Minqing Zhang

Orcid: 0000-0002-7214-0569

According to our database1, Minqing Zhang authored at least 81 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VisionCLIP: An Med-AIGC based Ethical Language-Image Foundation Model for Generalizable Retina Image Analysis.
CoRR, 2024

2023
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Investigation on principles for cost assignment in motion vector-based video steganography.
J. Inf. Secur. Appl., March, 2023

Leveraging Multimodal Fusion for Enhanced Diagnosis of Multiple Retinal Diseases in Ultra-wide OCTA.
CoRR, 2023

Motion Vector-Domain Video Steganalysis Exploiting Skipped Macroblocks.
CoRR, 2023

VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence.
CoRR, 2023

CauDR: A Causality-inspired Domain Generalization Framework for Fundus-based Diabetic Retinopathy Grading.
CoRR, 2023

A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors.
CoRR, 2023

The Realizations of Steganography in Encrypted Domain.
CoRR, 2023

Rectifying Noisy Labels with Sequential Prior: Multi-scale Temporal Feature Affinity Learning for Robust Video Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Different Embedding Frameworks of Reversible Information Hiding in Encrypted Domain.
Proceedings of the Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA 2023), 2023

Motion Vector Domain Video Steganography Maintaining the Statistical Characteristics of Skipped Macroblocks.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022

Image steganalysis based on attention augmented convolution.
Multim. Tools Appl., 2022

Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022

Investigation on Principles for Cost Assignment in Motion Vector-based Video Steganography.
CoRR, 2022

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism.
CoRR, 2022

2021
An Automatic Classification Method of Sports Teaching Video Using Support Vector Machine.
Sci. Program., 2021

Lightweight end-to-end image steganalysis based on convolutional neural network.
J. Electronic Imaging, 2021

Robust image steganography framework based on generative adversarial network.
J. Electronic Imaging, 2021

2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020

Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU.
IEEE Access, 2020

Recent Advances of Image Steganography With Generative Adversarial Networks.
IEEE Access, 2020

Characterizing Label Errors: Confident Learning for Noisy-Labeled Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020

2019
Generative steganography with Kerckhoffs' principle.
Multim. Tools Appl., 2019

High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multim. Tools Appl., 2019

Reversible data hiding in JPEG images based on zero coefficients and distortion cost function.
Multim. Tools Appl., 2019

High-fidelity reversible data hiding using dynamic prediction and expansion.
J. Electronic Imaging, 2019

A high security and efficiency protection of confidentiality and integrity for off-chip memory.
J. Ambient Intell. Humaniz. Comput., 2019

Recent Advances of Image Steganography with Generative Adversarial Networks.
CoRR, 2019

Generative Steganography by Sampling.
IEEE Access, 2019

Multi-Task Convolutional Neural Network for Joint Bone Age Assessment and Ossification Center Detection from Hand Radiograph.
Proceedings of the Machine Learning in Medical Imaging - 10th International Workshop, 2019

Dynamic Spectral Graph Convolution Networks with Assistant Task Training for Early MCI Diagnosis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Regression-Based Line Detection Network for Delineation of Largely Deformed Brain Midline.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Novel Iterative Attention Focusing Strategy for Joint Pathology Localization and Prediction of MCI Progression.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018

A multilevel reversible data hiding scheme in encrypted domain based on LWE.
J. Vis. Commun. Image Represent., 2018

Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion.
Int. J. Mob. Comput. Multim. Commun., 2018

Certificateless multi-signcryption scheme in standard model.
Int. J. Grid Util. Comput., 2018

Generative Steganography by Sampling.
CoRR, 2018

The Reincarnation of Grille Cipher.
CoRR, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
CoRR, 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurr. Comput. Pract. Exp., 2018

Steganography Security: Principle and Practice.
IEEE Access, 2018

Generative Steganography Based on GANs.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

High-Fidelity Reversible Data Hiding Algorithm Based on SVD.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
A game-theoretic method for designing distortion function in spatial steganography.
Multim. Tools Appl., 2017

Coverless Information Hiding Based on Generative adversarial networks.
CoRR, 2017

Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks.
CoRR, 2017

Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement.
Proceedings of the Advances in Internetworking, 2017

Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion.
Proceedings of the Advances in Internetworking, 2017

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017

Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intell. Humaniz. Comput., 2016

A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
Int. J. Technol. Hum. Interact., 2016

Separable Multiple Bits Reversible Data Hiding in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015

A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Video Steganography Algorithm Based on Trailing Coefficients.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013

An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Comput. Math. Appl., 2013

Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Provably-Secure Certificateless Proxy Re-signature Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
Fundam. Informaticae, 2011

DMML: A Design Thinking Process Modeling Language.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Proxy Re-encryption Scheme from IBE to CBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

A New Self-Updating Hash Chain Structure Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Audio Digital Signature Algorithm with Tamper Detection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Approach on Aspect-Oriented Software Reverse Engineering at Requirements Level.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Research on Modeling Traversing Features in Concurrent Software System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A New Multi-class SVM Algorithm Based on One-Class SVM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007


  Loading...