Tiegang Gao
Orcid: 0000-0002-3964-2612
According to our database1,
Tiegang Gao
authored at least 89 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
1
6
7
6
3
8
4
4
2
4
1
6
2
2
1
2
2
3
1
1
1
4
1
1
5
3
3
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Inf. Fusion, 2025
2024
Re_useVFL: Reuse of Parameters-Based Verifiable Federated Learning With Privacy Preservation Using Gradient Sparsification.
IEEE J. Emerg. Sel. Topics Circuits Syst., December, 2024
A secure image encryption-sharing based on different diffusion intensities by hyper-chaos according to image features.
Signal Image Video Process., November, 2024
Practical and Secure Password Authentication and Key-Agreement-Scheme-Based Dual Server for IoT Devices in 5G Network.
IEEE Internet Things J., November, 2024
Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection.
Comput. J., February, 2024
Hierarchical reversible data hiding in encrypted images based on multiple linear regressions and multiple bits prediction.
Multim. Tools Appl., January, 2024
A lightweight robust image hash based on random tensors and angle features for IoT devices.
Signal Image Video Process., 2024
2023
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding.
Clust. Comput., December, 2023
A novel color image tampering detection and self-recovery based on fragile watermarking.
J. Inf. Secur. Appl., November, 2023
An efficient model for real-time wildfire detection in complex scenarios based on multi-head attention mechanism.
J. Real Time Image Process., August, 2023
Digit. Signal Process., August, 2023
Inf. Sci., April, 2023
J. Intell. Fuzzy Syst., 2023
Efficient Privacy-Preserving Federated Deep Learning for Network Intrusion of Industrial IoT.
Int. J. Intell. Syst., 2023
2022
DetectPMFL: Privacy-Preserving Momentum Federated Learning Considering Unreliable Industrial Agents.
IEEE Trans. Ind. Informatics, 2022
Neural Comput. Appl., 2022
Optimized visually meaningful image embedding strategy based on compressive sensing and 2D DWT-SVD.
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
A secure lossless recovery for medical images based on image encoding and data self-embedding.
Clust. Comput., 2022
Traceable and Privacy-preserving Blockchain System Architecture for Remanufacturing Reverse Supply Chain.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2022
An Algorithm for Terrain Recognition of Heavy Duty Diesel Vehicles Using Chinese Regulatory Standard Data.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022
2021
Neural Comput. Appl., 2021
J. Inf. Secur. Appl., 2021
Reversible Data Hiding in Encrypted Images Based on Bit-plane Rearrangement and Huffman Coding.
Proceedings of the ICIAI 2021: 2021 the 5th International Conference on Innovation in Artificial Intelligence, 2021
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
Signal Process., 2020
Multim. Tools Appl., 2020
Detection of median filtering based on ARMA model and pixel-pair histogram feature of difference image.
Multim. Tools Appl., 2020
High capacity reversible data hiding in encrypted image based on image encoding and POB.
J. Frankl. Inst., 2020
J. Inf. Secur. Appl., 2020
Robust detection of median filtering based on data-pair histogram feature and local configuration pattern.
J. Inf. Secur. Appl., 2020
A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System.
Int. J. Multim. Data Eng. Manag., 2020
Optimal Decisions for Reverse Supply Chain Considering IERs of Dual Collection Channel.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2020
Dual Watermarking for Protection of Medical Images based on Watermarking of Frequency Domain and Genetic Programming.
Proceedings of the ICIAI 2020: The 4th International Conference on Innovation in Artificial Intelligence, 2020
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
2019
Signal Process. Image Commun., 2019
Double verifiable image encryption based on chaos and reversible watermarking algorithm.
Multim. Tools Appl., 2019
Int. J. Online Biomed. Eng., 2019
Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion.
Int. J. Netw. Secur., 2019
USM Sharpening Detection Based on Grey-Level Dependence Matrix and Cumulative Sum of Histogram on Difference Image.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
2018
A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain.
Multim. Tools Appl., 2018
Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System.
Int. J. Digit. Crime Forensics, 2018
Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud.
Int. J. Digit. Crime Forensics, 2018
Int. J. Digit. Crime Forensics, 2018
An Effective Image Detection Algorithm for USM Sharpening Based on Pixel-Pair Histogram.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
2017
Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid.
Int. J. Netw. Secur., 2017
2016
Multim. Tools Appl., 2016
A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images.
Int. J. Netw. Secur., 2016
Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length.
Int. J. Digit. Crime Forensics, 2016
Int. J. Digit. Crime Forensics, 2016
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016
2015
Int. J. Digit. Crime Forensics, 2015
A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-Pair Histogram.
Proceedings of the Advances in Image and Graphics Technologies - 10th Chinese Conference, 2015
Erratum to: A Novel Image Splicing Forensic Algorithm Based on Generalized DCT Coefficient-Pair Histogram.
Proceedings of the Advances in Image and Graphics Technologies - 10th Chinese Conference, 2015
Proceedings of the IEEE International Conference on Information and Automation, 2015
Forensic Detection of Median Filtering in Digital Images Using the Coefficient-Pair Histogram of DCT Value and LBP Pattern.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
2014
A Joint Encryption and Reversible Data Hiding Scheme Based on Integer-DWT and Arnold Map Permutation.
J. Appl. Math., 2014
A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer DWT and Histogram Modification.
Int. J. Digit. Crime Forensics, 2014
Int. J. Digit. Crime Forensics, 2014
Int. J. Digit. Crime Forensics, 2014
Int. J. Digit. Crime Forensics, 2014
A Novel Medical Image Tamper Detection and Recovery Scheme using LSB Embedding and PWLCM.
Int. J. Digit. Crime Forensics, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014
2013
Digit. Signal Process., 2013
Improving the embedding efficiency of weight matrix-based steganography for grayscale images.
Comput. Electr. Eng., 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
2012
Proceedings of 2012 IEEE International Conference on Service Operations and Logistics, 2012
A novel reversible watermarking scheme based on block energy difference for medical images.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012
Robust Algorithm for Detection of Copy-Move Forgery in Digital Images Based on Ridgelet Transform.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012
Replica Pre-adjustment Strategy Based on Trend Analysis of File Popularity within Cloud Environment.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
An extended matrix encoding algorithm for steganography of high embedding efficiency.
Comput. Electr. Eng., 2011
Simulation for implementing RFID-EPC in reverse supply chain based on consumer market.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011
A copyright-protection watermark mechanism based on generalized brain-state-in-a-box neural network and error diffusion halftoning.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Proceedings of 2010 IEEE International Conference on Service Operations and Logistics, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the Sixth International Conference on Natural Computation, 2010
2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Int. J. Wavelets Multiresolution Inf. Process., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008