Sledovat
Hang Cheng(程航)
Hang Cheng(程航)
E-mailová adresa ověřena na: fzu.edu.cn - Domovská stránka
Název
Citace
Citace
Rok
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1622-1631, 2015
3322015
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng
Information Sciences 494, 193-207, 2019
982019
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016, 1-9, 2016
792016
Encrypted JPEG image retrieval using block-wise feature comparison
H Cheng, X Zhang, J Yu, Y Zhang
Journal of Visual Communication and Image Representation 40, 111-117, 2016
652016
Model Poisoning Attack in Differential Privacy-Based Federated Learning
M Yang, H Cheng*, F Chen, X Liu, M Wang, X Li
Information Sciences 630, 158-172, 2023
422023
Person re-identification over encrypted outsourced surveillance videos
H Cheng, H Wang, X Liu, Y Fang, M Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1456-1473, 2019
362019
Huffman-code based retrieval for encrypted JPEG images
H Liang, X Zhang, H Cheng
Journal of Visual Communication and Image Representation 61, 149-156, 2019
362019
AC-coefficient histogram-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu
Multimedia Tools and Applications 75, 13791-13803, 2016
332016
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
312016
Histogram-based retrieval for encrypted JPEG images
X Zhang, H Cheng
2014 IEEE China Summit & International Conference on Signal and Information …, 2014
292014
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment
H Cheng, X Liu, H Wang, Y Fang, M Wang, X Zhao
IEEE Transactions on Cloud Computing 10 (2), 1413-1427, 2020
222020
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
192016
Secure and efficient image retrieval over encrypted cloud data
H Liang, X Zhang, H Cheng, Q Wei
Security and Communication Networks 2018 (1), 7915393, 2018
142018
Privacy-preserving image watermark embedding method based on edge computing
H Cheng, Q Huang, F Chen, M Wang, W Yan
IEEE Access 10, 18570-18582, 2022
92022
Toward privacy-preserving JPEG image retrieval
H Cheng, J Wang, M Wang, S Zhong
Journal of Electronic Imaging 26 (4), 043022-043022, 2017
92017
Lossless image steganography: Regard steganography as super-resolution
T Wang, H Cheng*, X Liu, Y Xu, F Chen, M Wang, J Chen
Information Processing & Management 61 (4), 103719, 2024
52024
Semantic segmentation guided feature point classification and seam fusion for image stitching
H Huang, F Chen, H Cheng, L Li, M Wang
Journal of Algorithms & Computational Technology 15, 17483026211065399, 2021
52021
Secure image retrieval with multiple keys
H Liang, X Zhang, Q Wei, H Cheng
Journal of Electronic Imaging 27 (2), 023032-023032, 2018
52018
Parallel Implementation of Fractal Image Compression in Web Service Environment
Y Fang, H Cheng, M Wang
2011 10th International Symposium on Distributed Computing and Applications …, 2011
52011
OptionNet: A multiscale residual deep learning model with confidence interval to predict option price
L Lin, M Wang, H Cheng, R Liu, F Chen
The Journal of Finance and Data Science 9, 100105, 2023
42023
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20