Tao Xiang

Orcid: 0000-0002-9439-4623

Affiliations:
  • Chongqing University, College of Computer Science, Chongqing, China


According to our database1, Tao Xiang authored at least 161 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust RGB-T Tracking via Adaptive Modality Weight Correlation Filters and Cross-modality Learning.
ACM Trans. Multim. Comput. Commun. Appl., April, 2024

A Blind Video Quality Assessment Method via Spatiotemporal Pyramid Attention.
IEEE Trans. Broadcast., March, 2024

StopGuess: A framework for public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces, March, 2024

Double Transformer Super-Resolution for Breast Cancer ADC Images.
IEEE J. Biomed. Health Informatics, February, 2024

Mitigating cross-client GANs-based attack in federated learning.
Multim. Tools Appl., January, 2024

An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024

Low-Light Enhancement Method Based on a Retinex Model for Structure Preservation.
IEEE Trans. Multim., 2024

Perceptual Quality Analysis in Deep Domains Using Structure Separation and High-Order Moments.
IEEE Trans. Multim., 2024

STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024

Secure Redactable Blockchain With Dynamic Support.
IEEE Trans. Dependable Secur. Comput., 2024

NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks.
Inf. Sci., 2024

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024

United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Multiple-Instance Learning From Unlabeled Bags With Pairwise Similarity.
IEEE Trans. Knowl. Data Eng., November, 2023

Privacy-Preserving Machine Learning as a Service: Challenges and Opportunities.
IEEE Netw., November, 2023

A Distributed Projection Neurodynamic Approach for Solving BP Denoising Problem in Sparse Recovery.
J. Circuits Syst. Comput., November, 2023

FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing.
IEEE Trans. Parallel Distributed Syst., October, 2023

EHNQ: Subjective and Objective Quality Evaluation of Enhanced Night-Time Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Multilevel Feature Fusion for End-to-End Blind Image Quality Assessment.
IEEE Trans. Broadcast., September, 2023

Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023

Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023

An End-to-End Blind Image Quality Assessment Method Using a Recurrent Network and Self-Attention.
IEEE Trans. Broadcast., June, 2023

Perception-Oriented U-Shaped Transformer Network for 360-Degree No-Reference Image Quality Assessment.
IEEE Trans. Broadcast., June, 2023

Attentional Feature Fusion for End-to-End Blind Image Quality Assessment.
IEEE Trans. Broadcast., March, 2023

Spatiotemporal Feature Hierarchy-Based Blind Prediction of Natural Video Quality via Transfer Learning.
IEEE Trans. Broadcast., March, 2023

Generative adversarial networks with adaptive learning strategy for noise-to-image synthesis.
Neural Comput. Appl., March, 2023

BMIF: Privacy-preserving Blockchain-based Medical Image Fusion.
ACM Trans. Multim. Comput. Commun. Appl., February, 2023

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.
Veh. Commun., 2023

Blind Dehazed Image Quality Assessment: A Deep CNN-Based Approach.
IEEE Trans. Multim., 2023

An Underwater Image Quality Assessment Metric.
IEEE Trans. Multim., 2023

A Reversible Framework for Efficient and Secure Visual Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2023

Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding.
IEEE Trans. Inf. Forensics Secur., 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023

A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage.
IEEE Trans. Cloud Comput., 2023

A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023

Learning-aware feature denoising discriminator.
Inf. Fusion, 2023

A Survey of Secure Computation Using Trusted Execution Environments.
CoRR, 2023

Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding.
CoRR, 2023

Representing Noisy Image Without Denoising.
CoRR, 2023

Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Gemini: A Dual-Task Co-training Model for Partial Label Learning.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

A Generalized Unbiased Risk Estimator for Learning with Augmented Classes.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading.
IEEE Trans. Netw. Serv. Manag., December, 2022

ELAA: An efficient local adversarial attack using model interpreters.
Int. J. Intell. Syst., December, 2022

EGM: An Efficient Generative Model for Unrestricted Adversarial Examples.
ACM Trans. Sens. Networks, November, 2022

Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2022

Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022

Cloud Object Storage Synchronization: Design, Analysis, and Implementation.
IEEE Trans. Parallel Distributed Syst., 2022

Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment.
IEEE Trans. Dependable Secur. Comput., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Optimum Quality Control Algorithm for Versatile Video Coding.
IEEE Trans. Broadcast., 2022

An End-to-End No-Reference Video Quality Assessment Method With Hierarchical Spatiotemporal Feature Representation.
IEEE Trans. Broadcast., 2022

STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.
Multim. Tools Appl., 2022

SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability.
J. Inf. Secur. Appl., 2022

Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices.
IEEE Internet Things J., 2022

Lattice-based public key searchable encryption with fine-grained access control for edge computing.
Future Gener. Comput. Syst., 2022

IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022

Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference.
CoRR, 2022

TrustBuilder: A non-repudiation scheme for IoT cloud applications.
Comput. Secur., 2022

Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds.
Comput. Commun., 2022

Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

A Blockchain-Based Mutual Authentication Protocol for Smart Home.
Proceedings of the Information Security - 25th International Conference, 2022

Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Privacy Masking Stochastic Subgradient-Push Algorithm for Distributed Online Optimization.
IEEE Trans. Cybern., 2021

Convolutional Neural Network for Visual Security Evaluation.
IEEE Trans. Circuits Syst. Video Technol., 2021

Quality-distinguishing and patch-comparing no-reference image quality assessment.
Multim. Tools Appl., 2021

Access control encryption without sanitizers for Internet of Energy.
Inf. Sci., 2021

CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things.
IEEE Internet Things J., 2021

Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey.
Int. J. Intell. Syst., 2021

A novel hybrid augmented loss discriminator for text-to-image synthesis.
Int. J. Intell. Syst., 2021

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021

Protecting Your NLG Models with Semantic and Robust Watermarks.
CoRR, 2021

PEEL: A Provable Removal Attack on Deep Hiding.
CoRR, 2021

Local Black-box Adversarial Attacks: A Query Efficient Approach.
CoRR, 2021

Secure Data Transmission with Access Control for Smart Home Devices.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Proceedings of the Provable and Practical Security, 2021

Self-Supervised Pre-training on the Target Domain for Cross-Domain Person Re-identification.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

PRNet: A Progressive Recovery Network for Revealing Perceptually Encrypted Images.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Multiple-Instance Learning from Similar and Dissimilar Bags.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

QOE-Based Neural Live Streaming Method with Continuous Dynamic Adaptive Video Quality Control.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Teacher-Supervised Generative Adversarial Networks.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming.
Proceedings of the IEEE International Conference on Acoustics, 2021

ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
Towards Usable Cloud Storage Auditing.
IEEE Trans. Parallel Distributed Syst., 2020

Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches.
IEEE Trans. Multim., 2020

PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation.
IEEE Trans. Inf. Forensics Secur., 2020

Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020

SensIR: Towards privacy-sensitive image retrieval in the cloud.
Signal Process. Image Commun., 2020

Achieving forward unforgeability in keyword-field-free conjunctive search.
J. Netw. Comput. Appl., 2020

Public key encryption with conjunctive keyword search on lattice.
J. Inf. Secur. Appl., 2020

An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020

Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Differentially Private Decentralized Learning.
CoRR, 2020

Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020

Squeeze Criterion GANs: Double Adversarial Learning Method.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

JPEG-XR-GCP: Promoting JPEG-XR Compression by Gradient-Based Coefficient Prediction.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

Towards efficient privacy-preserving face recognition in the cloud.
Signal Process., 2019

Self-learning and self-adaptive resource allocation for cloud-based software services.
Concurr. Comput. Pract. Exp., 2019

Pair-Comparing Based Convolutional Neural Network for Blind Image Quality Assessment.
Proceedings of the Advances in Neural Networks - ISNN 2019, 2019

ImageProof: Enabling Authentication for Large-Scale Image Retrieval.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Collaborative ensemble learning under differential privacy.
Web Intell., 2018

User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Serv. Comput., 2018

Verifiable outsourcing of constrained nonlinear programming by particle swarm optimization in cloud.
Soft Comput., 2018

Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018

Efficient biometric identity-based encryption.
Inf. Sci., 2018

An efficient quantum circuits optimizing scheme compared with QISKit.
CoRR, 2018

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Runtime Knowledge Graph Based Approach to Smart Home Application Development.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Efficient and Privacy-Preserving Query on Outsourced Spherical Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

A Data Placement Strategy for Scientific Workflow in Hybrid Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Image quality assessment based on multiscale fuzzy gradient similarity deviation.
Soft Comput., 2017

A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance.
Multim. Tools Appl., 2017

High-payload completely reversible data hiding in encrypted images by an interpolation technique.
Frontiers Inf. Technol. Electron. Eng., 2017

An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications.
J. Vis. Commun. Image Represent., 2017

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017

Model-Driven Approach to Hadoop Deployment in Cloud.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks.
IEEE Trans. Multi Scale Comput. Syst., 2016

Perceptual Visual Security Index Based on Edge and Texture Similarities.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016

On the security of binary arithmetic coding based on interval shrinking.
Multim. Tools Appl., 2016

Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016

Chaotic Image Encryption of Regions of Interest.
Int. J. Bifurc. Chaos, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Cloud Storage Integrity Checking: Going from Theory to Practice.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks.
Multim. Tools Appl., 2015

Outsourcing chaotic selective image encryption to the cloud with steganography.
Digit. Signal Process., 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Period distribution of generalized discrete Arnold cat map.
Theor. Comput. Sci., 2014

Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Comput., 2014

Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014

Joint SPIHT compression and selective encryption.
Appl. Soft Comput., 2014

A Practically Optimized Implementation of Attribute Based Cryptosystems.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A verifiable PSO algorithm in cloud computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$.
IEEE Trans. Inf. Theory, 2013

Independent spanning trees in crossed cubes.
Inf. Process. Lett., 2013

Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Period Distribution of Generalized Discrete Arnold Cat Map for N=p<sup>e</sup>.
IEEE Trans. Inf. Theory, 2012

When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011

2008
Cryptanalysis of a password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2008

2007
A novel particle swarm optimizer with time-delay.
Appl. Math. Comput., 2007

An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007

An improved particle swarm optimizer with momentum.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2005
Global Attractivity of Cohen-Grossberg Model with Delays.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

2004
Further Results for an Estimation of Upperbound of Delays for Delayed Neural Networks.
Proceedings of the Advances in Neural Networks, 2004


  Loading...