关注
Hang Cheng(程航)
Hang Cheng(程航)
在 fzu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1622-1631, 2015
3242015
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng
Information Sciences 494, 193-207, 2019
852019
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016, 1-9, 2016
742016
Encrypted JPEG image retrieval using block-wise feature comparison
H Cheng, X Zhang, J Yu, Y Zhang
Journal of Visual Communication and Image Representation 40, 111-117, 2016
572016
AC-coefficient histogram-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu
Multimedia Tools and Applications 75, 13791-13803, 2016
322016
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
312016
Huffman-code based retrieval for encrypted JPEG images
H Liang, X Zhang, H Cheng
Journal of Visual Communication and Image Representation 61, 149-156, 2019
292019
Histogram-based retrieval for encrypted JPEG images
X Zhang, H Cheng
2014 IEEE China Summit & International Conference on Signal and Information …, 2014
292014
Person re-identification over encrypted outsourced surveillance videos
H Cheng, H Wang, X Liu, Y Fang, M Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1456-1473, 2019
272019
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
182016
Secure and efficient image retrieval over encrypted cloud data
H Liang, X Zhang, H Cheng, Q Wei
Security and Communication Networks 2018, 2018
122018
Model Poisoning Attack in Differential Privacy-Based Federated Learning
M Yang, H Cheng*, F Chen, X Liu, M Wang, X Li
Information Sciences 630, 158-172, 2023
112023
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment
H Cheng, X Liu, H Wang, Y Fang, M Wang, X Zhao
IEEE Transactions on Cloud Computing 10 (2), 1413-1427, 2020
102020
Privacy-preserving image watermark embedding method based on edge computing
H Cheng, Q Huang, F Chen, M Wang, W Yan
IEEE Access 10, 18570-18582, 2022
92022
Toward privacy-preserving JPEG image retrieval
H Cheng, J Wang, M Wang, S Zhong
Journal of Electronic Imaging 26 (4), 043022-043022, 2017
82017
Secure image retrieval with multiple keys
H Liang, X Zhang, Q Wei, H Cheng
Journal of Electronic Imaging 27 (2), 023032-023032, 2018
62018
Parallel Implementation of Fractal Image Compression in Web Service Environment
Y Fang, H Cheng, M Wang
2011 10th International Symposium on Distributed Computing and Applications …, 2011
62011
基于图像块分组的加密域可逆信息隐藏
程航, 王子驰, 张新鹏
北京工业大学学报 42 (5), 722-728, 2016
32016
DP-Face: privacy-preserving face recognition using siamese network
N Yan, H Cheng, M Wang, Q Huang, F Chen
2021 20th International Symposium on Distributed Computing and Applications …, 2021
22021
Semantic segmentation guided feature point classification and seam fusion for image stitching
H Huang, F Chen, H Cheng, L Li, M Wang
Journal of Algorithms & Computational Technology 15, 17483026211065399, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20