Zhihua Xia

Orcid: 0000-0001-6860-647X

According to our database1, Zhihua Xia authored at least 102 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Image Manipulation Detection With Cascade Hierarchical Graph Representation.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
ACM Trans. Intell. Syst. Technol., February, 2024

STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.
IEEE Trans. Computers, February, 2024

Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024

Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Client-Side Embedding of Screen-Shooting Resilient Image Watermarking.
IEEE Trans. Inf. Forensics Secur., 2024

Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs.
IEEE Trans. Inf. Forensics Secur., 2024

Reliable and Sustainable Product Evaluation Management System Based on Blockchain.
IEEE Trans. Engineering Management, 2024

Robust image hiding network with Frequency and Spatial Attentions.
Pattern Recognit., 2024

Face Omron Ring: Proactive defense against face forgery with identity awareness.
Neural Networks, 2024

Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack.
Knowl. Based Syst., 2024

Auto-focus tracing: Image manipulation detection with artifact graph contrastive.
Knowl. Based Syst., 2024

Moiré pattern generation-based image steganography.
J. Inf. Secur. Appl., 2024

Conditional image hiding network based on style transfer.
Inf. Sci., 2024

Privacy-preserving image retrieval based on additive secret sharing.
Int. J. Auton. Adapt. Commun. Syst., 2024

SNGPLDP: Social network graph generation based on personalised local differential privacy.
Int. J. Auton. Adapt. Commun. Syst., 2024

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network.
CoRR, 2024

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales.
CoRR, 2024

Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Privacy-preserving DeepFake face image detection.
Digit. Signal Process., November, 2023

A robust document image watermarking scheme using deep neural network.
Multim. Tools Appl., October, 2023

Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks.
IEEE Trans. Green Commun. Netw., September, 2023

Investigating prosodic entrainment from global conversations to local turns and tones in Mandarin conversations.
Speech Commun., September, 2023

A hue preservation lossless contrast enhancement method with RDH for color images.
Digit. Signal Process., May, 2023

A screen-shooting resilient document image watermarking scheme using deep neural network.
IET Image Process., February, 2023

RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing.
ACM Trans. Multim. Comput. Commun. Appl., January, 2023

An Efficient Task Offloading Approach Based on Multi-Objective Evolutionary Algorithm in Cloud-Edge Collaborative Environment.
IEEE Trans. Netw. Sci. Eng., 2023

Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction.
IEEE Trans. Image Process., 2023

AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
IEEE Trans. Inf. Forensics Secur., 2023

A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding.
IEEE Trans. Cloud Comput., 2023

Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023

A Data Integrity Authentication Scheme in WSNs Based on Double Watermark.
IEEE Internet Things J., 2023

Security and Privacy on Generative Data in AIGC: A Survey.
CoRR, 2023

CHEAT: A Large-scale Dataset for Detecting ChatGPT-writtEn AbsTracts.
CoRR, 2023

Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification.
Comput. Secur., 2023

Robust Retraining-free GAN Fingerprinting via Personalized Normalization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

General GAN-generated Image Detection by Data Augmentation in Fingerprint Domain.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Novel Coverless Steganography Method Based on Image Selection and StarGAN.
IEEE Trans. Netw. Sci. Eng., 2022

Improving Generalization by Commonality Learning in Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2022

FLD-SRC: Fingerprint Liveness Detection for AFIS Based on Spatial Ridges Continuity.
IEEE J. Sel. Top. Signal Process., 2022

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022

MSPPIR: Multi-Source Privacy-Preserving Image Retrieval in cloud computing.
Future Gener. Comput. Syst., 2022

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
CoRR, 2022

Deniable Steganography.
CoRR, 2022

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

A Robust Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

Supervised GAN Watermarking for Intellectual Property Protection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Attentional Local Contrastive Learning for Face Forgery Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Learning Second Order Local Anomaly for General Face Forgery Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing.
IEEE Trans. Netw. Sci. Eng., 2021

Reversible data hiding with automatic contrast enhancement for medical images.
Signal Process., 2021

PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation.
Secur. Commun. Networks, 2021

Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics.
Secur. Commun. Networks, 2021

Exposing AI-generated videos with motion magnification.
Multim. Tools Appl., 2021

A Survey on Deepfake Video Detection.
IET Biom., 2021

Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing.
Adv. Comput., 2021

2020
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection.
IEEE Trans. Syst. Man Cybern. Syst., 2020

A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection.
IEEE Trans. Cogn. Dev. Syst., 2020

Face spoof detection using feature map superposition and CNN.
Int. J. Comput. Sci. Eng., 2020

Adversarial attacks on fingerprint liveness detection.
EURASIP J. Image Video Process., 2020

Secure Computation on Additive Shares.
CoRR, 2020

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing.
CoRR, 2020

Efficient Privacy-Preserving Computation Based on Additive Secret Sharing.
CoRR, 2020

MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing.
CoRR, 2020

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing.
IEEE Access, 2020

2019
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.
Multim. Tools Appl., 2019

Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization.
IEEE Access, 2019

2018
Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion.
Secur. Commun. Networks, 2018

A copy-move forgery detection method based on CMFD-SIFT.
Multim. Tools Appl., 2018

Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
Multim. Tools Appl., 2018

High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption.
IEEE Access, 2018

A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN.
IEEE Access, 2018

Secure Image LBP Feature Extraction in Cloud-Based Smart Campus.
IEEE Access, 2018

A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing.
Proceedings of the 2018 International Conference on Computing, 2018

A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Erratum to: Fingerprint liveness detection using gradient-based texture features.
Signal Image Video Process., 2017

Fingerprint liveness detection using gradient-based texture features.
Signal Image Video Process., 2017

An Approach of Web Service Organization Using Bayesian Network Learning.
J. Web Eng., 2017

Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding.
J. Comput. Sci. Technol., 2017

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing.
Inf. Sci., 2017

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017

A vehicular ad hoc network privacy protection scheme without a trusted third party.
Int. J. Distributed Sens. Networks, 2017

2016
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Steganalysis of LSB matching using differences between nonadjacent pixels.
Multim. Tools Appl., 2016

Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016

Gender and prosodic entrainment in Mandarin conversations.
Proceedings of the 10th International Symposium on Chinese Spoken Language Processing, 2016

2015
基于关键词的加密云数据模糊搜索策略研究 (Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords).
计算机科学, 2015

Absolute and relative entrainment in Mandarin conversations.
Proceedings of the 18th International Congress of Phonetic Sciences, 2015

2014
Steganalysis of least significant bit matching using multi-order differences.
Secur. Commun. Networks, 2014

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
J. Cloud Comput., 2014

2013
Steganalysis of least significant bit matching based on image histogram and correlation.
J. Electronic Imaging, 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2010
JPEG image steganalysis using joint discrete cosine transform domain features.
J. Electronic Imaging, 2010

Watermarking-based intellectual property protection for sensor streaming data.
Int. J. Comput. Appl. Technol., 2010


  Loading...