Follow
Xingming Sun
Title
Cited by
Cited by
Year
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Z Xia, X Wang, X Sun, Q Wang
IEEE transactions on parallel and distributed systems 27 (2), 340-352, 2015
12422015
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE transactions on information forensics and security 10 (3), 507-518, 2014
8832014
Enabling personalized search over encrypted outsourced data with efficiency improvement
Z Fu, K Ren, J Shu, X Sun, F Huang
IEEE transactions on parallel and distributed systems 27 (9), 2546-2559, 2015
7852015
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Z Fu, X Sun, Q Liu, L Zhou, J Shu
IEICE Transactions on Communications 98 (1), 190-200, 2015
7492015
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016
6792016
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Z Fu, X Wu, C Guan, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (12), 2706-2716, 2016
5262016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
4132016
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
3632016
Structural minimax probability machine
B Gu, X Sun, VS Sheng
IEEE Transactions on Neural Networks and Learning Systems 28 (7), 1646-1656, 2016
3532016
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
3202014
Color image analysis by quaternion-type moments
B Chen, H Shu, G Coatrieux, G Chen, X Sun, JL Coatrieux
Journal of mathematical imaging and vision 51 (1), 124-144, 2015
2742015
Fingerprint liveness detection based on multi-scale LPQ and PCA
C Yuan, X Sun, R Lv
China Communications 13 (7), 60-65, 2016
2412016
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
2362018
Efficient algorithm for k-barrier coverage based on integer linear programming
Y Zhang, X Sun, B Wang
China Communications 13 (7), 16-23, 2016
2332016
Fast motion estimation based on content property for low-complexity H. 265/HEVC encoder
Z Pan, J Lei, Y Zhang, X Sun, S Kwong
IEEE Transactions on Broadcasting 62 (3), 675-684, 2016
2252016
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
1962017
Enabling semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, X Sun, AV Vasilakos, CN Yang
IEEE Transactions on Services Computing 12 (5), 813-823, 2016
1782016
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
Z Xia, NN Xiong, AV Vasilakos, X Sun
Information Sciences 387, 195-204, 2017
1732017
Towards privacy-preserving content-based image retrieval in cloud computing
Z Xia, Y Zhu, X Sun, Z Qin, K Ren
IEEE Transactions on Cloud Computing 6 (1), 276-286, 2015
1732015
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query
Z Fu, X Sun, N Linge, L Zhou
IEEE Transactions on Consumer Electronics 60 (1), 164-172, 2014
1572014
The system can't perform the operation now. Try again later.
Articles 1–20