Zhangjie Fu
Orcid: 0000-0002-4363-2521
According to our database1,
Zhangjie Fu
authored at least 105 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems.
IEEE Trans. Mob. Comput., December, 2024
An Iterative Two-Stage Probability Adjustment Strategy With Progressive Incremental Searching for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., October, 2024
Robust Mixed-Rate Region-of-Interest-Aware Video Compressive Sensing for Transmission Line Surveillance Video.
Inf., September, 2024
GAN-based image steganography by exploiting transform domain knowledge with deep networks.
Multim. Syst., August, 2024
Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network.
IEEE Trans. Cogn. Dev. Syst., April, 2024
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE ACM Trans. Audio Speech Lang. Process., 2024
Adversarial Embedding Steganography via Progressive Probability Optimizing and Discarded Stego Recycling.
IEEE Signal Process. Lett., 2024
Knowl. Based Syst., 2024
Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack.
Knowl. Based Syst., 2024
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks.
CoRR, 2024
2023
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
CurveFormer: 3D Lane Detection by Curve Propagation with Curve Queries and Attention.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis.
IEEE Signal Process. Lett., 2022
A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system.
Signal Process., 2022
CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis.
J. Vis. Commun. Image Represent., 2022
Frontiers Comput. Sci., 2022
2021
Future Gener. Comput. Syst., 2021
Appl. Intell., 2021
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
2020
A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems.
IEEE Trans. Wirel. Commun., 2020
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020
Mob. Networks Appl., 2020
Int. J. Comput. Sci. Eng., 2020
EURASIP J. Image Video Process., 2020
An efficient iterative graph data processing framework based on bulk synchronous parallel model.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Mob. Comput., 2019
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU.
Int. J. Parallel Program., 2019
Int. J. High Perform. Comput. Netw., 2019
Int. J. Comput. Sci. Eng., 2019
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019
IEEE Access, 2019
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Energy Management Mode of the Photovoltaic Power Station with Energy Storage Based on the Photovoltaic Power Prediction.
Proceedings of the 6th International Conference on Systems and Informatics, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Secur. Commun. Networks, 2018
Noise-level estimation based detection of motion-compensated frame interpolation in video sequences.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Netw. Comput. Appl., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
2017
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
Signal Process. Image Commun., 2017
Multim. Tools Appl., 2017
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Vis. Commun. Image Represent., 2017
Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields.
J. Comb. Optim., 2017
KSII Trans. Internet Inf. Syst., 2017
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
KSII Trans. Internet Inf. Syst., 2017
Future Gener. Comput. Syst., 2017
Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing.
Concurr. Comput. Pract. Exp., 2017
Ad Hoc Networks, 2017
2016
Wirel. Pers. Commun., 2016
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016
Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electr. Comput. Eng., 2016
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing.
IEEE Access, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
J. Commun. Networks, 2015
Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Trans. Commun., 2015
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
J. Comput. Inf. Technol., 2015
An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015
VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electron., 2014
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electron., 2014
A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
Secur. Commun. Networks, 2012
2011