Tao Xiang
Orcid: 0000-0002-0022-3082Affiliations:
- Chongqing University, College of Computer Science, Chongqing, China
According to our database1,
Tao Xiang
authored at least 199 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Big Data, December, 2024
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
IEEE Internet Things J., October, 2024
Using Multi-Level Consistency Learning for Partial-to-Partial Point Cloud Registration.
IEEE Trans. Vis. Comput. Graph., August, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
Third-Person View Attention Prediction in Natural Scenarios With Weak Information Dependency and Human-Scene Interaction Mechanism.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Artif. Intell. Rev., July, 2024
Mach. Learn., June, 2024
IEEE Trans. Circuits Syst. Video Technol., May, 2024
Robust RGB-T Tracking via Adaptive Modality Weight Correlation Filters and Cross-modality Learning.
ACM Trans. Multim. Comput. Commun. Appl., April, 2024
IEEE Trans. Broadcast., March, 2024
Comput. Stand. Interfaces, March, 2024
IEEE J. Biomed. Health Informatics, February, 2024
Multim. Tools Appl., January, 2024
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Multim., 2024
IEEE Trans. Multim., 2024
Perceptual Quality Analysis in Deep Domains Using Structure Separation and High-Order Moments.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Cloud Comput., 2024
J. Parallel Distributed Comput., 2024
Inf. Sci., 2024
CoRR, 2024
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection.
CoRR, 2024
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024
Sci. China Inf. Sci., 2024
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Orthogonal Hyper-category Guided Multi-interest Elicitation for Micro-video Matching.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction.
Proceedings of the Computer Vision - ECCV 2024, 2024
United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Knowl. Data Eng., November, 2023
IEEE Netw., November, 2023
A Distributed Projection Neurodynamic Approach for Solving BP Denoising Problem in Sparse Recovery.
J. Circuits Syst. Comput., November, 2023
IEEE Trans. Parallel Distributed Syst., October, 2023
IEEE Trans. Circuits Syst. Video Technol., September, 2023
IEEE Trans. Broadcast., September, 2023
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023
An End-to-End Blind Image Quality Assessment Method Using a Recurrent Network and Self-Attention.
IEEE Trans. Broadcast., June, 2023
Perception-Oriented U-Shaped Transformer Network for 360-Degree No-Reference Image Quality Assessment.
IEEE Trans. Broadcast., June, 2023
IEEE Trans. Broadcast., March, 2023
Spatiotemporal Feature Hierarchy-Based Blind Prediction of Natural Video Quality via Transfer Learning.
IEEE Trans. Broadcast., March, 2023
Generative adversarial networks with adaptive learning strategy for noise-to-image synthesis.
Neural Comput. Appl., March, 2023
ACM Trans. Multim. Comput. Commun. Appl., February, 2023
Veh. Commun., 2023
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction.
CoRR, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
Int. J. Intell. Syst., December, 2022
ACM Trans. Sens. Networks, November, 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Broadcast., 2022
An End-to-End No-Reference Video Quality Assessment Method With Hierarchical Spatiotemporal Feature Representation.
IEEE Trans. Broadcast., 2022
STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
Multim. Tools Appl., 2022
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability.
J. Inf. Secur. Appl., 2022
IEEE Internet Things J., 2022
Lattice-based public key searchable encryption with fine-grained access control for edge computing.
Future Gener. Comput. Syst., 2022
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference.
CoRR, 2022
Comput. Secur., 2022
Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds.
Comput. Commun., 2022
Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Privacy Masking Stochastic Subgradient-Push Algorithm for Distributed Online Optimization.
IEEE Trans. Cybern., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Multim. Tools Appl., 2021
IEEE Internet Things J., 2021
Int. J. Intell. Syst., 2021
Int. J. Intell. Syst., 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Provable and Practical Security, 2021
Self-Supervised Pre-training on the Target Domain for Cross-Domain Person Re-identification.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
QOE-Based Neural Live Streaming Method with Continuous Dynamic Adaptive Video Quality Control.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming.
Proceedings of the IEEE International Conference on Acoustics, 2021
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
2020
IEEE Trans. Multim., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020
Signal Process. Image Commun., 2020
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Signal Process., 2019
Self-learning and self-adaptive resource allocation for cloud-based software services.
Concurr. Comput. Pract. Exp., 2019
Pair-Comparing Based Convolutional Neural Network for Blind Image Quality Assessment.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
2018
IEEE Trans. Serv. Comput., 2018
Verifiable outsourcing of constrained nonlinear programming by particle swarm optimization in cloud.
Soft Comput., 2018
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Soft Comput., 2017
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance.
Multim. Tools Appl., 2017
High-payload completely reversible data hiding in encrypted images by an interpolation technique.
Frontiers Inf. Technol. Electron. Eng., 2017
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.
J. Vis. Commun. Image Represent., 2017
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
2016
IEEE Trans. Multi Scale Comput. Syst., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Multim. Tools Appl., 2016
Inf. Sci., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
Multim. Tools Appl., 2015
Digit. Signal Process., 2015
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Theor. Comput. Sci., 2014
IEEE Trans. Cloud Comput., 2014
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
2013
IEEE Trans. Inf. Theory, 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
2012
IEEE Trans. Inf. Theory, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011
2008
J. Comput. Syst. Sci., 2008
2007
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
2004
Further Results for an Estimation of Upperbound of Delays for Delayed Neural Networks.
Proceedings of the Advances in Neural Networks, 2004