Lossless and reversible data hiding in encrypted images with public-key cryptography X Zhang, J Long, Z Wang, H Cheng IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015 | 332 | 2015 |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng Information Sciences 494, 193-207, 2019 | 93 | 2019 |
Markov process-based retrieval for encrypted JPEG images H Cheng, X Zhang, J Yu, F Li EURASIP Journal on Information Security 2016, 1-9, 2016 | 78 | 2016 |
Encrypted JPEG image retrieval using block-wise feature comparison H Cheng, X Zhang, J Yu, Y Zhang Journal of Visual Communication and Image Representation 40, 111-117, 2016 | 64 | 2016 |
Huffman-code based retrieval for encrypted JPEG images H Liang, X Zhang, H Cheng Journal of Visual Communication and Image Representation 61, 149-156, 2019 | 35 | 2019 |
Model Poisoning Attack in Differential Privacy-Based Federated Learning M Yang, H Cheng*, F Chen, X Liu, M Wang, X Li Information Sciences 630, 158-172, 2023 | 34 | 2023 |
AC-coefficient histogram-based retrieval for encrypted JPEG images H Cheng, X Zhang, J Yu Multimedia Tools and Applications 75, 13791-13803, 2016 | 34 | 2016 |
Person re-identification over encrypted outsourced surveillance videos H Cheng, H Wang, X Liu, Y Fang, M Wang, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (3), 1456-1473, 2019 | 33 | 2019 |
Spatial steganalysis using contrast of residuals J Yu, F Li, H Cheng, X Zhang IEEE Signal Processing Letters 23 (7), 989-992, 2016 | 33 | 2016 |
Histogram-based retrieval for encrypted JPEG images X Zhang, H Cheng 2014 IEEE China Summit & International Conference on Signal and Information …, 2014 | 30 | 2014 |
Digital image steganalysis based on local textural features and double dimensionality reduction F Li, X Zhang, H Cheng, J Yu Security and Communication Networks 9 (8), 729-736, 2016 | 19 | 2016 |
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment H Cheng, X Liu, H Wang, Y Fang, M Wang, X Zhao IEEE Transactions on Cloud Computing 10 (2), 1413-1427, 2020 | 18 | 2020 |
Secure and efficient image retrieval over encrypted cloud data H Liang, X Zhang, H Cheng, Q Wei Security and Communication Networks 2018 (1), 7915393, 2018 | 14 | 2018 |
Privacy-preserving image watermark embedding method based on edge computing H Cheng, Q Huang, F Chen, M Wang, W Yan IEEE Access 10, 18570-18582, 2022 | 11 | 2022 |
Toward privacy-preserving JPEG image retrieval H Cheng, J Wang, M Wang, S Zhong Journal of Electronic Imaging 26 (4), 043022-043022, 2017 | 10 | 2017 |
Secure image retrieval with multiple keys H Liang, X Zhang, Q Wei, H Cheng Journal of Electronic Imaging 27 (2), 023032-023032, 2018 | 6 | 2018 |
Parallel Implementation of Fractal Image Compression in Web Service Environment Y Fang, H Cheng, M Wang 2011 10th International Symposium on Distributed Computing and Applications …, 2011 | 6 | 2011 |
Lightweight Privacy-Preserving Feature Extraction for EEG Signals under Edge Computing N Yan, H Cheng*, X Liu, F Chen, M Wang IEEE Internet of Things Journal, 2023 | 4 | 2023 |
OptionNet: A multiscale residual deep learning model with confidence interval to predict option price L Lin, M Wang, H Cheng, R Liu, F Chen The Journal of Finance and Data Science 9, 100105, 2023 | 3 | 2023 |
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models H Cheng, X Li, H Wang, X Zhang, X Liu, M Wang, F Li IEEE Transactions on Circuits and Systems for Video Technology 34 (1), 97-109, 2023 | 3 | 2023 |