A novel image steganography method via deep convolutional generative adversarial networks D Hu, L Wang, W Jiang, S Zheng, B Li IEEE access 6, 38303-38314, 2018 | 338 | 2018 |
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things M Li, D Hu, C Lal, M Conti, Z Zhang IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020 | 199 | 2020 |
Using randomized response for differential privacy preserving data collection. Y Wang, X Wu, D Hu EDBT/ICDT Workshops 1558, 0090-6778, 2016 | 199 | 2016 |
Coverless information hiding based on robust image hashing S Zheng, L Wang, B Ling, D Hu Intelligent Computing Methodologies: 13th International Conference, ICIC …, 2017 | 158 | 2017 |
LEChain: A blockchain-based lawful evidence management scheme for digital forensics M Li, C Lal, M Conti, D Hu Future Generation Computer Systems 115, 406-420, 2021 | 134 | 2021 |
A new robust approach for reversible database watermarking with distortion control D Hu, D Zhao, S Zheng IEEE Transactions on Knowledge and Data Engineering 31 (6), 1024-1037, 2018 | 77 | 2018 |
A blockchain-based trading system for big data D Hu, Y Li, L Pan, M Li, S Zheng Computer Networks 191, 107994, 2021 | 67 | 2021 |
Pedestrian detection based on fast R-CNN and batch normalization ZQ Zhao, H Bian, D Hu, W Cheng, H Glotin Intelligent Computing Theories and Application: 13th International …, 2017 | 60 | 2017 |
Anonymizing classification data using rough set theory M Ye, X Wu, X Hu, D Hu Knowledge-Based Systems 43, 82-94, 2013 | 58 | 2013 |
Eunomia: Anonymous and secure vehicular digital forensics based on blockchain M Li, Y Chen, C Lal, M Conti, M Alazab, D Hu IEEE Transactions on Dependable and Secure Computing 20 (1), 225-241, 2021 | 51 | 2021 |
A blockchain-based trading platform for big data S Zheng, L Pan, D Hu, M Li, Y Fan IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 49 | 2020 |
Lossless data hiding algorithm for encrypted images with high capacity S Zheng, D Li, D Hu, D Ye, L Wang, J Wang Multimedia Tools and Applications 75, 13765-13778, 2016 | 45 | 2016 |
An improved steganography without embedding based on attention GAN C Yu, D Hu, S Zheng, W Jiang, M Li, Z Zhao Peer-to-Peer Networking and Applications 14 (3), 1446-1457, 2021 | 43 | 2021 |
Lossless data hiding based on homomorphic cryptosystem S Zheng, Y Wang, D Hu IEEE Transactions on Dependable and Secure Computing 18 (2), 692-705, 2019 | 43 | 2019 |
Privacy-preserving navigation supporting similar queries in vehicular networks M Li, Y Chen, S Zheng, D Hu, C Lal, M Conti IEEE Transactions on Dependable and Secure Computing 19 (2), 1133-1148, 2020 | 41 | 2020 |
Digital image steganalysis based on visual attention and deep reinforcement learning D Hu, S Zhou, Q Shen, S Zheng, Z Zhao, Y Fan IEEE Access 7, 25924-25935, 2019 | 34 | 2019 |
A spatial image steganography method based on nonnegative matrix factorization D Hu, H Xu, Z Ma, S Zheng, B Li IEEE signal processing letters 25 (9), 1364-1368, 2018 | 24 | 2018 |
Knowledge reduction for decision tables with attribute value taxonomies M Ye, X Wu, X Hu, D Hu Knowledge-Based Systems 56, 68-78, 2014 | 24 | 2014 |
The concept drift problem in Android malware detection and its solution D Hu, Z Ma, X Zhang, P Li, D Ye, B Ling Security and Communication Networks 2017 (1), 4956386, 2017 | 23 | 2017 |
Adaptive steganalysis based on selection region and combined convolutional neural networks D Hu, Q Shen, S Zhou, X Liu, Y Fan, L Wang Security and Communication Networks 2017 (1), 2314860, 2017 | 20 | 2017 |