Tao Xiang
Orcid: 0000-0002-0022-3082Affiliations:
- Chongqing University, College of Computer Science, Chongqing, China
According to our database1,
Tao Xiang
authored at least 253 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Sparse Reduced-Rank Fully Connected Layers with Its Applications in Detection and Classification.
ACM Trans. Multim. Comput. Commun. Appl., June, 2025
IEEE Trans. Intell. Transp. Syst., June, 2025
Int. J. Inf. Sec., June, 2025
CoRR, June, 2025
Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network.
CoRR, June, 2025
From Ground to Sky: Architectures, Applications, and Challenges Shaping Low-Altitude Wireless Networks.
CoRR, June, 2025
IEEE Trans. Veh. Technol., May, 2025
Light as Deception: GPT-driven Natural Relighting Against Vision-Language Pre-training Models.
CoRR, May, 2025
Disrupting Vision-Language Model-Driven Navigation Services via Adversarial Object Fusion.
CoRR, May, 2025
IEEE Trans. Veh. Technol., April, 2025
IEEE Trans. Emerg. Top. Comput. Intell., April, 2025
LESEP: Boosting Adversarial Transferability via Latent Encoding and Semantic Embedding Perturbations.
IEEE Trans. Circuits Syst. Video Technol., April, 2025
IEEE Trans. Big Data, April, 2025
Maintaining Privacy in Smart Grid: Utilizing the Adversarial Attack Paradigm to Counter Nonintrusive Load Monitoring Models.
IEEE Internet Things J., April, 2025
CoRR, April, 2025
Certificateless Searchable Public Key Encryption With Trapdoor Indistinguishability for IoV.
IEEE Trans. Veh. Technol., March, 2025
LRCPA: Lattice-Based Robust and Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., March, 2025
IEEE Trans. Consumer Electron., February, 2025
CoRR, February, 2025
Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation.
IEEE Trans. Sustain. Comput., 2025
Blockchain Assisted Industrial Data Registration and Reconstruction Management Scheme.
IEEE Trans. Netw. Sci. Eng., 2025
Advancing Non-Intrusive Load Monitoring: Predicting Appliance-Level Power Consumption With Indirect Supervision.
IEEE Trans. Netw. Sci. Eng., 2025
Deep Face Leakage: Inverting High-Quality Faces From Gradients Using Residual Optimization.
IEEE Trans. Image Process., 2025
FLGuardian: Defending Against Model Poisoning Attacks via Fine-Grained Detection in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks.
IEEE Trans. Inf. Forensics Secur., 2025
PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks.
IEEE Trans. Dependable Secur. Comput., 2025
LLMBD: Backdoor defense via large language model paraphrasing and data voting in NLP.
Knowl. Based Syst., 2025
Perceptual visual security index: Analyzing image content leakage for vision language models.
J. Inf. Secur. Appl., 2025
Sci. China Inf. Sci., 2025
Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability.
Proceedings of the ACM on Web Conference 2025, 2025
Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks.
Proceedings of the ACM on Web Conference 2025, 2025
DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the IEEE INFOCOM 2025, 2025
Breaking 'Chicken-Egg': Cross-city Battery Swap Demand Prediction via Knowledge-guided Diffusion.
Proceedings of the IEEE INFOCOM 2025, 2025
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
2024
ACM Trans. Intell. Syst. Technol., December, 2024
ACM Trans. Intell. Syst. Technol., December, 2024
IEEE Trans. Big Data, December, 2024
A Content-Aware Full-Reference Image Quality Assessment Method Using a Gram Matrix and Signal-to-Noise.
IEEE Trans. Broadcast., December, 2024
IEEE Trans. Consumer Electron., November, 2024
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
IEEE Internet Things J., October, 2024
Using Multi-Level Consistency Learning for Partial-to-Partial Point Cloud Registration.
IEEE Trans. Vis. Comput. Graph., August, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
Third-Person View Attention Prediction in Natural Scenarios With Weak Information Dependency and Human-Scene Interaction Mechanism.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Artif. Intell. Rev., July, 2024
Mach. Learn., June, 2024
IEEE Trans. Circuits Syst. Video Technol., May, 2024
Robust RGB-T Tracking via Adaptive Modality Weight Correlation Filters and Cross-modality Learning.
ACM Trans. Multim. Comput. Commun. Appl., April, 2024
IEEE Trans. Broadcast., March, 2024
Comput. Stand. Interfaces, March, 2024
IEEE J. Biomed. Health Informatics, February, 2024
Multim. Tools Appl., January, 2024
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Multim., 2024
IEEE Trans. Multim., 2024
Perceptual Quality Analysis in Deep Domains Using Structure Separation and High-Order Moments.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Cloud Comput., 2024
J. Parallel Distributed Comput., 2024
Inf. Sci., 2024
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems.
IACR Cryptol. ePrint Arch., 2024
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters.
CoRR, 2024
Underwater Image Quality Assessment: A Perceptual Framework Guided by Physical Imaging.
CoRR, 2024
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection.
CoRR, 2024
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024
MDADroid: A novel malware detection method by constructing functionality-API mapping.
Comput. Secur., 2024
Sci. China Inf. Sci., 2024
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
On-Road Object Importance Estimation: A New Dataset and A Model with Multi-Fold Top-Down Guidance.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Beware of Road Markings: A New Adversarial Patch Attack to Monocular Depth Estimation.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Orthogonal Hyper-category Guided Multi-interest Elicitation for Micro-video Matching.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction.
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the Database Systems for Advanced Applications, 2024
VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems.
Proceedings of the Computing and Combinatorics - 30th International Conference, 2024
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024
United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Low-light Image Enhancement via a Frequency-based Model with Structure and Texture Decomposition.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023
IEEE Trans. Knowl. Data Eng., November, 2023
IEEE Netw., November, 2023
A Distributed Projection Neurodynamic Approach for Solving BP Denoising Problem in Sparse Recovery.
J. Circuits Syst. Comput., November, 2023
IEEE Trans. Parallel Distributed Syst., October, 2023
IEEE Trans. Circuits Syst. Video Technol., September, 2023
IEEE Trans. Broadcast., September, 2023
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023
An End-to-End Blind Image Quality Assessment Method Using a Recurrent Network and Self-Attention.
IEEE Trans. Broadcast., June, 2023
Perception-Oriented U-Shaped Transformer Network for 360-Degree No-Reference Image Quality Assessment.
IEEE Trans. Broadcast., June, 2023
IEEE Trans. Broadcast., March, 2023
Spatiotemporal Feature Hierarchy-Based Blind Prediction of Natural Video Quality via Transfer Learning.
IEEE Trans. Broadcast., March, 2023
Generative adversarial networks with adaptive learning strategy for noise-to-image synthesis.
Neural Comput. Appl., March, 2023
ACM Trans. Multim. Comput. Commun. Appl., February, 2023
Veh. Commun., 2023
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction.
CoRR, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
Int. J. Intell. Syst., December, 2022
ACM Trans. Sens. Networks, November, 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Broadcast., 2022
An End-to-End No-Reference Video Quality Assessment Method With Hierarchical Spatiotemporal Feature Representation.
IEEE Trans. Broadcast., 2022
STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
Multim. Tools Appl., 2022
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability.
J. Inf. Secur. Appl., 2022
IEEE Internet Things J., 2022
Lattice-based public key searchable encryption with fine-grained access control for edge computing.
Future Gener. Comput. Syst., 2022
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference.
CoRR, 2022
Comput. Secur., 2022
Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds.
Comput. Commun., 2022
Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Privacy Masking Stochastic Subgradient-Push Algorithm for Distributed Online Optimization.
IEEE Trans. Cybern., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Multim. Tools Appl., 2021
IEEE Internet Things J., 2021
Int. J. Intell. Syst., 2021
Int. J. Intell. Syst., 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Provable and Practical Security, 2021
Self-Supervised Pre-training on the Target Domain for Cross-Domain Person Re-identification.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
QOE-Based Neural Live Streaming Method with Continuous Dynamic Adaptive Video Quality Control.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming.
Proceedings of the IEEE International Conference on Acoustics, 2021
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
2020
IEEE Trans. Multim., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020
Signal Process. Image Commun., 2020
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Signal Process., 2019
Self-learning and self-adaptive resource allocation for cloud-based software services.
Concurr. Comput. Pract. Exp., 2019
Pair-Comparing Based Convolutional Neural Network for Blind Image Quality Assessment.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
2018
IEEE Trans. Serv. Comput., 2018
Verifiable outsourcing of constrained nonlinear programming by particle swarm optimization in cloud.
Soft Comput., 2018
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Soft Comput., 2017
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance.
Multim. Tools Appl., 2017
High-payload completely reversible data hiding in encrypted images by an interpolation technique.
Frontiers Inf. Technol. Electron. Eng., 2017
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.
J. Vis. Commun. Image Represent., 2017
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
2016
IEEE Trans. Multi Scale Comput. Syst., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Multim. Tools Appl., 2016
Inf. Sci., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
Multim. Tools Appl., 2015
Digit. Signal Process., 2015
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Theor. Comput. Sci., 2014
IEEE Trans. Cloud Comput., 2014
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
2013
IEEE Trans. Inf. Theory, 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
2012
IEEE Trans. Inf. Theory, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011
2008
J. Comput. Syst. Sci., 2008
2007
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
2004
Further Results for an Estimation of Upperbound of Delays for Delayed Neural Networks.
Proceedings of the Advances in Neural Networks, 2004