - 2018
- [j112]Zhili Zhou, Ching-Nung Yang, Yi Cao, Xingming Sun:
Secret Image Sharing Based on Encrypted Pixels. IEEE Access 6: 15021-15025 (2018) - [j111]Zhihua Xia, Xiaohe Ma, Zixuan Shen, Xingming Sun, Neal N. Xiong, Byeungwoo Jeon:
Secure Image LBP Feature Extraction in Cloud-Based Smart Campus. IEEE Access 6: 30392-30401 (2018) - [j110]Zhihua Xia, Tianjiao Shi, Neal N. Xiong, Xingming Sun, Byeungwoo Jeon:
A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN. IEEE Access 6: 46695-46705 (2018) - [j109]Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun:
A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 78: 956-963 (2018) - [j108]Chuan Qin, Ping Ji, Chin-Chen Chang, Jing Dong, Xingming Sun:
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE Multim. 25(3): 36-48 (2018) - [j107]Bin Yang, Xingming Sun, Enguo Cao, Weifeng Hu, Xianyi Chen:
Convolutional neural network for smooth filtering detection. IET Image Process. 12(8): 1432-1438 (2018) - [j106]Beijing Chen, Ming Yu, Yuhang Tian, Leida Li, Dingcheng Wang, Xingming Sun:
Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process. 12(12): 2238-2249 (2018) - [j105]Yanhua Zhang, Xingming Sun, Zhanke Yu:
K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation. Int. J. Sens. Networks 27(4): 250-258 (2018) - [j104]Chuanlong Li, Xingming Sun:
A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle. Int. J. Sens. Networks 28(2): 80-88 (2018) - [j103]Jian Shen, Tianqi Zhou, Fushan Wei, Xingming Sun, Yang Xiang:
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things. IEEE Internet Things J. 5(4): 2526-2536 (2018) - [j102]Chuan Qin, Xueqin Chen, Xiangyang Luo, Xinpeng Zhang, Xingming Sun:
Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423: 284-302 (2018) - [j101]Bin Yang, Xingming Sun, Honglei Guo, Zhihua Xia, Xianyi Chen:
A copy-move forgery detection method based on CMFD-SIFT. Multim. Tools Appl. 77(1): 837-855 (2018) - [j100]Dengyong Zhang, Zaoshan Liang, Gaobo Yang, Qingguo Li, Leida Li, Xingming Sun:
A robust forgery detection algorithm for object removal by exemplar-based image inpainting. Multim. Tools Appl. 77(10): 11823-11842 (2018) - [j99]Jin-Feng Li, Hong-Xia Wang, Tao Wu, Xingming Sun, Qing Qian:
Norm ratio-based audio watermarking scheme in DWT domain. Multim. Tools Appl. 77(12): 14481-14497 (2018) - [j98]Zhihua Xia, Rui Lv, Xingming Sun:
Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection. Multim. Tools Appl. 77(14): 18187-18200 (2018) - [j97]Zhili Zhou, Q. M. Jonathan Wu, Xingming Sun:
Encoding multiple contextual clues for partial-duplicate image retrieval. Pattern Recognit. Lett. 109: 18-26 (2018) - [j96]Zhenghong Wang, Zhangjie Fu, Xingming Sun:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. Secur. Commun. Networks 2018: 1420930:1-1420930:10 (2018) - [j95]Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, Kui Ren:
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing. IEEE Trans. Cloud Comput. 6(1): 276-286 (2018) - [j94]Xiangling Ding, Gaobo Yang, Ran Li, Lebing Zhang, Yue Li, Xingming Sun:
Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals. IEEE Trans. Circuits Syst. Video Technol. 28(7): 1497-1512 (2018) - [j93]Qing Qian, Hongxia Wang, Xingming Sun, Yunhe Cui, Huan Wang, Canghong Shi:
Speech authentication and content recovery scheme for security communication and storage. Telecommun. Syst. 67(4): 635-649 (2018) - [j92]Yanli Chen, Hongxia Wang, Hanzhou Wu, Xingming Sun:
A video error concealment method using data hiding based on compressed sensing over lossy channel. Telecommun. Syst. 68(2): 337-349 (2018) - [j91]Zhangjie Fu, Lili Xia, Xingming Sun, Alex X. Liu, Guowu Xie:
Semantic-Aware Searching Over Encrypted Data for Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(9): 2359-2371 (2018) - [j90]Xiaolong Xu, Shucun Fu, Qing Cai, Wei Tian, Wenjie Liu, Wanchun Dou, Xingming Sun, Alex X. Liu:
Dynamic Resource Allocation for Load Balancing in Fog Environment. Wirel. Commun. Mob. Comput. 2018 (2018) - [e12]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I. Lecture Notes in Computer Science 11063, Springer 2018, ISBN 978-3-030-00005-9 [contents] - [e11]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0 [contents] - [e10]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III. Lecture Notes in Computer Science 11065, Springer 2018, ISBN 978-3-030-00011-0 [contents] - [e9]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV. Lecture Notes in Computer Science 11066, Springer 2018, ISBN 978-3-030-00014-1 [contents] - [e8]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V. Lecture Notes in Computer Science 11067, Springer 2018, ISBN 978-3-030-00017-2 [contents] - [e7]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI. Lecture Notes in Computer Science 11068, Springer 2018, ISBN 978-3-030-00020-2 [contents] - 2017
- [j89]Jian Shen, Chen Wang, Anxi Wang, Xingming Sun, Sangman Moh, Patrick C. K. Hung:
Organized topology based routing protocol in incompletely predictable ad-hoc networks. Comput. Commun. 99: 107-118 (2017) - [j88]Xiangling Ding, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun:
Design of new scan orders for perceptual encryption of H.264/AVC videos. IET Inf. Secur. 11(2): 55-65 (2017) - [j87]Zhili Zhou, Q. M. Jonathan Wu, Fang Huang, Xingming Sun:
Fast and accurate near-duplicate image elimination for visual sensor networks. Int. J. Distributed Sens. Networks 13(2) (2017) - [j86]Dandan Liu, Jian Shen, Zhihua Xia, Xingming Sun:
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing. Inf. 8(3): 96 (2017) - [j85]Guangyong Gao, Xiangdong Wan, Shimao Yao, Zongmin Cui, Caixue Zhou, Xingming Sun:
Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf. Sci. 385: 250-265 (2017) - [j84]Zhihua Xia, Neal N. Xiong, Athanasios V. Vasilakos, Xingming Sun:
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387: 195-204 (2017) - [j83]Dengyong Zhang, Qingguo Li, Gaobo Yang, Leida Li, Xingming Sun:
Detection of image seam carving by using weber local descriptor and local binary patterns. J. Inf. Secur. Appl. 36: 135-144 (2017) - [j82]Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. J. Inf. Sci. Eng. 33(4): 923-938 (2017) - [j81]Dengyong Zhang, Ting Yin, Gaobo Yang, Ming Xia, Leida Li, Xingming Sun:
Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J. Vis. Commun. Image Represent. 48: 281-291 (2017) - [j80]Beijing Chen, Xiaoming Qi, Xingming Sun, Yun-Qing Shi:
Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection. J. Vis. Commun. Image Represent. 49: 283-290 (2017) - [j79]Fei Peng, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [j78]Min Xia, Gaobo Yang, Leida Li, Ran Li, Xingming Sun:
Detecting video frame rate up-conversion based on frame-level analysis of average texture variation. Multim. Tools Appl. 76(6): 8399-8421 (2017) - [j77]Zhenghui Liu, Jiwu Huang, Xingming Sun, Chuanda Qi:
A security watermark scheme used for digital speech forensics. Multim. Tools Appl. 76(7): 9297-9317 (2017) - [j76]Yun Song, Gaobo Yang, Hongtao Xie, Dengyong Zhang, Xingming Sun:
Residual domain dictionary learning for compressed sensing video recovery. Multim. Tools Appl. 76(7): 10083-10096 (2017) - [j75]Huan Wang, Hong-Xia Wang, Xingming Sun, Qing Qian:
A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multim. Tools Appl. 76(10): 12627-12644 (2017) - [j74]Nur Mohammad, Xingming Sun, Hengfu Yang, Jianping Yin, Gaobo Yang, Mingfang Jiang:
Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images. Multim. Tools Appl. 76(11): 13301-13313 (2017) - [j73]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22761-22783 (2017) - [j72]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22785 (2017) - [j71]Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun:
A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. 41: 219-230 (2017) - [j70]Yue Li, Gaobo Yang, Yapei Zhu, Xiangling Ding, Xingming Sun:
Adaptive Inter CU Depth Decision for HEVC Using Optimal Selection Model and Encoding Parameters. IEEE Trans. Broadcast. 63(3): 535-546 (2017) - [j69]Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Trans. Inf. Forensics Secur. 12(1): 48-63 (2017) - [j68]Yue Li, Gaobo Yang, Yapei Zhu, Xiangling Ding, Xingming Sun:
Unimodal Stopping Model-Based Early SKIP Mode Decision for High-Efficiency Video Coding. IEEE Trans. Multim. 19(7): 1431-1441 (2017) - [j67]Bin Gu, Xingming Sun, Victor S. Sheng:
Structural Minimax Probability Machine. IEEE Trans. Neural Networks Learn. Syst. 28(7): 1646-1656 (2017) - [c42]Linchuan Shen, Gaobo Yang, Leida Li, Xingming Sun:
Robust detection for object removal with post-processing by exemplar-based image inpainting. ICNC-FSKD 2017: 2730-2736 - [c41]Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun:
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. ISPEC 2017: 454-467 - [e6]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10602, Springer 2017, ISBN 978-3-319-68504-5 [contents] - [e5]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10603, Springer 2017, ISBN 978-3-319-68541-0 [contents] - 2016
- [j66]Jing Li, Xiubo Chen, Xingming Sun, Zongpeng Li, Yixian Yang:
Quantum network coding for multi-unicast problem based on 2D and 3D cluster states. Sci. China Inf. Sci. 59(4): 042301:1-042301:15 (2016) - [j65]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Xingming Sun, Yi-Xian Yang:
Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State. IEEE Commun. Lett. 20(12): 2470-2473 (2016) - [j64]Zhili Zhou, Ching-Nung Yang, Beijing Chen, Xingming Sun, Qi Liu, Q. M. Jonathan Wu:
Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation. IEICE Trans. Inf. Syst. 99-D(6): 1531-1540 (2016) - [j63]Zhaoqing Pan, Yun Zhang, Jianjun Lei, Long Xu, Xingming Sun:
Early DIRECT mode decision based on all-zero block and rate distortion cost for multiview video coding. IET Image Process. 10(1): 9-15 (2016) - [j62]Chuan Qin, Xueqin Chen, Dengpan Ye, Jinwei Wang, Xingming Sun:
A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361-362: 84-99 (2016) - [j61]Chuan Qin, Huili Wang, Xinpeng Zhang, Xingming Sun:
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373: 233-250 (2016) - [j60]Yuxuan Yao, Gaobo Yang, Xingming Sun, Leida Li:
Detecting video frame-rate up-conversion based on periodic properties of edge-intensity. J. Inf. Secur. Appl. 26: 39-50 (2016) - [j59]Guangyong Gao, Yun-Qing Shi, Xingming Sun, Caixue Zhou, Zongmin Cui, Liya Xu:
Reversible Watermarking with Adaptive Embedding Threshold Matrix. KSII Trans. Internet Inf. Syst. 10(9): 4603-4624 (2016) - [j58]Jiliang Zhang, Qiang Wu, Yipeng Ding, Yong-Qiang Lv, Qiang Zhou, Zhihua Xia, Xingming Sun, Xing-Wei Wang:
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function. J. Comput. Sci. Technol. 31(1): 124-136 (2016) - [j57]Xinyue Cao, Zhangjie Fu, Xingming Sun:
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing. J. Electr. Comput. Eng. 2016: 3219042:1-3219042:7 (2016) - [j56]Lijuan Tang, Leida Li, Ke Gu, Xingming Sun, Jianying Zhang:
Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment. J. Vis. Commun. Image Represent. 40: 335-344 (2016) - [j55]Zhaoqing Pan, Peng Jin, Jianjun Lei, Yun Zhang, Xingming Sun, Sam Kwong:
Fast reference frame selection based on content similarity for low complexity HEVC encoder. J. Vis. Commun. Image Represent. 40: 516-524 (2016) - [j54]Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, Naixue Xiong:
Steganalysis of LSB matching using differences between nonadjacent pixels. Multim. Tools Appl. 75(4): 1947-1962 (2016) - [j53]Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang:
Privacy-preserving outsourced gene data search in encryption domain. Secur. Commun. Networks 9(18): 5178-5186 (2016) - [j52]Zhaoqing Pan, Jianjun Lei, Yun Zhang, Xingming Sun, Sam Kwong:
Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder. IEEE Trans. Broadcast. 62(3): 675-684 (2016) - [j51]Mingquan Fan, Peipei Liu, Hongxia Wang, Xingming Sun:
Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun. Syst. 63(4): 523-529 (2016) - [j50]Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren:
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(11): 2594-2608 (2016) - [j49]Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, Kui Ren:
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 11(12): 2706-2716 (2016) - [j48]Leida Li, Hao Cai, Yabin Zhang, Weisi Lin, Alex C. Kot, Xingming Sun:
Sparse Representation-Based Image Quality Index With Adaptive Sub-Dictionaries. IEEE Trans. Image Process. 25(8): 3775-3786 (2016) - [j47]Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang:
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 27(2): 340-352 (2016) - [j46]Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, Fengxiao Huang:
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Trans. Parallel Distributed Syst. 27(9): 2546-2559 (2016) - [j45]Panlong Yang, Qingyu Li, Yubo Yan, Xiang-Yang Li, Yan Xiong, Baowei Wang, Xingming Sun:
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading. IEEE Trans. Veh. Technol. 65(7): 5485-5496 (2016) - [c40]Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, Xingming Sun:
A RFID Based Localization Algorithm for Wireless Sensor Networks. ICCCS (2) 2016: 275-285 - [c39]Zhangjie Fu, Xingming Sun, Sai Ji, Guowu Xie:
Towards efficient content-aware search over encrypted outsourced data in cloud. INFOCOM 2016: 1-9 - [e4]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10039, 2016, ISBN 978-3-319-48670-3 [contents] - [e3]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10040, 2016, ISBN 978-3-319-48673-4 [contents] - 2015
- [j44]Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. Comput. J. 58(4): 588-600 (2015) - [j43]Ting Yin, Gaobo Yang, Leida Li, Dengyong Zhang, Xingming Sun:
Detecting seam carving based image resizing using local binary patterns. Comput. Secur. 55: 130-141 (2015) - [j42]Zhangjie Fu, Xingming Sun, Qi Liu, Lu Zhou, Jiangang Shu:
Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans. Commun. 98-B(1): 190-200 (2015) - [j41]Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, Qi Liu, Xingming Sun:
Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Networks 17(5): 453-462 (2015) - [j40]Zhangjie Fu, Xingming Sun, Jie Xi:
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication. J. Commun. Networks 17(5): 525-533 (2015) - [j39]Bin Yang, Xingming Sun, Xiangyang Xin, Weifeng Hu, Youxin Wu:
Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression. J. Electronic Imaging 24(6): 063016 (2015) - [j38]Beijing Chen, Huazhong Shu, Gouenou Coatrieux, Gang Chen, Xingming Sun, Jean-Louis Coatrieux:
Color Image Analysis by Quaternion-Type Moments. J. Math. Imaging Vis. 51(1): 124-144 (2015) - [j37]Xianyi Chen, Xingming Sun, Huiyu Sun, Lingyun Xiang, Bin Yang:
Histogram shifting based reversible data hiding method using directed-prediction scheme. Multim. Tools Appl. 74(15): 5747-5765 (2015) - [j36]Xingming Sun, Shuangshuang Yan, Baowei Wang, Li Xia, Qi Liu, Hui Zhang:
Air Temperature Error Correction Based on Solar Radiation in an Economical Meteorological Wireless Sensor Network. Sensors 15(8): 18114-18139 (2015) - [j35]Zhaoqing Pan, Liming Chen, Xingming Sun:
Low Complexity HEVC Encoder for Visual Sensor Networks. Sensors 15(12): 30115-30125 (2015) - [j34]Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. IEEE Trans. Inf. Forensics Secur. 10(3): 507-518 (2015) - [j33]Xu Li, Xingming Sun, Quansheng Liu:
Image Integrity Authentication Scheme Based on Fixed Point Theory. IEEE Trans. Image Process. 24(2): 632-645 (2015) - [c38]Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun:
Coverless Image Steganography Without Embedding. ICCCS 2015: 123-132 - [c37]Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun:
Coverless Information Hiding Method Based on the Chinese Mathematical Expression. ICCCS 2015: 133-143 - [e2]Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang:
Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9483, Springer 2015, ISBN 978-3-319-27050-0 [contents] - 2014
- [j32]Beijing Chen, Gouenou Coatrieux, Gang Chen, Xingming Sun, Jean-Louis Coatrieux, Huazhong Shu:
Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digit. Signal Process. 28: 106-119 (2014) - [j31]Beijing Chen, Quansheng Liu, Xingming Sun, Xu Li, Huazhong Shu:
Removing Gaussian noise for colour images by quaternion representation and optimisation of weights in non-local means filter. IET Image Process. 8(10): 591-600 (2014) - [j30]Zhihua Xia, Yanling Zhu, Xingming Sun, Lihong Chen:
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3: 8 (2014) - [j29]Jian Shen, Sangman Moh, Ilyong Chung, Xingming Sun:
Buffer scheme optimization of epidemic routing in delay tolerant networks. J. Commun. Networks 16(6): 656-666 (2014) - [j28]Lingyun Xiang, Xingming Sun, Gang Luo, Bin Xia:
Linguistic steganalysis using the features derived from synonym frequency. Multim. Tools Appl. 71(3): 1893-1911 (2014) - [j27]Zhihua Xia, Xinhui Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Networks 7(8): 1283-1291 (2014) - [j26]Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang, Zhangjie Fu:
A novel signature based on the combination of global and local signatures for image copy detection. Secur. Commun. Networks 7(11): 1702-1711 (2014) - [j25]Zhangjie Fu, Xingming Sun, Nigel Linge, Lu Zhou:
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans. Consumer Electron. 60(1): 164-172 (2014) - [j24]Zhangjie Fu, Jiangang Shu, Xingming Sun, Nigel Linge:
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans. Consumer Electron. 60(4): 762-770 (2014) - [j23]Hui Zhang, Q. M. Jonathan Wu, Thanh Minh Nguyen, Xingming Sun:
Synthetic Aperture Radar Image Segmentation by Modified Student's t-Mixture Model. IEEE Trans. Geosci. Remote. Sens. 52(7): 4391-4403 (2014) - [c36]Zhangjie Fu, Jiangang Shu, Xingming Sun, Daxing Zhang:
Semantic keyword search based on trie over encrypted cloud data. SCC@ASIACCS 2014: 59-62 - [c35]Zhangjie Fu, Xinyue Cao, Jin Wang, Xingming Sun:
Secure Storage of Data in Cloud Computing. IIH-MSP 2014: 783-786 - [c34]Zhangjie Fu, Jie Xi, Jin Wang, Xingming Sun:
Document Attribute-Based Keyword Search over Encrypted Data. IIH-MSP 2014: 787-790 - [c33]Zhangjie Fu, Jiangang Shu, Jin Wang, Xingming Sun:
A Similarity Search Method for Encrypted Cloud Document. IIH-MSP 2014: 791-794 - [c32]Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi:
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection. IWDW 2014: 60-71 - [c31]Zhangjie Fu, Jiangang Shu, Xingming Sun:
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability. SecureComm (1) 2014: 45-54 - 2013
- [j22]Zhiqiang Ruan, Xingming Sun, Wei Liang:
Securing sensor data storage and query based on k-out-of- n coding. Int. J. Commun. Syst. 26(5): 549-566 (2013) - [j21]Zhihua Xia, Shufang Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching based on image histogram and correlation. J. Electronic Imaging 22(3): 033008 (2013) - [j20]Xianyi Chen, Xingming Sun, Huiyu Sun, Zhili Zhou, Jianjun Zhang:
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86(10): 2620-2626 (2013) - [c30]Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu:
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. IPCCC 2013: 1-8 - [c29]Jian Li, Xiaolong Li, Xingming Sun:
A New Reversible Data Hiding Scheme Based on Efficient Prediction. IWDW 2013: 326-336 - [c28]Zhangjie Fu, Xingming Sun, Lu Zhou, Jiangang Shu:
New Forensic Methods for OOXML Format Documents. IWDW 2013: 503-513 - [e1]Xingming Sun, Elaine Shi, Kui Ren:
Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2067-2 [contents] - [i3]Xu Li, Xingming Sun, Quansheng Liu:
Image Integrity Authentication Scheme Based On Fixed Point Theory. CoRR abs/1308.0679 (2013) - [i2]Xu Li, Xingming Sun, Quansheng Liu, Beijing Chen:
A Novel Method for Image Integrity Authentication Based on Fixed Point Theory. CoRR abs/1308.5326 (2013) - [i1]Nathalie Diane Wandji, Xingming Sun, Moise Fah Kue:
Detection of copy-move forgery in digital images based on DCT. CoRR abs/1308.5661 (2013) - 2012
- [j19]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Networks 5(9): 957-968 (2012) - [j18]Sujun Li, Boqing Zhou, Jingguo Dai, Xingming Sun:
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks. IEEE Wirel. Commun. Lett. 1(5): 416-419 (2012) - 2011
- [j17]Fei Peng, Yu-Zhou Lei, Min Long, Xingming Sun:
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput. Aided Des. 43(8): 1018-1024 (2011) - [j16]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Forensic investigation of OOXML format documents. Digit. Investig. 8(1): 48-55 (2011) - [j15]Jinsong Han, Jizhong Zhao, Min Xi, Xingming Sun:
Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems. Int. J. Ad Hoc Ubiquitous Comput. 8(1/2): 106-113 (2011) - [j14]S. A. Shah, Xingming Sun, Ali Hamadou, Abdul Majid:
Query Preserving Relational Database Watermarking. Informatica (Slovenia) 35(3): 391-396 (2011) - 2010
- [j13]Bo Liao, Benyou Liao, Xingming Sun, Qingguang Zeng:
A Novel method for similarity analysis and protein sub-cellular localization prediction. Bioinform. 26(21): 2678-2683 (2010) - [j12]Xiangrong Xiao, Xingming Sun, Fan Li, Baowei Wang, Zhihua Xia, Wei Liang:
Watermarking-based intellectual property protection for sensor streaming data. Int. J. Comput. Appl. Technol. 39(4): 213-223 (2010) - [j11]Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun:
Watermarking 3D Triangular Mesh with High Visual Quality. J. Digit. Content Technol. its Appl. 4(4): 107-116 (2010) - [j10]Zhihua Xia, Xingming Sun, Wei Liang, Jiaohua Qin, Feng Li:
JPEG image steganalysis using joint discrete cosine transform domain features. J. Electronic Imaging 19(2): 023006 (2010)
2000 – 2009
- 2009
- [j9]Boqing Zhou, Sujun Li, Qiaoliang Li, Xingming Sun, Xiaoming Wang:
An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge. Comput. Commun. 32(1): 124-133 (2009) - [j8]Yuling Liu, Xingming Sun, Ingemar J. Cox, Hong Wang:
Natural Language Information Hiding Based on Chinese Mathematical Expression. Int. J. Netw. Secur. 8(1): 10-15 (2009) - [j7]Bo Liao, Weiyang Chen, Xingming Sun, Wen Zhu:
A binary coding method of RNA secondary structure and its application. J. Comput. Chem. 30(14): 2205-2212 (2009) - [j6]Jiaohua Qin, Xingming Sun, Xuyu Xiang, Changming Niu:
Principal feature selection and fusion method for image steganalysis. J. Electronic Imaging 18(3): 033009 (2009) - [j5]Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun Li, Rong Xiao:
A Contrast-Sensitive Reversible Visible Image Watermarking Technique. IEEE Trans. Circuits Syst. Video Technol. 19(5): 656-667 (2009) - [c27]Osama Hosam, Xingming Sun:
Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. ACIS-ICIS 2009: 627-632 - 2008
- [j4]Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun Li:
Removable visible image watermarking algorithm in the discrete cosine transform domain. J. Electronic Imaging 17(3): 033008 (2008) - [c26]Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou:
Dynamic K-Gram Based Software Birthmark. Australian Software Engineering Conference 2008: 644-649 - [c25]Baowei Wang, Xingming Sun, Xinbing Wang, Bin Xiao:
Time-Based Privacy Protection for Multi-attribute Data in WSNs. ICPADS 2008: 615-622 - [c24]Rong Xiao, Xingming Sun, Ying Yang:
Copyright Protection in Wireless Sensor Networks by Watermarking. IIH-MSP 2008: 7-10 - [c23]Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao:
File-Update Based Steganography for Microsoft PowerPoint Files. IIH-MSP 2008: 11-15 - [c22]Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang:
A Steganography Scheme in P2P Network. IIH-MSP 2008: 20-24 - [c21]Huajun Huang, Shaohong Zhong, Xingming Sun:
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. IIH-MSP 2008: 257-260 - [c20]Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo:
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. IIH-MSP 2008: 294-297 - [c19]Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang:
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. IIH-MSP 2008: 1416-1421 - [c18]Fei Peng, Xingming Sun:
Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic. IIH-MSP 2008: 1516-1519 - [c17]Huajun Huang, Shaohong Zhong, Xingming Sun:
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. ISECS 2008: 957-960 - [c16]Huajun Huang, Junshan Tan, Xingming Sun, Lingxi Liu:
Detection of Hidden Information in Webpage Based on Higher-Order Statistics. IWDW 2008: 293-302 - 2007
- [c15]Xiangrong Xiao, Xingming Sun, Minggang Chen:
Second-LSB-Dependent Robust Watermarking for Relational Database. IAS 2007: 292-300 - [c14]Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo:
Detection of Hidden Information in Webpages Based on Randomness. IAS 2007: 447-452 - [c13]Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan:
Research on Steganalysis for Text Steganography Based on Font Format. IAS 2007: 490-495 - [c12]Huajun Huang, Xingming Sun, Zishuai Li, Guang Sun:
Detection of Hidden Information in Webpage. FSKD (4) 2007: 317-321 - [c11]Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin:
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. ICCSA (3) 2007: 1066-1075 - [c10]Yuling Liu, Xingming Sun, Can Gan, Hong Wang:
An Efficient Linguistic Steganography for Chinese Text. ICME 2007: 2094-2097 - [c9]Gang Luo, Xingming Sun, Lingyun Xiang, Junwei Huang:
An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms. IIH-MSP 2007: 126-129 - [c8]Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang:
Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch. IIH-MSP 2007: 257-260 - [c7]Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang:
Detection of steganographic information in tags of webpage. Infoscale 2007: 72 - [c6]Xiangrong Xiao, Xingming Sun, Lincong Yang, Minggang Chen:
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding. MobiQuitous 2007: 1-6 - [c5]Jieqing Ai, Xingming Sun, Yunhao Liu, Ingemar J. Cox, Guang Sun, Yi Luo:
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation. MUE 2007: 813-818 - [c4]Hengfu Yang, Xingming Sun:
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model. MUE 2007: 1112-1117 - 2005
- [c3]Yuling Liu, Xingming Sun, Yong Wu:
A Natural Language Watermarking Based on Chinese Syntax. ICNC (3) 2005: 958-961 - [c2]Xingming Sun, Alex Jessey Asiimwe:
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. ICNC (3) 2005: 968-971 - 2004
- [c1]Xingming Sun, Gang Luo, Huajun Huang:
Component-based digital watermarking of Chinese texts. InfoSecu 2004: 76-81 - 2003
- [j3]Lihua Yang, Zhihua Yang, Xingming Sun:
Construction of wavelets for width-invariant characterization of curves. Pattern Recognit. Lett. 24(15): 2751-2760 (2003) - 2002
- [j2]Xingming Sun, Huowang Chen, Lihua Yang, Yuan Yan Tang:
Mathematical Representation of a Chinese Character and its Applications. Int. J. Pattern Recognit. Artif. Intell. 16(6): 735-748 (2002) - 2001
- [j1]Xingming Sun, Lihua Yang, Yuan Yan Tang, Yunfa Hu:
A New Stroke Extraction Method of Chinese Characters. Int. J. Pattern Recognit. Artif. Intell. 15(4): 707-721 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint