Zhengding Lu

According to our database1, Zhengding Lu authored at least 92 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
SVM-based anti-forensic method for spread-spectrum fingerprinting.
Secur. Commun. Networks, 2015

A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting.
Multim. Tools Appl., 2015

2014
Name disambiguation in scientific cooperation network by exploiting user feedback.
Artif. Intell. Rev., 2014

2013
A new fingerprinting scheme using social network analysis for majority attack.
Telecommun. Syst., 2013

MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks.
Comput. J., 2013

A collusion attack optimization framework toward spread-spectrum fingerprinting.
Appl. Soft Comput., 2013

2012
A collusion attack optimization strategy for digital fingerprinting.
ACM Trans. Multim. Comput. Commun. Appl., 2012

Mining constraints in role-based access control.
Math. Comput. Model., 2012

Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions.
IEEE Multim., 2012

Robust localized image watermarking based on invariant regions.
Digit. Signal Process., 2012

Incremental K-clique clustering in dynamic social networks.
Artif. Intell. Rev., 2012

A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
Robust video watermarking based on affine invariant regions in the compressed domain.
Signal Process., 2011

A novel image copy detection scheme based on the local multi-resolution histogram descriptor.
Multim. Tools Appl., 2011

Corrigendum to "A flabellate overlay network for multi-attribute search" [J. Parallel Distrib. Comput. 71 (2011) 407-423].
J. Parallel Distributed Comput., 2011

A flabellate overlay network for multi-attribute search.
J. Parallel Distributed Comput., 2011

RAR: A role-and-risk based flexible framework for secure collaboration.
Future Gener. Comput. Syst., 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurr. Comput. Pract. Exp., 2011

Incorporating User Feedback into Name Disambiguation of Scientific Cooperation Network.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

MEI: Mutual Enhanced Infinite Generative Model for Simultaneous Community and Topic Detection.
Proceedings of the Discovery Science - 14th International Conference, 2011

An Encrypted Index Mechanism in Ciphertext Retrieval System.
Proceedings of the 8th Web Information Systems and Applications Conference, 2011

2010
Digital Image Forensics Using Multi-Resolution Histograms.
Int. J. Digit. Crime Forensics, 2010

Consistency Checking of Safety and Availability in Access Control.
IEICE Trans. Inf. Syst., 2010

Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Role mining based on weights.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Optimal collusion attack for digital fingerprinting.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Robust image copy detection using multi-resolution histogram.
Proceedings of the 11th ACM SIGMM International Conference on Multimedia Information Retrieval, 2010

A Novel Collusion Attack Strategy for Digital Fingerprinting.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Topic-Sensitive Tag Ranking.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Mimir: Term-distributed indexing and search for secret documents.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
A Novel Approach to Improve the Security of P2P File-Sharing Systems.
Int. J. Commun. Netw. Syst. Sci., 2009

Synchronous Dynamic Adjusting: An Anti-Collision Algorithm for an RF-UCard System.
Int. J. Commun. Netw. Syst. Sci., 2009

An efficient quantum search engine on unsorted database
CoRR, 2009

Spermatogonium image recognition using Zernike moments.
Comput. Methods Programs Biomed., 2009

Image Splicing Detection Using Multi-resolution Histogram.
Proceedings of the Advances in Multimedia Information Processing, 2009

On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009

Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009

Fast and robust video copy detection scheme using full DCT coefficients.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

High Coverage Search in Multi-Tree Based P2P Overlay Network.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Discovering Hidden Group in Financial Transaction Network Using Hidden Markov Model and Genetic Algorithm.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Community mining on dynamic weighted directed graphs.
Proceedings of the Proceeding of the ACM First International Workshop on Complex Networks Meet Information & Knowledge Management, 2009

2008
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008

Secret Sharing Based Video Watermark Algorithm for Multiuser.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

CIM: Hardware Support for Multi-COS Isolation of RF-UCard.
Proceedings of the International Conference on Embedded Software and Systems, 2008

SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network.
Proceedings of the Progress in WWW Research and Development, 2008

FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Log-scaling magnitude modulated watermarking scheme.
Sci. China Ser. F Inf. Sci., 2007

Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Towards a Type-2 Fuzzy Description Logic for Semantic Search Engine.
Proceedings of the Advances in Data and Web Management, 2007

ASITL: Adaptive Secure Interoperation Using Trust-Level.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

ICache: A Size-Aware Cooperative Caching Architecture for Web Images.
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007

Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007

A Novel Secure Interoperation System.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Adaptive Image Watermarking Algorithm in Contourlet Domain.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

P2P-based Locking in Real-Time Collaborative Editing Systems.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
A Semantic Matching of Information Segments for Tolerating Error Chinese Words.
Proceedings of the Web Information Systems, 2006

An ECG Parallel Scheduling Algorithm for the Distributed Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

No-Reference Perceptual Quality Assessment of JPEG Images Using General Regression Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Real-time video watermarking based on extended m-sequences.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

A Semantic Search Conceptual Model and Application in Security Access Control.
Proceedings of the Semantic Web, 2006

2005
Utility driven dynamic resource allocation using competitive markets in computational grid.
Adv. Eng. Softw., 2005

Web Document Classification Based on Extended Rough set.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Method of Security Improvement for Privacy Preserving Association Rule Mining over Vertically Partitioned Data.
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005

Service Publishing and Discovering Model in a Web Services Oriented Peer-to-Peer System.
Proceedings of the Web Engineering, 5th International Conference, 2005

A new permutation approach for distributed association rule mining.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

WebPeer: A P2P-based System for Publishing and Discovering Web Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
A Chinese word segmentation based on language situation in processing ambiguous words.
Inf. Sci., 2004

A Fuzzy Classification Based on Feature Selection for Web Pages.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

A multiple watermarking algorithm based on CDMA technique.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

A robust adaptive image watermarking algorithm.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

New real-time watermarking algorithm for compressed video in vlc domain.
Proceedings of the 2004 International Conference on Image Processing, 2004

Price Driven Market Mechanism for Computational Grid Resource Allocation.
Proceedings of the Computational Science and Its Applications, 2004

Ontology-Based Universal Knowledge Grid: Enabling Knowledge Discovery and Integration on the Grid.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Design and Implementation of a Hybrid Agent Platform.
Program. Comput. Softw., 2003

Apply Market Mechanism to Agent-Based Grid Resource Management.
Int. J. Softw. Eng. Knowl. Eng., 2003

Automatic Generation of Wrapper for Data Extraction from the Web.
Proceedings of the Web Engineering, International Conference, 2003

Data Integration Based WWW with XML and CORBA.
Proceedings of the Web Engineering, International Conference, 2003

Schema Mapping for Interoperability in XML-Based Multidatabase Systems.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Coordinating Mobile Agents by the XML-Based Tuple Space.
J. Comput. Sci. Technol., 2002

Design and implementation of a distributed computing environment model for object-oriented networks programming.
Comput. Commun., 2002

2001
Mining association rules using clustering.
Intell. Data Anal., 2001

Shape Retrieval by Hierarchical Evolution.
Proceedings of the Advances in Multimedia Information Processing, 2001

An Architecture for Multidatabase Systems Based on CORBA and XML.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001


  Loading...