A Bitcoin-based secure outsourcing scheme for optimization problem in multimedia internet of things W Yang, S Wu, J Fei, X Zeng, Y Ding, Z Xia ACM Transactions on Multimedia Computing, Communications and Applications 20 …, 2024 | 1 | 2024 |
A chaotic IP watermarking in physical layout level based on FPGA W Liang, X Sun, Z Xia, D Sun, J Long Radioengineering 20 (1), 118-125, 2011 | 25 | 2011 |
A content-based image retrieval scheme using an encrypted difference histogram in cloud computing D Liu, J Shen, Z Xia, X Sun Information 8 (3), 96, 2017 | 29 | 2017 |
A copy-move forgery detection method based on CMFD-SIFT B Yang, X Sun, H Guo, Z Xia, X Chen Multimedia Tools and Applications 77, 837-855, 2018 | 116 | 2018 |
A Data Integrity Authentication Scheme in WSNs Based on Double Watermark G Gao, T Han, Z Feng, M Wang, Z Xia IEEE Internet of Things Journal 10 (9), 8245-8256, 2022 | 2 | 2022 |
A Distribution Outsourcing Scheme Based on Partial Image Encryption X Li, Z Xia Journal of Internet Technology 19 (3), 807-814, 2018 | 1 | 2018 |
A fair and scalable watermarking scheme for the digital content trading industry X Xiao, M Su, J Jiang, Y Zhang, Z Hua, Z Xia Computers in Industry 161, 104125, 2024 | | 2024 |
A format-compatible searchable encryption scheme for JPEG images using bag-of-words Z Xia, Q Ji, Q Gu, C Yuan, F Xiao ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022 | 14 | 2022 |
A hue preservation lossless contrast enhancement method with RDH for color images G Gao, T Han, B Wu, J Fu, Z Xia Digital Signal Processing 136, 103965, 2023 | 4 | 2023 |
A learning-based steganalytic method against LSB matching steganography Z Xia, L Yang, X Sun, W Liang, D Sun, Z Ruan Radioengineering 20 (1), 102-109, 2011 | 13 | 2011 |
A lightweight convolutional neural network with representation self-challenge for fingerprint liveness detection J Chen, C Yuan, C Cui, Z Xia, X Sun, T Akilan Comput. Mater. Contin. 73 (1), 719-733, 2022 | 1 | 2022 |
A multi-keyword ranked search over encrypted cloud data supporting semantic extension Z Xia, L Chen, X Sun, J Liu International Journal of Multimedia and Ubiquitous Engineering 11 (8), 107-120, 2016 | 11 | 2016 |
A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing D Liu, Q Liu, Z Xia, T Zhou 2018 International Conference on Computing, Networking and Communications …, 2018 | 1 | 2018 |
A novel weber local binary descriptor for fingerprint liveness detection Z Xia, C Yuan, R Lv, X Sun, NN Xiong, YQ Shi IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (4), 1526-1536, 2018 | 107 | 2018 |
A privacy preserving deep linear regression scheme based on homomorphic encryption D Dong, Y Wu, L Xiong, Z Xia Journal on Big Data 1 (3), 145, 2019 | 5 | 2019 |
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren IEEE Transactions on Information Forensics and Security 11 (11), 2594-2608, 2016 | 771 | 2016 |
A privacy-preserving handwritten signature verification method using combinational features and secure kNN Z Xia, T Shi, NN Xiong, X Sun, B Jeon IEEE Access 6, 46695-46705, 2018 | 22 | 2018 |
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment. Z Xia, L Lu, T Qiu, HJ Shim, X Chen, B Jeon Computers, Materials & Continua 58 (1), 2019 | 66 | 2019 |
A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing Z Xia, L Wang, J Tang, NN Xiong, J Weng IEEE Transactions on Network Science and Engineering 8 (1), 318-330, 2020 | 52 | 2020 |
A privacy-preserving JPEG image retrieval scheme using the local Markov feature and bag-of-words model in cloud computing P Yu, J Tang, Z Xia, Z Li, J Weng IEEE Transactions on Cloud Computing 11 (3), 2885-2896, 2023 | 9 | 2023 |