Xingming Sun
Orcid: 0000-0001-7982-726X
According to our database1,
Xingming Sun
authored at least 200 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., August, 2024
2023
Comput. Syst. Sci. Eng., 2023
2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cogn. Dev. Syst., 2022
IEEE J. Sel. Top. Signal Process., 2022
Future Gener. Comput. Syst., 2022
Frontiers Comput. Sci., 2022
Comput. Syst. Sci. Eng., 2022
2021
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search.
IEEE Trans. Big Data, 2021
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure.
IEEE Trans. Big Data, 2021
IEEE Signal Process. Lett., 2021
Future Gener. Comput. Syst., 2021
Comput. Vis. Image Underst., 2021
Chapter Five - Fingerprint liveness detection using an improved CNN with the spatial pyramid pooling structure.
Adv. Comput., 2021
Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing.
Adv. Comput., 2021
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search.
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020
Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection.
IEEE Trans. Cogn. Dev. Syst., 2020
Mob. Networks Appl., 2020
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection.
J. Real Time Image Process., 2020
Real-time image carrier generation based on generative adversarial network and fast object detection.
J. Real Time Image Process., 2020
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020
EURASIP J. Image Video Process., 2020
CoRR, 2020
2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Difference co-occurrence matrix using BP neural network for fingerprint liveness detection.
Soft Comput., 2019
J. Inf. Secur. Appl., 2019
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019
IEEE Access, 2019
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018
A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommun. Syst., 2018
Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals.
IEEE Trans. Circuits Syst. Video Technol., 2018
IEEE Trans. Cloud Comput., 2018
Secur. Commun. Networks, 2018
Pattern Recognit. Lett., 2018
A robust forgery detection algorithm for object removal by exemplar-based image inpainting.
Multim. Tools Appl., 2018
Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
Multim. Tools Appl., 2018
Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018
K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation.
Int. J. Sens. Networks, 2018
A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle.
Int. J. Sens. Networks, 2018
IET Image Process., 2018
Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption.
IET Image Process., 2018
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018
Future Gener. Comput. Syst., 2018
A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN.
IEEE Access, 2018
2017
IEEE Trans. Neural Networks Learn. Syst., 2017
Unimodal Stopping Model-Based Early SKIP Mode Decision for High-Efficiency Video Coding.
IEEE Trans. Multim., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Adaptive Inter CU Depth Decision for HEVC Using Optimal Selection Model and Encoding Parameters.
IEEE Trans. Broadcast., 2017
Pervasive Mob. Comput., 2017
Detecting video frame rate up-conversion based on frame-level analysis of average texture variation.
Multim. Tools Appl., 2017
A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017
Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies.
J. Vis. Commun. Image Represent., 2017
Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Vis. Commun. Image Represent., 2017
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017
Detection of image seam carving by using weber local descriptor and local binary patterns.
J. Inf. Secur. Appl., 2017
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing.
Inf. Sci., 2017
Reversible data hiding with contrast enhancement and tamper localization for medical images.
Inf. Sci., 2017
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017
Int. J. Distributed Sens. Networks, 2017
IET Inf. Secur., 2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017
Robust detection for object removal with post-processing by exemplar-based image inpainting.
Proceedings of the 13th International Conference on Natural Computation, 2017
2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Parallel Distributed Syst., 2016
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Image Process., 2016
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016
Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.
Telecommun. Syst., 2016
Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder.
IEEE Trans. Broadcast., 2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment.
J. Vis. Commun. Image Represent., 2016
Fast reference frame selection based on content similarity for low complexity HEVC encoder.
J. Vis. Commun. Image Represent., 2016
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electr. Comput. Eng., 2016
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016
KSII Trans. Internet Inf. Syst., 2016
Detecting video frame-rate up-conversion based on periodic properties of edge-intensity.
J. Inf. Secur. Appl., 2016
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016
A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016
Early DIRECT mode decision based on all-zero block and rate distortion cost for multiview video coding.
IET Image Process., 2016
IEICE Trans. Inf. Syst., 2016
IEEE Commun. Lett., 2016
Sci. China Inf. Sci., 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
IEEE Trans. Image Process., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Air Temperature Error Correction Based on Solar Radiation in an Economical Meteorological Wireless Sensor Network.
Sensors, 2015
Histogram shifting based reversible data hiding method using directed-prediction scheme.
Multim. Tools Appl., 2015
Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression.
J. Electronic Imaging, 2015
Enhanced secure sensor association and key management in wireless body area networks.
J. Commun. Networks, 2015
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
J. Commun. Networks, 2015
Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Trans. Commun., 2015
Comput. Secur., 2015
Comput. J., 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
2014
IEEE Trans. Geosci. Remote. Sens., 2014
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electron., 2014
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electron., 2014
A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Multim. Tools Appl., 2014
J. Commun. Networks, 2014
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
J. Cloud Comput., 2014
Removing Gaussian noise for colour images by quaternion representation and optimisation of weights in non-local means filter.
IET Image Process., 2014
Digit. Signal Process., 2014
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
J. Syst. Softw., 2013
Steganalysis of least significant bit matching based on image histogram and correlation.
J. Electronic Imaging, 2013
Int. J. Commun. Syst., 2013
CoRR, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks.
IEEE Wirel. Commun. Lett., 2012
Secur. Commun. Networks, 2012
2011
Int. J. Ad Hoc Ubiquitous Comput., 2011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011
2010
J. Electronic Imaging, 2010
J. Digit. Content Technol. its Appl., 2010
Int. J. Comput. Appl. Technol., 2010
A Novel method for similarity analysis and protein sub-cellular localization prediction.
Bioinform., 2010
2009
IEEE Trans. Circuits Syst. Video Technol., 2009
J. Electronic Imaging, 2009
J. Comput. Chem., 2009
Int. J. Netw. Secur., 2009
An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge.
Comput. Commun., 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Removable visible image watermarking algorithm in the discrete cosine transform domain.
J. Electronic Imaging, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008
2007
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2005
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers.
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
2004
Proceedings of the 3rd International Conference on Information Security, 2004
2003
Pattern Recognit. Lett., 2003
2002
Int. J. Pattern Recognit. Artif. Intell., 2002
2001
Int. J. Pattern Recognit. Artif. Intell., 2001