Zhangjie Fu

Orcid: 0000-0002-4363-2521

According to our database1, Zhangjie Fu authored at least 95 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network.
IEEE Trans. Cogn. Dev. Syst., April, 2024

Context-Aware Linguistic Steganography Model Based on Neural Machine Translation.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

2023
Identifying RFID Tags in Collisions.
IEEE/ACM Trans. Netw., August, 2023

An Efficient Missing Tag Identification Approach in RFID Collisions.
IEEE Trans. Mob. Comput., 2023

Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023

BEVSegFormer: Bird's Eye View Semantic Segmentation From Arbitrary Camera Rigs.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

CurveFormer: 3D Lane Detection by Curve Propagation with Curve Queries and Attention.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

2022
Remote Attacks on Drones Vision Sensors: An Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2022

HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis.
IEEE Signal Process. Lett., 2022

A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system.
Signal Process., 2022

CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis.
J. Vis. Commun. Image Represent., 2022

Semantic and secure search over encrypted outsourcing cloud based on BERT.
Frontiers Comput. Sci., 2022

Secret-to-Image Reversible Transformation for Generative Steganography.
CoRR, 2022

2021
Blockchain-based decentralized reputation system in E-commerce environment.
Future Gener. Comput. Syst., 2021

Stacked-autoencoder-based model for COVID-19 diagnosis on CT images.
Appl. Intell., 2021

Multi-scale Extracting and Second-Order Statistics for Lightweight Steganalysis.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2020
A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems.
IEEE Trans. Wirel. Commun., 2020

Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020

Security and Privacy Issues of UAV: A Survey.
Mob. Networks Appl., 2020

Confusing-Keyword Based Secure Search over Encrypted Cloud Data.
Mob. Networks Appl., 2020

Graffiti-writing recognition with fine-grained information.
Int. J. Comput. Sci. Eng., 2020

The secure steganography for hiding images via GAN.
EURASIP J. Image Video Process., 2020

An efficient iterative graph data processing framework based on bulk synchronous parallel model.
Concurr. Comput. Pract. Exp., 2020

Residual Attention SiameseRPN for Visual Tracking.
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020

Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data.
IEEE Trans. Serv. Comput., 2019

Writing in the Air with WiFi Signals for Virtual Reality Devices.
IEEE Trans. Mob. Comput., 2019

WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU.
Int. J. Parallel Program., 2019

Coverless information hiding method based on the keyword.
Int. J. High Perform. Comput. Netw., 2019

Secure search service based on word2vec in the public cloud.
Int. J. Comput. Sci. Eng., 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Secure Multi-UAV Collaborative Task Allocation.
IEEE Access, 2019

Pollution Source Localization Based on Multi-UAV Cooperative Communication.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Energy Management Mode of the Photovoltaic Power Station with Energy Storage Based on the Photovoltaic Power Prediction.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

2018
A Heuristic Evolutionary Algorithm of UAV Path Planning.
Wirel. Commun. Mob. Comput., 2018

Semantic-Aware Searching Over Encrypted Data for Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.
Secur. Commun. Networks, 2018

Noise-level estimation based detection of motion-compensated frame interpolation in video sequences.
Multim. Tools Appl., 2018

Saliency-based adaptive compressive sampling of images using measurement contrast.
Multim. Tools Appl., 2018

A novel proactive secret image sharing scheme based on LISS.
Multim. Tools Appl., 2018

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Netw. Comput. Appl., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018

Modelling and developing conflict-aware scheduling on large-scale data centres.
Future Gener. Comput. Syst., 2018

A task-efficient sink node based on embedded multi-core SoC for Internet of Things.
Future Gener. Comput. Syst., 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018

Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
A query refinement framework for xml keyword search.
World Wide Web, 2017

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Motion-compensated frame interpolation using patch-based sparseland model.
Signal Process. Image Commun., 2017

(t, n) Threshold secret image sharing scheme with adversary structure.
Multim. Tools Appl., 2017

Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Vis. Commun. Image Represent., 2017

Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields.
J. Comb. Optim., 2017

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst., 2017

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
KSII Trans. Internet Inf. Syst., 2017

Performance analysis and optimization for workflow authorization.
Future Gener. Comput. Syst., 2017

Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing.
Concurr. Comput. Pract. Exp., 2017

Heterogeneous ad hoc networks: Architectures, advances and challenges.
Ad Hoc Networks, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016

Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Secur. Commun. Networks, 2016

Privacy-preserving outsourced gene data search in encryption domain.
Secur. Commun. Networks, 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electr. Comput. Eng., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing.
IEEE Access, 2016

Towards efficient content-aware search over encrypted outsourced data in cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enhancing security for two-party comparison over encrypted data.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
J. Commun. Networks, 2015

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Trans. Commun., 2015

Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
J. Comput. Inf. Technol., 2015

An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Optimized Strategy for Speculative Execution in a Heterogeneous Environment.
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015

VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electron., 2014

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electron., 2014

A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Document Attribute-Based Keyword Search over Encrypted Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Similarity Search Method for Encrypted Cloud Document.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Secure Storage of Data in Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Semantic keyword search based on trie over encrypted cloud data.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
New Forensic Methods for OOXML Format Documents.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Text split-based steganography in OOXML format documents for covert communication.
Secur. Commun. Networks, 2012

2011
Forensic investigation of OOXML format documents.
Digit. Investig., 2011


  Loading...