Follow
Xingming Sun
Title
Cited by
Cited by
Year
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Z Xia, X Wang, X Sun, Q Wang
IEEE transactions on parallel and distributed systems 27 (2), 340-352, 2015
14082015
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE transactions on information forensics and security 10 (3), 507-518, 2014
9992014
Enabling personalized search over encrypted outsourced data with efficiency improvement
Z Fu, K Ren, J Shu, X Sun, F Huang
IEEE transactions on parallel and distributed systems 27 (9), 2546-2559, 2015
8572015
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Z Fu, X Sun, Q Liu, L Zhou, J Shu
IEICE Transactions on Communications 98 (1), 190-200, 2015
7902015
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016
7762016
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Z Fu, X Wu, C Guan, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (12), 2706-2716, 2016
6012016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75, 1947-1962, 2016
4352016
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
3892016
Structural minimax probability machine
B Gu, X Sun, VS Sheng
IEEE Transactions on Neural Networks and Learning Systems 28 (7), 1646-1656, 2016
3722016
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE transactions on dependable and secure computing 16 (6), 996-1010, 2017
3322017
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
3322014
Color image analysis by quaternion-type moments
B Chen, H Shu, G Coatrieux, G Chen, X Sun, JL Coatrieux
Journal of mathematical imaging and vision 51, 124-144, 2015
3082015
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
2842018
Fingerprint liveness detection based on multi-scale LPQ and PCA
C Yuan, X Sun, R Lv
China Communications 13 (7), 60-65, 2016
2652016
Fast motion estimation based on content property for low-complexity H. 265/HEVC encoder
Z Pan, J Lei, Y Zhang, X Sun, S Kwong
IEEE Transactions on Broadcasting 62 (3), 675-684, 2016
2522016
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
Z Xia, NN Xiong, AV Vasilakos, X Sun
Information Sciences 387, 195-204, 2017
2432017
Efficient algorithm for k-barrier coverage based on integer linear programming
Y Zhang, X Sun, B Wang
China Communications 13 (7), 16-23, 2016
2422016
Coverless image steganography without embedding
Z Zhou, H Sun, R Harit, X Chen, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
2272015
Dynamic resource allocation for load balancing in fog environment
X Xu, S Fu, Q Cai, W Tian, W Liu, W Dou, X Sun, AX Liu
Wireless Communications and Mobile Computing 2018 (1), 6421607, 2018
2252018
Towards privacy-preserving content-based image retrieval in cloud computing
Z Xia, Y Zhu, X Sun, Z Qin, K Ren
IEEE Transactions on Cloud Computing 6 (1), 276-286, 2015
2232015
The system can't perform the operation now. Try again later.
Articles 1–20