Xiaojing Ma

Orcid: 0000-0001-6363-3209

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China


According to our database1, Xiaojing Ma authored at least 24 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Towards Stricter Black-box Integrity Verification of Deep Neural Network Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video.
ACM Trans. Multim. Comput. Commun. Appl., 2022

ChartStamp: Robust Chart Embedding for Real-World Applications.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

2021
Chartem: Reviving Chart Images with Data Embedding.
IEEE Trans. Vis. Comput. Graph., 2021

Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
High Performance DDoS Attack Detection System Based on Distribution Statistics.
Proceedings of the Network and Parallel Computing, 2019

Decoding Homomorphically Encrypted Flac Audio without Decryption.
Proceedings of the IEEE International Conference on Acoustics, 2019

AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019

2018
JPEG Decompression in the Homomorphic Encryption Domain.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018

Privacy-Preserving Cloud-Based Video Surveillance with Adjustable Granularity of Privacy Protection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Comput., 2017

2016
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos.
IEEE Trans. Emerg. Top. Comput., 2016

2015
A robust reversible data hiding scheme for H.264 without distortion drift.
Neurocomputing, 2015

A new robust data hiding method for H.264/AVC without intra-frame distortion drift.
Neurocomputing, 2015

2014
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC.
Multim. Tools Appl., 2014

2013
A robust data hiding algorithm for H.264/AVC video streams.
J. Syst. Softw., 2013

2012
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift.
J. Softw., 2012

2010
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift.
IEEE Trans. Circuits Syst. Video Technol., 2010

2007
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS.
Proceedings of the International Conference on Networking, 2007


  Loading...