Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage H Tian, Y Chen, CC Chang, H Jiang, Y Huang, Y Chen, J Liu IEEE Transactions on Services Computing 10 (5), 701 - 714, 2017 | 285 | 2017 |
Data collection from WSNs to the cloud based on mobile Fog elements T Wang, J Zeng, Y Lai, Y Cai, H Tian, Y Chen, B Wang Future Generation Computer Systems 105, 864-872, 2020 | 174 | 2020 |
Trajectory privacy preservation based on a fog structure for cloud location services T Wang, J Zeng, MZA Bhuiyan, H Tian, Y Cai, Y Chen, B Zhong IEEE Access 5, 7692-7701, 2017 | 119 | 2017 |
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing H Tian, F Nan, CC Chang, Y Huang, J Lu, Y Du Journal of Network and Computer Applications 127, 59-69, 2019 | 114 | 2019 |
Public Auditing for Shared Cloud Data with Efficient and Secure Group Management H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang Information Sciences 472, 107-125, 2019 | 82 | 2019 |
Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks T Wang, Q Wu, S Wen, Y Cai, H Tian, Y Chen, B Wang Sensors 17 (1), 139, 2017 | 74 | 2017 |
Improving security of quantization-index-modulation steganography in low bit-rate speech streams H Tian, J Liu, S Li Multimedia systems 20, 143-154, 2014 | 74 | 2014 |
An M-sequence based steganography model for voice over IP H Tian, K Zhou, H Jiang, J Liu, Y Huang, D Feng 2009 IEEE International Conference on Communications, 1-5, 2009 | 63 | 2009 |
Least-significant-digit Steganography in Low Bitrate Speech J Liu, K Zhou, H Tian The 47th IEEE International Conference on Communications, 2012 | 58 | 2012 |
A covert communication model based on least significant bits steganography in voice over IP H Tian, K Zhou, Y Huang, D Feng, J Liu 2008 The 9th International Conference for Young Computer Scientists, 647-652, 2008 | 51 | 2008 |
An adaptive steganography scheme for voice over IP H Tian, K Zhou, H Jiang, Y Huang, J Liu, D Feng 2009 IEEE International Symposium on Circuits and Systems (ISCAS), 2922-2925, 2009 | 50 | 2009 |
A survey of mechanical fault diagnosis based on audio signal analysis L Tang, H Tian, H Huang, S Shi, Q Ji Measurement, 113294, 2023 | 47 | 2023 |
Adaptive partial-matching steganography for voice over IP using triple M sequences H Tian, H Jiang, K Zhou, D Feng Computer Communications 34 (18), 2236-2247, 2011 | 43 | 2011 |
Social learning differential evolution Y Cai, J Liao, T Wang, Y Chen, H Tian Information Sciences 433, 464-509, 2018 | 42 | 2018 |
Cellular direction information based differential evolution for numerical optimization: an empirical study J Liao, Y Cai, T Wang, H Tian, Y Chen Soft Computing 20, 2801-2827, 2016 | 37 | 2016 |
Neighborhood-adaptive differential evolution for global numerical optimization Y Cai, G Sun, T Wang, H Tian, Y Chen, J Wang Applied Soft Computing 59, 659-706, 2017 | 36 | 2017 |
Fog-based evaluation approach for trustworthy communication in sensor-cloud system T Wang, Y Li, Y Chen, H Tian, Y Cai, W Jia, B Wang IEEE Communications Letters 21 (11), 2532-2535, 2017 | 35 | 2017 |
Optimized lossless data hiding in JPEG bitstream and relay transfer-based extension Y Qiu, Z Qian, H He, H Tian, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 31 (4), 1380-1394, 2020 | 33 | 2020 |
Public audit for operation behavior logs with error locating in cloud storage H Tian, Z Chen, CC Chang, Y Huang, T Wang, Z Huang, Y Cai, Y Chen Soft Computing 23, 3779-3792, 2019 | 33 | 2019 |
Public auditing of log integrity for cloud storage systems via blockchain J Wang, F Peng, H Tian, W Chen, J Lu Security and Privacy in New Computing Environments: Second EAI International …, 2019 | 33 | 2019 |