Xingming Sun
Title
Cited by
Cited by
Year
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Z Xia, X Wang, X Sun, Q Wang
IEEE transactions on parallel and distributed systems 27 (2), 340-352, 2015
10132015
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE Transactions on Information Forensics and Security 10 (3), 507-518, 2014
7062014
Enabling personalized search over encrypted outsourced data with efficiency improvement
Z Fu, K Ren, J Shu, X Sun, F Huang
IEEE transactions on parallel and distributed systems 27 (9), 2546-2559, 2015
6812015
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Z Fu, X Sun, Q Liu, L Zhou, J Shu
IEICE Transactions on Communications 98 (1), 190-200, 2015
6762015
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016
4982016
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Z Fu, X Wu, C Guan, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (12), 2706-2716, 2016
3972016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
3872016
Structural minimax probability machine
B Gu, X Sun, VS Sheng
IEEE Transactions on Neural Networks and Learning Systems 28 (7), 1646-1656, 2016
3342016
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
3162016
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
3062014
Color image analysis by quaternion-type moments
B Chen, H Shu, G Coatrieux, G Chen, X Sun, JL Coatrieux
Journal of mathematical imaging and vision 51 (1), 124-144, 2015
2272015
Efficient algorithm for k-barrier coverage based on integer linear programming
Y Zhang, X Sun, B Wang
China Communications 13 (7), 16-23, 2016
2112016
Fingerprint liveness detection based on multi-scale LPQ and PCA
C Yuan, X Sun, R Lv
China Communications 13 (7), 60-65, 2016
1992016
Fast motion estimation based on content property for low-complexity H. 265/HEVC encoder
Z Pan, J Lei, Y Zhang, X Sun, S Kwong
IEEE Transactions on Broadcasting 62 (3), 675-684, 2016
1922016
Enabling semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, X Sun, A Vasilakos, CN Yang
IEEE Transactions on Services Computing, 2016
1542016
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future Generation Computer Systems 78, 956-963, 2018
1422018
Effective and efficient image copy detection with resistance to arbitrary rotation
Z Zhou, CN Yang, B Chen, X Sun, Q Liu, J QM
IEICE Transactions on information and systems 99 (6), 1531-1540, 2016
1182016
Towards efficient content-aware search over encrypted outsourced data in cloud
Z Fu, X Sun, S Ji, G Xie
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
1172016
A contrast-sensitive reversible visible image watermarking technique
Y Yang, X Sun, H Yang, CT Li, R Xiao
IEEE Transactions on Circuits and Systems for Video Technology 19 (5), 656-667, 2009
1122009
A high-capacity image data hiding scheme using adaptive LSB substitution
H Yang, X Sun, G Sun
Radioengineering 18 (4), 509-516, 2009
1112009
The system can't perform the operation now. Try again later.
Articles 1–20