Minqing Zhang

According to our database1, Minqing Zhang authored at least 43 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Generative steganography with Kerckhoffs' principle.
Multimedia Tools Appl., 2019

High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multimedia Tools Appl., 2019

High-fidelity reversible data hiding using dynamic prediction and expansion.
J. Electronic Imaging, 2019

A high security and efficiency protection of confidentiality and integrity for off-chip memory.
J. Ambient Intelligence and Humanized Computing, 2019

2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multimedia Tools Appl., 2018

A multilevel reversible data hiding scheme in encrypted domain based on LWE.
J. Visual Communication and Image Representation, 2018

Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion.
IJMCMC, 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurrency and Computation: Practice and Experience, 2018

Steganography Security: Principle and Practice.
IEEE Access, 2018

Generative Steganography Based on GANs.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

High-Fidelity Reversible Data Hiding Algorithm Based on SVD.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
A game-theoretic method for designing distortion function in spatial steganography.
Multimedia Tools Appl., 2017

Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement.
Proceedings of the Advances in Internetworking, 2017

Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion.
Proceedings of the Advances in Internetworking, 2017

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017

Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intelligence and Humanized Computing, 2016

A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
IJTHI, 2016

Separable Multiple Bits Reversible Data Hiding in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Certificateless Multi-signcryption Scheme in Standard Model.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mobile Information Systems, 2015

A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Video Steganography Algorithm Based on Trailing Coefficients.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
JCP, 2013

An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Computers & Mathematics with Applications, 2013

Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Provably-Secure Certificateless Proxy Re-signature Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, Lith. Acad. Sci., 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
Journal of Systems and Software, 2011

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
Fundam. Inform., 2011

DMML: A Design Thinking Process Modeling Language.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Proxy Re-encryption Scheme from IBE to CBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

A New Self-Updating Hash Chain Structure Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Audio Digital Signature Algorithm with Tamper Detection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Approach on Aspect-Oriented Software Reverse Engineering at Requirements Level.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Research on Modeling Traversing Features in Concurrent Software System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A New Multi-class SVM Algorithm Based on One-Class SVM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007


  Loading...