Följ
Hang Cheng(程航)
Hang Cheng(程航)
Andra namnH Cheng
Verifierad e-postadress på fzu.edu.cn
Titel
Citeras av
Citeras av
År
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015
3222015
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng
Information Sciences 494, 193-207, 2019
872019
Markov process-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu, F Li
EURASIP Journal on Information Security 2016, 1-9, 2016
752016
Encrypted JPEG image retrieval using block-wise feature comparison
H Cheng, X Zhang, J Yu, Y Zhang
Journal of Visual Communication and Image Representation 40, 111-117, 2016
602016
AC-coefficient histogram-based retrieval for encrypted JPEG images
H Cheng, X Zhang, J Yu
Multimedia Tools and Applications 75, 13791-13803, 2016
332016
Huffman-code based retrieval for encrypted JPEG images
H Liang, X Zhang, H Cheng
Journal of Visual Communication and Image Representation 61, 149-156, 2019
312019
Spatial steganalysis using contrast of residuals
J Yu, F Li, H Cheng, X Zhang
IEEE Signal Processing Letters 23 (7), 989-992, 2016
312016
Histogram-based retrieval for encrypted JPEG images
X Zhang, H Cheng
2014 IEEE China Summit & International Conference on Signal and Information …, 2014
302014
Person re-identification over encrypted outsourced surveillance videos
H Cheng, H Wang, X Liu, Y Fang, M Wang, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1456-1473, 2019
272019
Digital image steganalysis based on local textural features and double dimensionality reduction
F Li, X Zhang, H Cheng, J Yu
Security and Communication Networks 9 (8), 729-736, 2016
182016
Model Poisoning Attack in Differential Privacy-Based Federated Learning
M Yang, H Cheng*, F Chen, X Liu, M Wang, X Li
Information Sciences 630, 158-172, 2023
152023
Secure and efficient image retrieval over encrypted cloud data
H Liang, X Zhang, H Cheng, Q Wei
Security and Communication Networks 2018, 2018
132018
SecureAD: A secure video anomaly detection framework on convolutional neural network in edge computing environment
H Cheng, X Liu, H Wang, Y Fang, M Wang, X Zhao
IEEE Transactions on Cloud Computing 10 (2), 1413-1427, 2020
102020
Privacy-preserving image watermark embedding method based on edge computing
H Cheng, Q Huang, F Chen, M Wang, W Yan
IEEE Access 10, 18570-18582, 2022
82022
Toward privacy-preserving JPEG image retrieval
H Cheng, J Wang, M Wang, S Zhong
Journal of Electronic Imaging 26 (4), 043022-043022, 2017
82017
Secure image retrieval with multiple keys
H Liang, X Zhang, Q Wei, H Cheng
Journal of Electronic Imaging 27 (2), 023032-023032, 2018
62018
Parallel Implementation of Fractal Image Compression in Web Service Environment
Y Fang, H Cheng, M Wang
2011 10th International Symposium on Distributed Computing and Applications …, 2011
62011
Lightweight Privacy-Preserving Feature Extraction for EEG Signals under Edge Computing
N Yan, H Cheng*, X Liu, F Chen, M Wang
IEEE Internet of Things Journal, 2023
22023
Local Property of Depth Information in 3D Images and Its Application in Feature Matching
E Yang, F Chen, M Wang, H Cheng, R Liu
Mathematics 11 (5), 1154, 2023
22023
DP-Face: privacy-preserving face recognition using siamese network
N Yan, H Cheng, M Wang, Q Huang, F Chen
2021 20th International Symposium on Distributed Computing and Applications …, 2021
22021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20