关注
Zhihua Xia
Zhihua Xia
在 jnu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Z Xia, X Wang, X Sun, Q Wang
Parallel and Distributed Systems, IEEE Transactions on 27 (2), 340-352, 2016
14182016
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (11), 2594-2608, 2016
7822016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
4352016
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
3322014
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
Z Xia, NN Xiong, AV Vasilakos, X Sun
Information Sciences 387, 195-204, 2017
2492017
Towards privacy-preserving content-based image retrieval in cloud computing
Z Xia, Y Zhu, X Sun, Z Qin, K Ren
IEEE Transactions on Cloud Computing 6 (1), 276-286, 2018
2282018
A survey on deepfake video detection
P Yu, Z Xia, J Fei, Y Lu
Iet Biometrics 10 (6), 607-624, 2021
2002021
Coverless image steganography based on SIFT and BOF
C Yuan, Z Xia, X Sun
網際網路技術學刊 18 (2), 435-442, 2017
1732017
A copy-move forgery detection method based on CMFD-SIFT
B Yang, X Sun, H Guo, Z Xia, X Chen
Multimedia Tools and Applications 77, 837-855, 2018
1252018
A novel weber local binary descriptor for fingerprint liveness detection
Z Xia, C Yuan, R Lv, X Sun, NN Xiong, YQ Shi
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (4), 1526-1536, 2018
1132018
Avoid-df: Audio-visual joint learning for detecting deepfake
W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren
IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023
1042023
BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing
Z Xia, L Jiang, D Liu, L Lu, B Jeon
IEEE Transactions on Services Computing 15 (1), 202-214, 2019
952019
Fingerprint liveness detection using an improved CNN with image scale equalization
C Yuan, Z Xia, L Jiang, Y Cao, QMJ Wu, X Sun
IEEE Access 7, 26953-26966, 2019
952019
Improving generalization by commonality learning in face forgery detection
P Yu, J Fei, Z Xia, Z Zhou, J Weng
IEEE Transactions on Information Forensics and Security 17, 547-558, 2022
902022
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking
Z Xia, Y Zhu, X Sun, L Chen
Journal of Cloud Computing 3, 1-11, 2014
842014
Secure image LBP feature extraction in cloud-based smart campus
Z Xia, X Ma, Z Shen, X Sun, NN Xiong, B Jeon
IEEE Access 6, 30392-30401, 2018
752018
Reversible data hiding with automatic contrast enhancement for medical images
G Gao, S Tong, Z Xia, B Wu, L Xu, Z Zhao
Signal Processing 178, 107817, 2021
702021
Deep residual network with adaptive learning framework for fingerprint liveness detection
C Yuan, Z Xia, X Sun, QMJ Wu
IEEE Transactions on Cognitive and Developmental Systems 12 (3), 461-473, 2019
702019
Learning second order local anomaly for general face forgery detection
J Fei, Y Dai, P Yu, T Shen, Z Xia, J Weng
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
692022
Fingerprint liveness detection using gradient-based texture features
Z Xia, R Lv, Y Zhu, P Ji, H Sun, YQ Shi
Signal, Image and Video Processing 11 (2), 381–388, 2017
692017
系统目前无法执行此操作,请稍后再试。
文章 1–20