Tao Xiang

Orcid: 0000-0002-0022-3082

Affiliations:
  • Chongqing University, College of Computer Science, Chongqing, China


According to our database1, Tao Xiang authored at least 253 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Sparse Reduced-Rank Fully Connected Layers with Its Applications in Detection and Classification.
ACM Trans. Multim. Comput. Commun. Appl., June, 2025

LWAKA: Lightweight Anonymous Authenticated Key Agreement for VANETs.
IEEE Trans. Intell. Transp. Syst., June, 2025

An Android malware detection based on reconstructed API with TextCNN.
Int. J. Inf. Sec., June, 2025

Seamless Interaction: Dyadic Audiovisual Motion Modeling and Large-Scale Dataset.
CoRR, June, 2025

Optimization-Free Patch Attack on Stereo Depth Estimation.
CoRR, June, 2025

Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network.
CoRR, June, 2025

From Ground to Sky: Architectures, Applications, and Challenges Shaping Low-Altitude Wireless Networks.
CoRR, June, 2025

PSRAKA: Physically Secure and Robust Authenticated Key Agreement for VANETs.
IEEE Trans. Veh. Technol., May, 2025

Light as Deception: GPT-driven Natural Relighting Against Vision-Language Pre-training Models.
CoRR, May, 2025

Disrupting Vision-Language Model-Driven Navigation Services via Adversarial Object Fusion.
CoRR, May, 2025

LBRAKA: Lattice-Based Robust Authenticated Key Agreement for VANETs.
IEEE Trans. Veh. Technol., April, 2025

A Novel Sparrow Search Scheme Based on Enhanced Differential Evolution Operator.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2025

LESEP: Boosting Adversarial Transferability via Latent Encoding and Semantic Embedding Perturbations.
IEEE Trans. Circuits Syst. Video Technol., April, 2025

Secret Specification Based Personalized Privacy-Preserving Analysis in Big Data.
IEEE Trans. Big Data, April, 2025

Maintaining Privacy in Smart Grid: Utilizing the Adversarial Attack Paradigm to Counter Nonintrusive Load Monitoring Models.
IEEE Internet Things J., April, 2025

Advancing Embodied Agent Security: From Safety Benchmarks to Input Moderation.
CoRR, April, 2025

Certificateless Searchable Public Key Encryption With Trapdoor Indistinguishability for IoV.
IEEE Trans. Veh. Technol., March, 2025

LRCPA: Lattice-Based Robust and Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., March, 2025

Privacy-Preserving Federated Learning Based on Dataset Condensation.
IEEE Trans. Consumer Electron., February, 2025

Semantic Gaussian Mixture Variational Autoencoder for Sequential Recommendation.
CoRR, February, 2025

Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation.
IEEE Trans. Sustain. Comput., 2025

Blockchain Assisted Industrial Data Registration and Reconstruction Management Scheme.
IEEE Trans. Netw. Sci. Eng., 2025

Advancing Non-Intrusive Load Monitoring: Predicting Appliance-Level Power Consumption With Indirect Supervision.
IEEE Trans. Netw. Sci. Eng., 2025

Deep Face Leakage: Inverting High-Quality Faces From Gradients Using Residual Optimization.
IEEE Trans. Image Process., 2025

FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation.
IEEE Trans. Inf. Forensics Secur., 2025

Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models.
IEEE Trans. Inf. Forensics Secur., 2025

Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective.
IEEE Trans. Inf. Forensics Secur., 2025

Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks.
IEEE Trans. Inf. Forensics Secur., 2025

PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks.
IEEE Trans. Dependable Secur. Comput., 2025

LLMBD: Backdoor defense via large language model paraphrasing and data voting in NLP.
Knowl. Based Syst., 2025

Perceptual visual security index: Analyzing image content leakage for vision language models.
J. Inf. Secur. Appl., 2025

AsyCo: an asymmetric dual-task co-training model for partial-label learning.
Sci. China Inf. Sci., 2025

Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability.
Proceedings of the ACM on Web Conference 2025, 2025

Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks.
Proceedings of the ACM on Web Conference 2025, 2025

DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

DroneMA: Drone Mobility Alignment Countering AI-Based Spoofing Attacks.
Proceedings of the IEEE INFOCOM 2025, 2025

Breaking 'Chicken-Egg': Cross-city Battery Swap Demand Prediction via Knowledge-guided Diffusion.
Proceedings of the IEEE INFOCOM 2025, 2025

Endowing Visual Reprogramming with Adversarial Robustness.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

MI-DETR: An Object Detection Model with Multi-time Inquiries Mechanism.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Multiple-Instance Learning from Pairwise Comparison Bags.
ACM Trans. Intell. Syst. Technol., December, 2024

An Unbiased Risk Estimator for Partial Label Learning with Augmented Classes.
ACM Trans. Intell. Syst. Technol., December, 2024

ESB-FL: Efficient and Secure Blockchain-Based Federated Learning With Fair Payment.
IEEE Trans. Big Data, December, 2024

A Content-Aware Full-Reference Image Quality Assessment Method Using a Gram Matrix and Signal-to-Noise.
IEEE Trans. Broadcast., December, 2024

Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform.
IEEE Trans. Consumer Electron., November, 2024

Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024

Attribute-guided face adversarial example generation.
Vis. Comput., October, 2024

Representing Noisy Image Without Denoising.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024

A Privacy-Preserving Matching Service Scheme for Power Data Trading.
IEEE Internet Things J., October, 2024

Using Multi-Level Consistency Learning for Partial-to-Partial Point Cloud Registration.
IEEE Trans. Vis. Comput. Graph., August, 2024

Secure and Efficient Continuous Learning Model for Traffic Flow Prediction.
IEEE Trans. Netw. Serv. Manag., August, 2024

Third-Person View Attention Prediction in Natural Scenarios With Weak Information Dependency and Human-Scene Interaction Mechanism.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

Robust and privacy-preserving collaborative training: a comprehensive survey.
Artif. Intell. Rev., July, 2024

Online binary classification from similar and dissimilar data.
Mach. Learn., June, 2024

The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., May, 2024

Robust RGB-T Tracking via Adaptive Modality Weight Correlation Filters and Cross-modality Learning.
ACM Trans. Multim. Comput. Commun. Appl., April, 2024

A Blind Video Quality Assessment Method via Spatiotemporal Pyramid Attention.
IEEE Trans. Broadcast., March, 2024

StopGuess: A framework for public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces, March, 2024

Double Transformer Super-Resolution for Breast Cancer ADC Images.
IEEE J. Biomed. Health Informatics, February, 2024

Mitigating cross-client GANs-based attack in federated learning.
Multim. Tools Appl., January, 2024

An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024

ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids.
IEEE Trans. Serv. Comput., 2024

Low-Light Enhancement Method Based on a Retinex Model for Structure Preservation.
IEEE Trans. Multim., 2024

Video Violence Rating: A Large-Scale Public Database and A Multimodal Rating Model.
IEEE Trans. Multim., 2024

Perceptual Quality Analysis in Deep Domains Using Structure Separation and High-Order Moments.
IEEE Trans. Multim., 2024

Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024

SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024

A Two-Stage Approach for Fair Data Trading Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way.
IEEE Trans. Inf. Forensics Secur., 2024

Secure Redactable Blockchain With Dynamic Support.
IEEE Trans. Dependable Secur. Comput., 2024

Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024

DeGKM: Decentralized Group Key Management for Content Push in Integrated Networks.
IEEE Trans. Dependable Secur. Comput., 2024

AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2024

Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid.
IEEE Trans. Cloud Comput., 2024

SPGAN: Siamese projection Generative Adversarial Networks.
Knowl. Based Syst., 2024

Public cloud object storage auditing: Design, implementation, and analysis.
J. Parallel Distributed Comput., 2024

NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks.
Inf. Sci., 2024

Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems.
IACR Cryptol. ePrint Arch., 2024

Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters.
CoRR, 2024

Underwater Image Quality Assessment: A Perceptual Framework Guided by Physical Imaging.
CoRR, 2024

EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection.
CoRR, 2024

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024

MDADroid: A novel malware detection method by constructing functionality-API mapping.
Comput. Secur., 2024

Practical cloud storage auditing using serverless computing.
Sci. China Inf. Sci., 2024

From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Multi-intent Driven Contrastive Sequential Recommendation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

DI-MaskDINO: A Joint Object Detection and Instance Segmentation Model.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

On-Road Object Importance Estimation: A New Dataset and A Model with Multi-Fold Top-Down Guidance.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Beware of Road Markings: A New Adversarial Patch Attack to Monocular Depth Estimation.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Orthogonal Hyper-category Guided Multi-interest Elicitation for Micro-video Matching.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

On the Vulnerability of Adversarially Trained Models Against Two-faced Attacks.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction.
Proceedings of the Computer Vision - ECCV 2024, 2024

Reducing Interaction Noise for Sequential Recommendation via Robust Interests.
Proceedings of the Database Systems for Advanced Applications, 2024

VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems.
Proceedings of the Computing and Combinatorics - 30th International Conference, 2024

Group Signature with Time-Bound Keys for Secure E-health Record Sharing.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024

United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023

Multiple-Instance Learning From Unlabeled Bags With Pairwise Similarity.
IEEE Trans. Knowl. Data Eng., November, 2023

Privacy-Preserving Machine Learning as a Service: Challenges and Opportunities.
IEEE Netw., November, 2023

A Distributed Projection Neurodynamic Approach for Solving BP Denoising Problem in Sparse Recovery.
J. Circuits Syst. Comput., November, 2023

FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing.
IEEE Trans. Parallel Distributed Syst., October, 2023

EHNQ: Subjective and Objective Quality Evaluation of Enhanced Night-Time Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Multilevel Feature Fusion for End-to-End Blind Image Quality Assessment.
IEEE Trans. Broadcast., September, 2023

Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023

Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023

An End-to-End Blind Image Quality Assessment Method Using a Recurrent Network and Self-Attention.
IEEE Trans. Broadcast., June, 2023

Perception-Oriented U-Shaped Transformer Network for 360-Degree No-Reference Image Quality Assessment.
IEEE Trans. Broadcast., June, 2023

Attentional Feature Fusion for End-to-End Blind Image Quality Assessment.
IEEE Trans. Broadcast., March, 2023

Spatiotemporal Feature Hierarchy-Based Blind Prediction of Natural Video Quality via Transfer Learning.
IEEE Trans. Broadcast., March, 2023

Generative adversarial networks with adaptive learning strategy for noise-to-image synthesis.
Neural Comput. Appl., March, 2023

BMIF: Privacy-preserving Blockchain-based Medical Image Fusion.
ACM Trans. Multim. Comput. Commun. Appl., February, 2023

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.
Veh. Commun., 2023

Blind Dehazed Image Quality Assessment: A Deep CNN-Based Approach.
IEEE Trans. Multim., 2023

An Underwater Image Quality Assessment Metric.
IEEE Trans. Multim., 2023

A Reversible Framework for Efficient and Secure Visual Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2023

Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding.
IEEE Trans. Inf. Forensics Secur., 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023

A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage.
IEEE Trans. Cloud Comput., 2023

A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023

Learning-aware feature denoising discriminator.
Inf. Fusion, 2023

Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction.
CoRR, 2023

A Survey of Secure Computation Using Trusted Execution Environments.
CoRR, 2023

Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding.
CoRR, 2023

Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

FBLNet: FeedBack Loop Network for Driver Attention Prediction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Cloud Storage Auditing: From One Cloud to Dual, and More.
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023

Gemini: A Dual-Task Co-training Model for Partial Label Learning.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

A Generalized Unbiased Risk Estimator for Learning with Augmented Classes.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Bab: A novel algorithm for training clean model based on poisoned data.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading.
IEEE Trans. Netw. Serv. Manag., December, 2022

ELAA: An efficient local adversarial attack using model interpreters.
Int. J. Intell. Syst., December, 2022

EGM: An Efficient Generative Model for Unrestricted Adversarial Examples.
ACM Trans. Sens. Networks, November, 2022

Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2022

Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022

Cloud Object Storage Synchronization: Design, Analysis, and Implementation.
IEEE Trans. Parallel Distributed Syst., 2022

Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment.
IEEE Trans. Dependable Secur. Comput., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Optimum Quality Control Algorithm for Versatile Video Coding.
IEEE Trans. Broadcast., 2022

An End-to-End No-Reference Video Quality Assessment Method With Hierarchical Spatiotemporal Feature Representation.
IEEE Trans. Broadcast., 2022

STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
Multim. Tools Appl., 2022

SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability.
J. Inf. Secur. Appl., 2022

Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices.
IEEE Internet Things J., 2022

Lattice-based public key searchable encryption with fine-grained access control for edge computing.
Future Gener. Comput. Syst., 2022

IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022

Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference.
CoRR, 2022

TrustBuilder: A non-repudiation scheme for IoT cloud applications.
Comput. Secur., 2022

Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds.
Comput. Commun., 2022

Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

A Blockchain-Based Mutual Authentication Protocol for Smart Home.
Proceedings of the Information Security - 25th International Conference, 2022

Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Privacy Masking Stochastic Subgradient-Push Algorithm for Distributed Online Optimization.
IEEE Trans. Cybern., 2021

Convolutional Neural Network for Visual Security Evaluation.
IEEE Trans. Circuits Syst. Video Technol., 2021

Quality-distinguishing and patch-comparing no-reference image quality assessment.
Multim. Tools Appl., 2021

Access control encryption without sanitizers for Internet of Energy.
Inf. Sci., 2021

CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things.
IEEE Internet Things J., 2021

Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey.
Int. J. Intell. Syst., 2021

A novel hybrid augmented loss discriminator for text-to-image synthesis.
Int. J. Intell. Syst., 2021

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021

Protecting Your NLG Models with Semantic and Robust Watermarks.
CoRR, 2021

PEEL: A Provable Removal Attack on Deep Hiding.
CoRR, 2021

Local Black-box Adversarial Attacks: A Query Efficient Approach.
CoRR, 2021

Secure Data Transmission with Access Control for Smart Home Devices.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Proceedings of the Provable and Practical Security, 2021

Self-Supervised Pre-training on the Target Domain for Cross-Domain Person Re-identification.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

PRNet: A Progressive Recovery Network for Revealing Perceptually Encrypted Images.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Multiple-Instance Learning from Similar and Dissimilar Bags.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

QOE-Based Neural Live Streaming Method with Continuous Dynamic Adaptive Video Quality Control.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Teacher-Supervised Generative Adversarial Networks.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming.
Proceedings of the IEEE International Conference on Acoustics, 2021

ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
Towards Usable Cloud Storage Auditing.
IEEE Trans. Parallel Distributed Syst., 2020

Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches.
IEEE Trans. Multim., 2020

PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation.
IEEE Trans. Inf. Forensics Secur., 2020

Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020

SensIR: Towards privacy-sensitive image retrieval in the cloud.
Signal Process. Image Commun., 2020

Achieving forward unforgeability in keyword-field-free conjunctive search.
J. Netw. Comput. Appl., 2020

Public key encryption with conjunctive keyword search on lattice.
J. Inf. Secur. Appl., 2020

An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020

Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Differentially Private Decentralized Learning.
CoRR, 2020

Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020

Squeeze Criterion GANs: Double Adversarial Learning Method.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

JPEG-XR-GCP: Promoting JPEG-XR Compression by Gradient-Based Coefficient Prediction.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

Towards efficient privacy-preserving face recognition in the cloud.
Signal Process., 2019

Self-learning and self-adaptive resource allocation for cloud-based software services.
Concurr. Comput. Pract. Exp., 2019

Pair-Comparing Based Convolutional Neural Network for Blind Image Quality Assessment.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019

ImageProof: Enabling Authentication for Large-Scale Image Retrieval.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Collaborative ensemble learning under differential privacy.
Web Intell., 2018

User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Serv. Comput., 2018

Verifiable outsourcing of constrained nonlinear programming by particle swarm optimization in cloud.
Soft Comput., 2018

Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018

Efficient biometric identity-based encryption.
Inf. Sci., 2018

An efficient quantum circuits optimizing scheme compared with QISKit.
CoRR, 2018

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Runtime Knowledge Graph Based Approach to Smart Home Application Development.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Efficient and Privacy-Preserving Query on Outsourced Spherical Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

A Data Placement Strategy for Scientific Workflow in Hybrid Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Image quality assessment based on multiscale fuzzy gradient similarity deviation.
Soft Comput., 2017

A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance.
Multim. Tools Appl., 2017

High-payload completely reversible data hiding in encrypted images by an interpolation technique.
Frontiers Inf. Technol. Electron. Eng., 2017

An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.
J. Vis. Commun. Image Represent., 2017

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017

Model-Driven Approach to Hadoop Deployment in Cloud.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks.
IEEE Trans. Multi Scale Comput. Syst., 2016

Perceptual Visual Security Index Based on Edge and Texture Similarities.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016

On the security of binary arithmetic coding based on interval shrinking.
Multim. Tools Appl., 2016

Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016

Chaotic Image Encryption of Regions of Interest.
Int. J. Bifurc. Chaos, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Cloud Storage Integrity Checking: Going from Theory to Practice.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
Multim. Tools Appl., 2015

Outsourcing chaotic selective image encryption to the cloud with steganography.
Digit. Signal Process., 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Period distribution of generalized discrete Arnold cat map.
Theor. Comput. Sci., 2014

Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Comput., 2014

Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014

Joint SPIHT compression and selective encryption.
Appl. Soft Comput., 2014

A Practically Optimized Implementation of Attribute Based Cryptosystems.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A verifiable PSO algorithm in cloud computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$.
IEEE Trans. Inf. Theory, 2013

Independent spanning trees in crossed cubes.
Inf. Process. Lett., 2013

Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Period Distribution of Generalized Discrete Arnold Cat Map for N=p<sup>e</sup>.
IEEE Trans. Inf. Theory, 2012

When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011

2008
Cryptanalysis of a password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2008

2007
A novel particle swarm optimizer with time-delay.
Appl. Math. Comput., 2007

An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007

An improved particle swarm optimizer with momentum.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2005
Global Attractivity of Cohen-Grossberg Model with Delays.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

2004
Further Results for an Estimation of Upperbound of Delays for Delayed Neural Networks.
Proceedings of the Advances in Neural Networks, 2004


  Loading...