A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data Z Xia, X Wang, X Sun, Q Wang IEEE transactions on parallel and distributed systems 27 (2), 340-352, 2015 | 1408 | 2015 |
Segmentation-based image copy-move forgery detection scheme J Li, X Li, B Yang, X Sun IEEE transactions on information forensics and security 10 (3), 507-518, 2014 | 999 | 2014 |
Enabling personalized search over encrypted outsourced data with efficiency improvement Z Fu, K Ren, J Shu, X Sun, F Huang IEEE transactions on parallel and distributed systems 27 (9), 2546-2559, 2015 | 857 | 2015 |
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing Z Fu, X Sun, Q Liu, L Zhou, J Shu IEICE Transactions on Communications 98 (1), 190-200, 2015 | 790 | 2015 |
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren IEEE transactions on information forensics and security 11 (11), 2594-2608, 2016 | 776 | 2016 |
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement Z Fu, X Wu, C Guan, X Sun, K Ren IEEE Transactions on Information Forensics and Security 11 (12), 2706-2716, 2016 | 601 | 2016 |
Steganalysis of LSB matching using differences between nonadjacent pixels Z Xia, X Wang, X Sun, Q Liu, N Xiong Multimedia Tools and Applications 75, 1947-1962, 2016 | 435 | 2016 |
Effective and efficient global context verification for image copy detection Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016 | 389 | 2016 |
Structural minimax probability machine B Gu, X Sun, VS Sheng IEEE Transactions on Neural Networks and Learning Systems 28 (7), 1646-1656, 2016 | 372 | 2016 |
Block design-based key agreement for group data sharing in cloud computing J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang IEEE transactions on dependable and secure computing 16 (6), 996-1010, 2017 | 332 | 2017 |
Steganalysis of least significant bit matching using multi‐order differences Z Xia, X Wang, X Sun, B Wang Security and Communication Networks 7 (8), 1283-1291, 2014 | 332 | 2014 |
Color image analysis by quaternion-type moments B Chen, H Shu, G Coatrieux, G Chen, X Sun, JL Coatrieux Journal of mathematical imaging and vision 51, 124-144, 2015 | 308 | 2015 |
A lightweight multi-layer authentication protocol for wireless body area networks J Shen, S Chang, J Shen, Q Liu, X Sun Future generation computer systems 78, 956-963, 2018 | 284 | 2018 |
Fingerprint liveness detection based on multi-scale LPQ and PCA C Yuan, X Sun, R Lv China Communications 13 (7), 60-65, 2016 | 265 | 2016 |
Fast motion estimation based on content property for low-complexity H. 265/HEVC encoder Z Pan, J Lei, Y Zhang, X Sun, S Kwong IEEE Transactions on Broadcasting 62 (3), 675-684, 2016 | 252 | 2016 |
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing Z Xia, NN Xiong, AV Vasilakos, X Sun Information Sciences 387, 195-204, 2017 | 243 | 2017 |
Efficient algorithm for k-barrier coverage based on integer linear programming Y Zhang, X Sun, B Wang China Communications 13 (7), 16-23, 2016 | 242 | 2016 |
Coverless image steganography without embedding Z Zhou, H Sun, R Harit, X Chen, X Sun Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015 | 227 | 2015 |
Dynamic resource allocation for load balancing in fog environment X Xu, S Fu, Q Cai, W Tian, W Liu, W Dou, X Sun, AX Liu Wireless Communications and Mobile Computing 2018 (1), 6421607, 2018 | 225 | 2018 |
Towards privacy-preserving content-based image retrieval in cloud computing Z Xia, Y Zhu, X Sun, Z Qin, K Ren IEEE Transactions on Cloud Computing 6 (1), 276-286, 2015 | 223 | 2015 |