关注
Hang Cheng(程航)
Hang Cheng(程航)
在 fzu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015
3322015
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng
Information Sciences 494, 193-207, 2019
932019
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016, 1-9, 2016
782016
Encrypted JPEG image retrieval using block-wise feature comparison
H Cheng, X Zhang, J Yu, Y Zhang
Journal of Visual Communication and Image Representation 40, 111-117, 2016
642016
Huffman-code based retrieval for encrypted JPEG images
H Liang, X Zhang, H Cheng
Journal of Visual Communication and Image Representation 61, 149-156, 2019
352019
Model Poisoning Attack in Differential Privacy-Based Federated Learning
M Yang, H Cheng*, F Chen, X Liu, M Wang, X Li
Information Sciences 630, 158-172, 2023
342023
AC-coefficient histogram-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu
Multimedia Tools and Applications 75, 13791-13803, 2016
342016
Person re-identification over encrypted outsourced surveillance videos
H Cheng, H Wang, X Liu, Y Fang, M Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1456-1473, 2019
332019
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
332016
Histogram-based retrieval for encrypted JPEG images
X Zhang, H Cheng
2014 IEEE China Summit & International Conference on Signal and Information …, 2014
302014
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
192016
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment
H Cheng, X Liu, H Wang, Y Fang, M Wang, X Zhao
IEEE Transactions on Cloud Computing 10 (2), 1413-1427, 2020
182020
Secure and efficient image retrieval over encrypted cloud data
H Liang, X Zhang, H Cheng, Q Wei
Security and Communication Networks 2018 (1), 7915393, 2018
142018
Privacy-preserving image watermark embedding method based on edge computing
H Cheng, Q Huang, F Chen, M Wang, W Yan
IEEE Access 10, 18570-18582, 2022
112022
Toward privacy-preserving JPEG image retrieval
H Cheng, J Wang, M Wang, S Zhong
Journal of Electronic Imaging 26 (4), 043022-043022, 2017
102017
Secure image retrieval with multiple keys
H Liang, X Zhang, Q Wei, H Cheng
Journal of Electronic Imaging 27 (2), 023032-023032, 2018
62018
Parallel Implementation of Fractal Image Compression in Web Service Environment
Y Fang, H Cheng, M Wang
2011 10th International Symposium on Distributed Computing and Applications …, 2011
62011
Lightweight Privacy-Preserving Feature Extraction for EEG Signals under Edge Computing
N Yan, H Cheng*, X Liu, F Chen, M Wang
IEEE Internet of Things Journal, 2023
42023
OptionNet: A multiscale residual deep learning model with confidence interval to predict option price
L Lin, M Wang, H Cheng, R Liu, F Chen
The Journal of Finance and Data Science 9, 100105, 2023
32023
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models
H Cheng, X Li, H Wang, X Zhang, X Liu, M Wang, F Li
IEEE Transactions on Circuits and Systems for Video Technology 34 (1), 97-109, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20