Donghui Hu

Orcid: 0000-0001-9517-9688

According to our database1, Donghui Hu authored at least 90 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FL2DP: Privacy-Preserving Federated Learning Via Differential Privacy for Artificial IoT.
IEEE Trans. Ind. Informatics, April, 2024

2023
An Efficient and Privacy-Preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks.
IEEE Trans. Veh. Technol., June, 2023

Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing.
ACM Trans. Database Syst., June, 2023

Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Novel Approach to Processing Very-High-Resolution Spaceborne SAR Data With Severe Spatial Dependence.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Image Steganography based on Style Transfer.
CoRR, 2022

SRRS: A blockchain fast propagation protocol based on non-Markovian process.
Comput. Networks, 2022

An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

MC Sharding: An Efficient Blockchain Sharding Based on Minimum Cut.
Proceedings of the International Conference on Big Data, IoT, and Cloud Computing, 2022

2021
Lossless Data Hiding Based on Homomorphic Cryptosystem.
IEEE Trans. Dependable Secur. Comput., 2021

oGBAC - A Group Based Access Control Framework for Information Sharing in Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2021

An improved steganography without embedding based on attention GAN.
Peer-to-Peer Netw. Appl., 2021

Three-stage Stackelberg game based edge computing resource management for mobile blockchain.
Peer-to-Peer Netw. Appl., 2021

LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021

A blockchain-based trading system for big data.
Comput. Networks, 2021

Lossless Database Watermarking Based on Order-preserving Encryption.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Airborne InSAR Interferometric Phase Analysis, Unwrapping Method, and Fast Implementation in Low Coherence Areas.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

A steganographic method based on gain quantization for iLBC speech streams.
Multim. Syst., 2020

A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020

Social- and Content-Aware Prediction for Video Content Delivery.
IEEE Access, 2020

A Blockchain-Based Trading Platform for Big Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch.
Proceedings of the Intelligent Computing Theories and Application, 2020

Latency-Aware Data Placements for Operational Cost Minimization of Distributed Data Centers.
Proceedings of the Database Systems for Advanced Applications, 2020

A New Steganography Without Embedding Based on Adversarial Training.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

Stackelberg Game Based Edge Computing Resource Management for Mobile Blockchain.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
A New Robust Approach for Reversible Database Watermarking with Distortion Control.
IEEE Trans. Knowl. Data Eng., 2019

Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multim. Tools Appl., 2019

Intelligent digital image firewall system for filtering privacy or sensitive images.
Cogn. Syst. Res., 2019

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning.
IEEE Access, 2019

New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Interferometric Phase Characteristics Analysis and Unwrapping Method of Airborne Insar in Low Coherence Areas.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
On the Processing of Very High Resolution Spaceborne SAR Data: A Chirp-Modulated Back Projection Approach.
IEEE Trans. Geosci. Remote. Sens., 2018

A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization.
IEEE Signal Process. Lett., 2018

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.
Multim. Tools Appl., 2018

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks.
IEEE Access, 2018

2017
Unambiguous Imaging of Static Scenes and Moving Targets with the First Chinese Dual-Channel Spaceborne SAR Sensor.
Sensors, 2017

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks.
Secur. Commun. Networks, 2017

The Concept Drift Problem in Android Malware Detection and Its Solution.
Secur. Commun. Networks, 2017

An ML-Based Radial Velocity Estimation Algorithm for Moving Targets in Spaceborne High-Resolution and Wide-Swath SAR Systems.
Remote. Sens., 2017

Applying chirp-modulated back-projection to very high resolution spaceborne sliding spotlight SAR data processing.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Coverless Information Hiding Based on Robust Image Hashing.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Pedestrian Detection Based on Fast R-CNN and Batch Normalization.
Proceedings of the Intelligent Computing Theories and Application, 2017

Image Firewall for Filtering Privacy or Sensitive Image Content Based on Joint Sparse Representation.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Lossless data hiding algorithm for encrypted images with high capacity.
Multim. Tools Appl., 2016

Estimation Accuracy and Cramér-Rao Lower Bounds for Errors in Multichannel HRWS SAR Systems.
IEEE Geosci. Remote. Sens. Lett., 2016

On digital image trustworthiness.
Appl. Soft Comput., 2016

Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Doppler walk rectification based on KWT in passive radar.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Using Randomized Response for Differential Privacy Preserving Data Collection.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

A Novel Android Malware Detection Method Based on Markov Blanket.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Framework of Privacy Decision Recommendation for Image Sharing in Online Social Networks.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Precise Focusing of Airborne SAR Data With Wide Apertures Large Trajectory Deviations: A Chirp Modulated Back-Projection Approach.
IEEE Trans. Geosci. Remote. Sens., 2015

Nonlocal SAR Interferometric Phase Filtering Through Higher Order Singular Value Decomposition.
IEEE Geosci. Remote. Sens. Lett., 2015

Medium-Earth-Orbit SAR Focusing Using Range Doppler Algorithm With Integrated Two-Step Azimuth Perturbation.
IEEE Geosci. Remote. Sens. Lett., 2015

Strong Echo Cancellation Based on Adaptive Block Notch Filter in Passive Radar.
IEEE Geosci. Remote. Sens. Lett., 2015

Security and privacy protocols for perceptual image hashing.
Int. J. Sens. Networks, 2015

A Novel Processing Scheme of Dynamic Programming Based Track-Before-Detect in Passive Bistatic Radar.
IEICE Trans. Commun., 2015

Study on effect factors of multisquint estimation of time-varying baseline errors in repeat-pass airborne SAR.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

2014
Knowledge reduction for decision tables with attribute value taxonomies.
Knowl. Based Syst., 2014

An extended processing scheme for coherent integration and parameter estimation based on matched filtering in passive radar.
J. Zhejiang Univ. Sci. C, 2014

Green latency-aware data deployment in data centers: balancing latency, energy in networks and servers.
Proceedings of the 2014 ACM SIGCOMM workshop on Distributed cloud computing, 2014

Topography- and aperture-dependent motion compensation for airborne SAR: A back projection approach.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

DEM reconstruction of mountainous area from two anti-parallel aspects of airborne InSAR data.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

2013
InSAR Phase Noise Reduction Based on Empirical Mode Decomposition.
IEEE Geosci. Remote. Sens. Lett., 2013

Anonymizing classification data using rough set theory.
Knowl. Based Syst., 2013

Multi-level rough set reduction for decision rule mining.
Appl. Intell., 2013

Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Universal Digital Image Steganalysis Method Based on Sparse Representation.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Secure Architecture and Protocols for Robust Perceptual Hashing.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A Novel Motion Parameter Estimation Algorithm of Fast Moving Targets via Single-Antenna Airborne SAR System.
IEEE Geosci. Remote. Sens. Lett., 2012

An imaging algorithm based on keystone transform for one-stationary bistatic SAR of spotlight mode.
EURASIP J. Adv. Signal Process., 2012

A method of airborne InSAR DEM reconstruction in layover areas.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Medium-Earth-orbit SAR imaging based on keystone transform and azimuth perturbation.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Improvement of a Flow Classification Algorithm with Less Memory Consume.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Focusing of Medium-Earth-Orbit SAR With Advanced Nonlinear Chirp Scaling Algorithm.
IEEE Trans. Geosci. Remote. Sens., 2011

Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

2010
A Bistatic SAR Raw Data Simulator Based on Inverse omega-k Algorithm.
IEEE Trans. Geosci. Remote. Sens., 2010

2009
A New Calculation Method of NuSAR for Translational Variant Bistatic SAR.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

2008
An Improved NLCS Algorithm With Capability Analysis for One-Stationary BiSAR.
IEEE Trans. Geosci. Remote. Sens., 2008

An Omega-K Algorithm With Phase Error Compensation for Bistatic SAR of a Translational Invariant Case.
IEEE Trans. Geosci. Remote. Sens., 2008

Some Reflections on Bistatic SAR of Forward-Looking Configuration.
IEEE Geosci. Remote. Sens. Lett., 2008

Influence and Dependent Parameters of Terrain Undulation to Bistatic SAR Imaging.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

A New Authentication Scheme Based on Verifiable Secret Sharing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Detecting the MB1 with Higher-Order Statistics.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2005
Correction method for saturated SAR data to improve radiometric accuracy.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...