Zhihua Xia
Orcid: 0000-0001-6860-647X
According to our database1,
Zhihua Xia
authored at least 102 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Circuits Syst. Video Technol., September, 2024
A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
ACM Trans. Intell. Syst. Technol., February, 2024
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.
IEEE Trans. Computers, February, 2024
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Engineering Management, 2024
Pattern Recognit., 2024
Neural Networks, 2024
Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack.
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Int. J. Auton. Adapt. Commun. Syst., 2024
SNGPLDP: Social network graph generation based on personalised local differential privacy.
Int. J. Auton. Adapt. Commun. Syst., 2024
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network.
CoRR, 2024
CoRR, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
Digit. Signal Process., November, 2023
Multim. Tools Appl., October, 2023
Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks.
IEEE Trans. Green Commun. Netw., September, 2023
Investigating prosodic entrainment from global conversations to local turns and tones in Mandarin conversations.
Speech Commun., September, 2023
Digit. Signal Process., May, 2023
A screen-shooting resilient document image watermarking scheme using deep neural network.
IET Image Process., February, 2023
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing.
ACM Trans. Multim. Comput. Commun. Appl., January, 2023
An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment.
IEEE Trans. Netw. Sci. Eng., 2023
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction.
IEEE Trans. Image Process., 2023
IEEE Trans. Inf. Forensics Secur., 2023
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding.
IEEE Trans. Cloud Comput., 2023
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023
IEEE Internet Things J., 2023
Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification.
Comput. Secur., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE J. Sel. Top. Signal Process., 2022
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
CoRR, 2022
A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing.
IEEE Trans. Netw. Sci. Eng., 2021
Signal Process., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing.
Adv. Comput., 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection.
IEEE Trans. Cogn. Dev. Syst., 2020
Int. J. Comput. Sci. Eng., 2020
EURASIP J. Image Video Process., 2020
CoRR, 2020
CoRR, 2020
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing.
IEEE Access, 2020
2019
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.
Multim. Tools Appl., 2019
IEEE Access, 2019
2018
IEEE Trans. Cloud Comput., 2018
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.
Secur. Commun. Networks, 2018
Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
Multim. Tools Appl., 2018
High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption.
IEEE Access, 2018
A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Signal Image Video Process., 2017
Signal Image Video Process., 2017
J. Web Eng., 2017
J. Comput. Sci. Technol., 2017
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing.
Inf. Sci., 2017
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017
Int. J. Distributed Sens. Networks, 2017
2016
IEEE Trans. Parallel Distributed Syst., 2016
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016
Multim. Tools Appl., 2016
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016
Proceedings of the 10th International Symposium on Chinese Spoken Language Processing, 2016
2015
基于关键词的加密云数据模糊搜索策略研究 (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords).
计算机科学, 2015
Proceedings of the 18th International Congress of Phonetic Sciences, 2015
2014
Secur. Commun. Networks, 2014
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
J. Cloud Comput., 2014
2013
Steganalysis of least significant bit matching based on image histogram and correlation.
J. Electronic Imaging, 2013
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2010
J. Electronic Imaging, 2010
Int. J. Comput. Appl. Technol., 2010