Xingming Sun
Cited by
Cited by
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Z Xia, X Wang, X Sun, Q Wang
IEEE transactions on parallel and distributed systems 27 (2), 340-352, 2015
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE transactions on information forensics and security 10 (3), 507-518, 2014
Enabling personalized search over encrypted outsourced data with efficiency improvement
Z Fu, K Ren, J Shu, X Sun, F Huang
IEEE transactions on parallel and distributed systems 27 (9), 2546-2559, 2015
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Z Fu, X Sun, Q Liu, L Zhou, J Shu
IEICE Transactions on Communications 98 (1), 190-200, 2015
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Z Fu, X Wu, C Guan, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (12), 2706-2716, 2016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
Structural minimax probability machine
B Gu, X Sun, VS Sheng
IEEE Transactions on Neural Networks and Learning Systems 28 (7), 1646-1656, 2016
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
Color image analysis by quaternion-type moments
B Chen, H Shu, G Coatrieux, G Chen, X Sun, JL Coatrieux
Journal of mathematical imaging and vision 51 (1), 124-144, 2015
Efficient algorithm for k-barrier coverage based on integer linear programming
Y Zhang, X Sun, B Wang
China Communications 13 (7), 16-23, 2016
Fingerprint liveness detection based on multi-scale LPQ and PCA
C Yuan, X Sun, R Lv
China Communications 13 (7), 60-65, 2016
Reversible data hiding based on multilevel histogram modification and sequential recovery
Z Zhao, H Luo, ZM Lu, JS Pan
AEU-International Journal of Electronics and Communications 65 (10), 814-826, 2011
Fast motion estimation based on content property for low-complexity H. 265/HEVC encoder
Z Pan, J Lei, Y Zhang, X Sun, S Kwong
IEEE Transactions on Broadcasting 62 (3), 675-684, 2016
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
Textual and visual content-based anti-phishing: a Bayesian approach
H Zhang, G Liu, TWS Chow, W Liu
IEEE transactions on neural networks 22 (10), 1532-1546, 2011
Enabling semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, X Sun, AV Vasilakos, CN Yang
IEEE Transactions on Services Computing 12 (5), 813-823, 2016
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
The system can't perform the operation now. Try again later.
Articles 1–20