Minqing Zhang
Orcid: 0000-0002-7214-0569
According to our database1,
Minqing Zhang
authored at least 87 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
General secure encryption algorithm for separable reversible data hiding in encrypted domain.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Progressive reversible data hiding in encrypted images based on polynomial secret sharing and Chinese remainder theorem.
J. Electronic Imaging, 2024
IET Image Process., 2024
VisionCLIP: An Med-AIGC based Ethical Language-Image Foundation Model for Generalizable Retina Image Analysis.
CoRR, 2024
Comput. Informatics, 2024
Diversified and Structure-Realistic Fundus Image Synthesis for Diabetic Retinopathy Lesion Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
Leveraging Multimodal Fusion for Enhanced Diagnosis of Multiple Retinal Diseases in Ultra-Wide Octa.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
SSL-ENSAM: Utilizing Sam for Semi-Supervised Retinal Vessel Segmentation with Quality-Aware Enhancement.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
2023
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction.
Frontiers Inf. Technol. Electron. Eng., August, 2023
Investigation on principles for cost assignment in motion vector-based video steganography.
J. Inf. Secur. Appl., March, 2023
VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence.
CoRR, 2023
CauDR: A Causality-inspired Domain Generalization Framework for Fundus-based Diabetic Retinopathy Grading.
CoRR, 2023
A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors.
CoRR, 2023
Rectifying Noisy Labels with Sequential Prior: Multi-scale Temporal Feature Affinity Learning for Robust Video Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
Proceedings of the Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA 2023), 2023
Motion Vector Domain Video Steganography Maintaining the Statistical Characteristics of Skipped Macroblocks.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023
2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022
Multim. Tools Appl., 2022
Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022
High capacity reversible data hiding for encrypted images based on full bit-plane compression.
J. Electronic Imaging, 2022
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022
CoRR, 2022
2021
An Automatic Classification Method of Sports Teaching Video Using Support Vector Machine.
Sci. Program., 2021
J. Electronic Imaging, 2021
J. Electronic Imaging, 2021
2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020
Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU.
IEEE Access, 2020
IEEE Access, 2020
Characterizing Label Errors: Confident Learning for Noisy-Labeled Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020
2019
Multim. Tools Appl., 2019
Reversible data hiding in JPEG images based on zero coefficients and distortion cost function.
Multim. Tools Appl., 2019
J. Electronic Imaging, 2019
A high security and efficiency protection of confidentiality and integrity for off-chip memory.
J. Ambient Intell. Humaniz. Comput., 2019
CoRR, 2019
Multi-Task Convolutional Neural Network for Joint Bone Age Assessment and Ossification Center Detection from Hand Radiograph.
Proceedings of the Machine Learning in Medical Imaging - 10th International Workshop, 2019
Dynamic Spectral Graph Convolution Networks with Assistant Task Training for Early MCI Diagnosis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019
Regression-Based Line Detection Network for Delineation of Largely Deformed Brain Midline.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019
Novel Iterative Attention Focusing Strategy for Joint Pathology Localization and Prediction of MCI Progression.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019
2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
Int. J. Mob. Comput. Multim. Commun., 2018
Int. J. Grid Util. Comput., 2018
Concurr. Comput. Pract. Exp., 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
2017
Multim. Tools Appl., 2017
Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks.
CoRR, 2017
Proceedings of the Advances in Internetworking, 2017
Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion.
Proceedings of the Advances in Internetworking, 2017
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
J. Ambient Intell. Humaniz. Comput., 2016
Informatica (Slovenia), 2016
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
Int. J. Technol. Hum. Interact., 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015
A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Comput. Math. Appl., 2013
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Informatica, 2012
2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011
Fundam. Informaticae, 2011
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011
2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007