Zhangjie Fu

According to our database1, Zhangjie Fu authored at least 66 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Writing in the Air with WiFi Signals for Virtual Reality Devices.
IEEE Trans. Mob. Comput., 2019

WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU.
International Journal of Parallel Programming, 2019

Coverless information hiding method based on the keyword.
IJHPCN, 2019

Secure search service based on word2vec in the public cloud.
IJCSE, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Secure Multi-UAV Collaborative Task Allocation.
IEEE Access, 2019

Pollution Source Localization Based on Multi-UAV Cooperative Communication.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
A Heuristic Evolutionary Algorithm of UAV Path Planning.
Wireless Communications and Mobile Computing, 2018

Semantic-Aware Searching Over Encrypted Data for Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.
Security and Communication Networks, 2018

Noise-level estimation based detection of motion-compensated frame interpolation in video sequences.
Multimedia Tools Appl., 2018

Saliency-based adaptive compressive sampling of images using measurement contrast.
Multimedia Tools Appl., 2018

A novel proactive secret image sharing scheme based on LISS.
Multimedia Tools Appl., 2018

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Network and Computer Applications, 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
IJWGS, 2018

Modelling and developing conflict-aware scheduling on large-scale data centres.
Future Generation Comp. Syst., 2018

A task-efficient sink node based on embedded multi-core SoC for Internet of Things.
Future Generation Comp. Syst., 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Generation Comp. Syst., 2018

Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
A query refinement framework for xml keyword search.
World Wide Web, 2017

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Information Forensics and Security, 2017

Motion-compensated frame interpolation using patch-based sparseland model.
Sig. Proc.: Image Comm., 2017

(t, n) Threshold secret image sharing scheme with adversary structure.
Multimedia Tools Appl., 2017

Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Visual Communication and Image Representation, 2017

Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields.
J. Comb. Optim., 2017

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
TIIS, 2017

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
TIIS, 2017

Performance analysis and optimization for workflow authorization.
Future Generation Comp. Syst., 2017

Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing.
Concurrency and Computation: Practice and Experience, 2017

Heterogeneous ad hoc networks: Architectures, advances and challenges.
Ad Hoc Networks, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distrib. Syst., 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Information Forensics and Security, 2016

Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Security and Communication Networks, 2016

Privacy-preserving outsourced gene data search in encryption domain.
Security and Communication Networks, 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
Journal of Systems and Software, 2016

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electrical and Computer Engineering, 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
TIIS, 2016

An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing.
IEEE Access, 2016

Towards efficient content-aware search over encrypted outsourced data in cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Enhancing security for two-party comparison over encrypted data.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
Journal of Communications and Networks, 2015

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Transactions, 2015

Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing.
CIT, 2015

An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Optimized Strategy for Speculative Execution in a Heterogeneous Environment.
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015

VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electronics, 2014

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electronics, 2014

A novel signature based on the combination of global and local signatures for image copy detection.
Security and Communication Networks, 2014

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Document Attribute-Based Keyword Search over Encrypted Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Data Access Control for Multi-authority Cloud Storage Systems.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Similarity Search Method for Encrypted Cloud Document.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Secure Storage of Data in Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Semantic keyword search based on trie over encrypted cloud data.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
New Forensic Methods for OOXML Format Documents.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Text split-based steganography in OOXML format documents for covert communication.
Security and Communication Networks, 2012

2011
Forensic investigation of OOXML format documents.
Digital Investigation, 2011


  Loading...