Di Xiao
Orcid: 0000-0002-6958-5807Affiliations:
- Chongqing University, Chongqing, China
According to our database1,
Di Xiao
authored at least 119 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Manipulable, reversible and diversified de-identification via face identity disentanglement.
Multim. Tools Appl., September, 2024
Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization Reconstruction.
ACM Trans. Multim. Comput. Commun. Appl., April, 2024
Vis. Comput., March, 2024
Secure and efficient federated learning via novel multi-party computation and compressed sensing.
Inf. Sci., 2024
Digit. Signal Process., 2024
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection.
CoRR, 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction.
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
High-capacity data hiding in encrypted images based on compressive sensing and intra-block difference coding.
Appl. Intell., November, 2023
Convolutional neural networks tamper detection and location based on fragile watermarking.
Appl. Intell., October, 2023
IEEE Trans. Ind. Informatics, June, 2023
Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing.
Sensors, April, 2023
Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication.
Signal Process., 2023
Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices.
Signal Process., 2023
Privacy-Preserving Federated Compressed Learning Against Data Reconstruction Attacks Based on Secure Data.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Robust Watermarking Scheme in Encrypted Domain Based on Integer Lifting Wavelet Transform and Compressed Sensing.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Data Compression Conference, 2023
Hierarchical Privacy-Preserving and Communication-Efficient Compression via Compressed Sensing.
Proceedings of the Data Compression Conference, 2023
2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image Coding.
IEEE Signal Process. Lett., 2022
Robust Watermarking Scheme for Encrypted Images Based on Scrambling and Kronecker Compressed Sensing.
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system.
J. Netw. Comput. Appl., 2022
Communication-Efficient and Byzantine-Robust Differentially Private Federated Learning.
IEEE Commun. Lett., 2022
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing.
Proceedings of the Information Security - 25th International Conference, 2022
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing and Compressed Sensing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Compressing Cipher Images by Using Semi-tensor Product Compressed Sensing and Pre-mapping.
Proceedings of the Data Compression Conference, 2022
Privacy-Assured and Multi-Prior Recovered Compressed Sensing for Image Compression-Encryption Applications.
Proceedings of the Data Compression Conference, 2022
2021
IEEE Trans. Multim., 2021
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021
Quantum Inf. Process., 2021
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer.
Inf. Sci., 2021
Low-Cost and Confidentiality-Preserving Multi-Image Compressed Acquisition and Separate Reconstruction for Internet of Multimedia Things.
IEEE Internet Things J., 2021
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing.
Int. J. Digit. Crime Forensics, 2021
CoRR, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Low Complexity Secure P-Tensor Product Compressed Sensing Reconstruction Outsourcing and Identity Authentication in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2021
Privacy-Preserving Compressed Sensing for Image Simultaneous Compression-Encryption Applications.
Proceedings of the 31st Data Compression Conference, 2021
2020
A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery.
IEEE Signal Process. Lett., 2020
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing.
Sensors, 2020
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map.
Quantum Inf. Process., 2020
Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks.
J. Netw. Comput. Appl., 2020
A secure image permutation-substitution framework based on chaos and compressive sensing.
Int. J. Distributed Sens. Networks, 2020
A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption.
IEEE Access, 2020
2019
A secure image tampering detection and self-recovery scheme using POB number system over cloud.
Signal Process., 2019
Signal Process., 2019
Quantum Inf. Process., 2019
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack in IoT.
IEEE Internet Things J., 2019
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol.
Entropy, 2019
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map.
IEEE Access, 2019
Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model.
IEEE Access, 2019
QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System.
IEEE Access, 2019
A Novel Privacy-Preserving Data Gathering Scheme in WSN Based on Compressive Sensing and Embedding.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map.
Signal Process., 2018
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing.
Secur. Commun. Networks, 2018
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution.
Secur. Commun. Networks, 2018
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain.
Secur. Commun. Networks, 2018
Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment.
Multim. Tools Appl., 2018
Entropy, 2018
A Prediction Model for the Risk of Osteoporosis Fracture in the Elderly Based on a Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2018, 2018
2017
Quantum Inf. Process., 2017
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance.
Multim. Tools Appl., 2017
High-payload completely reversible data hiding in encrypted images by an interpolation technique.
Frontiers Inf. Technol. Electron. Eng., 2017
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism.
J. Vis. Commun. Image Represent., 2017
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.
J. Vis. Commun. Image Represent., 2017
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017
2016
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
Signal Process. Image Commun., 2016
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
Multim. Tools Appl., 2016
Robust image hashing with tampering recovery capability via low-rank and sparse representation.
Multim. Tools Appl., 2016
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules.
Multim. Tools Appl., 2016
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016
2015
Reversible data hiding in encrypted images using cross division and additive homomorphism.
Signal Process. Image Commun., 2015
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
Multim. Tools Appl., 2015
A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics.
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015
2014
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
Signal Process., 2014
Multim. Tools Appl., 2014
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption.
Commun. Nonlinear Sci. Numer. Simul., 2014
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2014
2013
Wirel. Pers. Commun., 2013
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks.
IEEE Trans. Parallel Distributed Syst., 2013
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations.
Signal Process. Image Commun., 2013
Improvement and performance analysis of a novel hash function based on chaotic neural network.
Neural Comput. Appl., 2013
Inf. Sci., 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Neural Comput. Appl., 2012
Int. J. Wavelets Multiresolution Inf. Process., 2012
Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks.
Proceedings of the Seventh IEEE International Conference on Networking, 2012
2011
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011
Parallel Hash function construction based on chaotic maps with changeable parameters.
Neural Comput. Appl., 2011
Neural Comput. Appl., 2011
Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
2009
Inf. Sci., 2009
Neurocomputing, 2009
2008
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol.
Inf. Sci., 2008
2007
2006
IEEE Trans. Circuits Syst. II Express Briefs, 2006
2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
2004
Proceedings of the Advances in Neural Networks, 2004