default search action
Zhangjie Fu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j79]Lisha Gao, Zhoujun Ma, Shuo Han, Tiancheng Zhao, Qingcheng Liu, Zhangjie Fu:
Robust Mixed-Rate Region-of-Interest-Aware Video Compressive Sensing for Transmission Line Surveillance Video. Inf. 15(9): 555 (2024) - [j78]Jingfa Pang, Chengsheng Yuan, Zhihua Xia, Xinting Li, Zhangjie Fu:
Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack. Knowl. Based Syst. 301: 112241 (2024) - [j77]Zhenshan Tan, Cheng Chen, Keyu Wen, Qingrong Cheng, Zhangjie Fu:
Bridging spatiotemporal feature gap for video salient object detection. Knowl. Based Syst. 304: 112505 (2024) - [j76]Xiao Li, Liquan Chen, Jianchang Lai, Zhangjie Fu, Suhui Liu:
GAN-based image steganography by exploiting transform domain knowledge with deep networks. Multim. Syst. 30(4): 224 (2024) - [j75]Fan Wang, Zhangjie Fu, Xiang Zhang, Junjie Lu:
Adversarial Embedding Steganography via Progressive Probability Optimizing and Discarded Stego Recycling. IEEE Signal Process. Lett. 31: 2920-2924 (2024) - [j74]Changhao Ding, Zhangjie Fu, Qi Yu, Fan Wang, Xianyi Chen:
Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network. IEEE Trans. Cogn. Dev. Syst. 16(2): 772-781 (2024) - [j73]Changhao Ding, Zhangjie Fu, Zhongliang Yang, Qi Yu, Daqiu Li, Yongfeng Huang:
Context-Aware Linguistic Steganography Model Based on Neural Machine Translation. IEEE ACM Trans. Audio Speech Lang. Process. 32: 868-878 (2024) - [j72]Fan Wang, Xiang Zhang, Zhangjie Fu:
An Iterative Two-Stage Probability Adjustment Strategy With Progressive Incremental Searching for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 34(10): 9428-9444 (2024) - [j71]Fuyuan Song, Jinwen Liang, Chuan Zhang, Zhangjie Fu, Zheng Qin, Song Guo:
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 21(4): 4006-4023 (2024) - [j70]Ziqiang Li, Hong Sun, Pengfei Xia, Beihao Xia, Xue Rui, Wei Zhang, Qinglang Guo, Zhangjie Fu, Bin Li:
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks. IEEE Trans. Inf. Forensics Secur. 19: 9730-9743 (2024) - [j69]Wenbin Huang, Hanyuan Chen, Hangcheng Cao, Ju Ren, Hongbo Jiang, Zhangjie Fu, Yaoxue Zhang:
Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems. IEEE Trans. Mob. Comput. 23(12): 11549-11563 (2024) - [i4]Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li:
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks. CoRR abs/2408.11587 (2024) - 2023
- [j68]Chengsheng Yuan, Qiang Guo, Zhili Zhou, Zhangjie Fu, Zhihua Xia:
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement. IEEE Signal Process. Lett. 30: 843-847 (2023) - [j67]Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. IEEE Trans. Dependable Secur. Comput. 20(5): 4118-4134 (2023) - [j66]Jian Su, Zhengguo Sheng, Alex X. Liu, Zhangjie Fu, Chenxi Huang:
An Efficient Missing Tag Identification Approach in RFID Collisions. IEEE Trans. Mob. Comput. 22(2): 720-731 (2023) - [j65]Jian Su, Zhengguo Sheng, Chenxi Huang, Gang Li, Alex X. Liu, Zhangjie Fu:
Identifying RFID Tags in Collisions. IEEE/ACM Trans. Netw. 31(4): 1507-1520 (2023) - [c24]Yifeng Bai, Zhirong Chen, Zhangjie Fu, Lang Peng, Pengpeng Liang, Erkang Cheng:
CurveFormer: 3D Lane Detection by Curve Propagation with Curve Queries and Attention. ICRA 2023: 7062-7068 - [c23]Lang Peng, Zhirong Chen, Zhangjie Fu, Pengpeng Liang, Erkang Cheng:
BEVSegFormer: Bird's Eye View Semantic Segmentation From Arbitrary Camera Rigs. WACV 2023: 5924-5932 - 2022
- [j64]Zhangjie Fu, Yan Wang, Xingming Sun, Xiaosong Zhang:
Semantic and secure search over encrypted outsourcing cloud based on BERT. Frontiers Comput. Sci. 16(2): 162802 (2022) - [j63]Tong Fu, Liquan Chen, Zhangjie Fu, Kunliang Yu, Yu Wang:
CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis. J. Vis. Commun. Image Represent. 88: 103633 (2022) - [j62]Kunliang Yu, Liquan Chen, Zhangjie Fu, Yu Wang, Tianyu Lu:
A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system. Signal Process. 199: 108630 (2022) - [j61]Zhangjie Fu, Qi Yu, Fan Wang, Changhao Ding:
HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis. IEEE Signal Process. Lett. 29: 1734-1738 (2022) - [j60]Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun:
Remote Attacks on Drones Vision Sensors: An Empirical Study. IEEE Trans. Dependable Secur. Comput. 19(5): 3125-3135 (2022) - [i3]Lang Peng, Zhirong Chen, Zhangjie Fu, Pengpeng Liang, Erkang Cheng:
BEVSegFormer: Bird's Eye View Semantic Segmentation From Arbitrary Camera Rigs. CoRR abs/2203.04050 (2022) - [i2]Zhili Zhou, Yuecheng Su, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. CoRR abs/2203.06598 (2022) - [i1]Yifeng Bai, Zhirong Chen, Zhangjie Fu, Lang Peng, Pengpeng Liang, Erkang Cheng:
CurveFormer: 3D Lane Detection by Curve Propagation with Curve Queries and Attention. CoRR abs/2209.07989 (2022) - 2021
- [j59]Daqiu Li, Zhangjie Fu, Jun Xu:
Stacked-autoencoder-based model for COVID-19 diagnosis on CT images. Appl. Intell. 51(5): 2805-2817 (2021) - [j58]Zhili Zhou, Meimin Wang, Ching-Nung Yang, Zhangjie Fu, Xingming Sun, Q. M. Jonathan Wu:
Blockchain-based decentralized reputation system in E-commerce environment. Future Gener. Comput. Syst. 124: 155-167 (2021) - [c22]Enlu Li, Zhangjie Fu, Junfu Chen:
Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning. ICIG (3) 2021: 155-167 - [c21]Junfu Chen, Zhangjie Fu, Xingming Sun, Enlu Li:
Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain. ICIG (1) 2021: 641-653 - [c20]Junfu Chen, Zhangjie Fu, Xingming Sun, Enlu Li:
Multi-scale Extracting and Second-Order Statistics for Lightweight Steganalysis. PRCV (2) 2021: 548-559 - 2020
- [j57]Chao Liu, Deze Zeng, Hong Yao, Xuesong Yan, Linchen Yu, Zhangjie Fu:
An efficient iterative graph data processing framework based on bulk synchronous parallel model. Concurr. Comput. Pract. Exp. 32(3) (2020) - [j56]Zhangjie Fu, Fan Wang, Xu Cheng:
The secure steganography for hiding images via GAN. EURASIP J. Image Video Process. 2020(1): 46 (2020) - [j55]Jiashuang Xu, Zhangjie Fu, Xingyue Du:
Graffiti-writing recognition with fine-grained information. Int. J. Comput. Sci. Eng. 21(2): 163-172 (2020) - [j54]Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu:
Security and Privacy Issues of UAV: A Survey. Mob. Networks Appl. 25(1): 95-101 (2020) - [j53]Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian:
Confusing-Keyword Based Secure Search over Encrypted Cloud Data. Mob. Networks Appl. 25(1): 125-132 (2020) - [j52]Cheng Guo, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, Bin Feng:
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption. IEEE Trans. Serv. Comput. 13(6): 1034-1044 (2020) - [j51]Jian Su, Zhengguo Sheng, Alex X. Liu, Zhangjie Fu, Yongrui Chen:
A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems. IEEE Trans. Wirel. Commun. 19(5): 2974-2986 (2020) - [c19]Yanru Xiao, Mingming Lu, Zhangjie Fu:
Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks. ICAIS (1) 2020: 133-141 - [c18]Xu Cheng, Enlu Li, Zhangjie Fu:
Residual Attention SiameseRPN for Visual Tracking. PRCV (2) 2020: 407-419
2010 – 2019
- 2019
- [j50]Zhangjie Fu, Yiming Chen, Yongjie Ding, Daojing He:
Pollution Source Localization Based on Multi-UAV Cooperative Communication. IEEE Access 7: 29304-29312 (2019) - [j49]Zhangjie Fu, Yuanhang Mao, Daojing He, Jingnan Yu, Guowu Xie:
Secure Multi-UAV Collaborative Task Allocation. IEEE Access 7: 35579-35587 (2019) - [j48]Ruohan Meng, Qi Cui, Zhili Zhou, Zhangjie Fu, Xingming Sun:
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things. IEEE Access 7: 90574-90584 (2019) - [j47]Qi Cui, Zhili Zhou, Zhangjie Fu, Ruohan Meng, Xingming Sun, Q. M. Jonathan Wu:
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things. IEEE Access 7: 90815-90824 (2019) - [j46]Yangen Liu, Zhangjie Fu:
Secure search service based on word2vec in the public cloud. Int. J. Comput. Sci. Eng. 18(3): 305-313 (2019) - [j45]Hongyong Ji, Zhangjie Fu:
Coverless information hiding method based on the keyword. Int. J. High Perform. Comput. Netw. 14(1): 1-7 (2019) - [j44]Huanzhou Zhu, Ligang He, Songling Fu, Rui Li, Xie Han, Zhangjie Fu, Yongjian Hu, Chang-Tsun Li:
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU. Int. J. Parallel Program. 47(4): 644-667 (2019) - [j43]Zhangjie Fu, Jiashuang Xu, Zhuangdi Zhu, Alex X. Liu, Xingming Sun:
Writing in the Air with WiFi Signals for Virtual Reality Devices. IEEE Trans. Mob. Comput. 18(2): 473-484 (2019) - [j42]Zhangjie Fu, Fengxiao Huang, Xingming Sun, Athanasios V. Vasilakos, Ching-Nung Yang:
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data. IEEE Trans. Serv. Comput. 12(5): 813-823 (2019) - [c17]Shanshan Shi, Yu Zhang, Chen Fang, Yufei Wang, Anan Ni, Zhangjie Fu:
Energy Management Mode of the Photovoltaic Power Station with Energy Storage Based on the Photovoltaic Power Prediction. ICSAI 2019: 319-324 - [c16]Linyan Xu, Zhangjie Fu, Liran Ma:
An Integrated UAV Platform for Real-Time and Efficient Environmental Monitoring. WASA 2019: 395-406 - 2018
- [j41]Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. Future Gener. Comput. Syst. 79: 417-430 (2018) - [j40]Tie Qiu, Aoyang Zhao, Ruixin Ma, Victor Chang, Fangbing Liu, Zhangjie Fu:
A task-efficient sink node based on embedded multi-core SoC for Internet of Things. Future Gener. Comput. Syst. 82: 656-666 (2018) - [j39]Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li:
Modelling and developing conflict-aware scheduling on large-scale data centres. Future Gener. Comput. Syst. 86: 995-1007 (2018) - [j38]Tong Li, Zheli Liu, Chunfu Jia, Zhangjie Fu, Jin Li:
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud. Int. J. Web Grid Serv. 14(1): 21-43 (2018) - [j37]Deze Zeng, Shiyan Zhang, Lin Gu, Shui Yu, Zhangjie Fu:
Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system. J. Netw. Comput. Appl. 103: 274-279 (2018) - [j36]Ran Li, Zhenghui Liu, Yu Zhang, Yanling Li, Zhangjie Fu:
Noise-level estimation based detection of motion-compensated frame interpolation in video sequences. Multim. Tools Appl. 77(1): 663-688 (2018) - [j35]Ran Li, Wei He, Zhenghui Liu, Yanling Li, Zhangjie Fu:
Saliency-based adaptive compressive sampling of images using measurement contrast. Multim. Tools Appl. 77(10): 12139-12156 (2018) - [j34]Cheng Guo, Huan Zhang, Zhangjie Fu, Bin Feng, Mingchu Li:
A novel proactive secret image sharing scheme based on LISS. Multim. Tools Appl. 77(15): 19569-19590 (2018) - [j33]Zhenghong Wang, Zhangjie Fu, Xingming Sun:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. Secur. Commun. Networks 2018: 1420930:1-1420930:10 (2018) - [j32]Zhangjie Fu, Lili Xia, Xingming Sun, Alex X. Liu, Guowu Xie:
Semantic-Aware Searching Over Encrypted Data for Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(9): 2359-2371 (2018) - [j31]Zhangjie Fu, Jingnan Yu, Guowu Xie, Yiming Chen, Yuanhang Mao:
A Heuristic Evolutionary Algorithm of UAV Path Planning. Wirel. Commun. Mob. Comput. 2018: 2851964:1-2851964:11 (2018) - [c15]Lili Xia, Zhangjie Fu:
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud. NSS 2018: 151-159 - 2017
- [j30]Tie Qiu, Ning Chen, Keqiu Li, Daji Qiao, Zhangjie Fu:
Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks 55: 143-152 (2017) - [j29]Hong Yao, Changmin Bai, Muzhou Xiong, Deze Zeng, Zhangjie Fu:
Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing. Concurr. Comput. Pract. Exp. 29(16) (2017) - [j28]Cheng Chang, Ligang He, Nadeem Chaudhary, Songling Fu, Hao Chen, Jianhua Sun, Kenli Li, Zhangjie Fu, Ming-Liang Xu:
Performance analysis and optimization for workflow authorization. Future Gener. Comput. Syst. 67: 194-205 (2017) - [j27]Qi Liu, Weidong Cai, Qiang Liu, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. KSII Trans. Internet Inf. Syst. 11(2): 670-686 (2017) - [j26]Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. KSII Trans. Internet Inf. Syst. 11(6): 3230-3253 (2017) - [j25]Yingmo Jie, Cheng Guo, Zhangjie Fu:
Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields. J. Comb. Optim. 34(1): 245-256 (2017) - [j24]Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu:
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48: 182-194 (2017) - [j23]Cheng Guo, Qiongqiong Yuan, Kun Lu, Mingchu Li, Zhangjie Fu:
(t, n) Threshold secret image sharing scheme with adversary structure. Multim. Tools Appl. 76(20): 21193-21210 (2017) - [j22]Ran Li, Hongbing Liu, Zhenghui Liu, Yanling Li, Zhangjie Fu:
Motion-compensated frame interpolation using patch-based sparseland model. Signal Process. Image Commun. 54: 36-48 (2017) - [j21]Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(8): 1874-1884 (2017) - [j20]Zhangjie Fu, Xinle Wu, Qian Wang, Kui Ren:
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(12): 2986-2997 (2017) - [j19]Zhifeng Bao, Yi Yu, Jian Shen, Zhangjie Fu:
A query refinement framework for xml keyword search. World Wide Web 20(6): 1469-1505 (2017) - 2016
- [j18]Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, Tie Qiu:
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing. IEEE Access 4: 7899-7911 (2016) - [j17]Wenting Shen, Jia Yu, Guangyang Yang, Yue Zhang, Zhangjie Fu, Rong Hao:
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data. KSII Trans. Internet Inf. Syst. 10(7): 3319-3338 (2016) - [j16]Xinyue Cao, Zhangjie Fu, Xingming Sun:
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing. J. Electr. Comput. Eng. 2016: 3219042:1-3219042:7 (2016) - [j15]Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao:
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113: 130-139 (2016) - [j14]Qi Liu, Weidong Cai, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Networks 9(17): 4002-4012 (2016) - [j13]Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang:
Privacy-preserving outsourced gene data search in encryption domain. Secur. Commun. Networks 9(18): 5178-5186 (2016) - [j12]Qi Liu, Weidong Cai, Dandan Jin, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment. Sensors 16(9): 1386 (2016) - [j11]Zhangjie Fu, Xinle Wu, Chaowen Guan, Xingming Sun, Kui Ren:
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans. Inf. Forensics Secur. 11(12): 2706-2716 (2016) - [j10]Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, Fengxiao Huang:
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Trans. Parallel Distributed Syst. 27(9): 2546-2559 (2016) - [j9]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c14]Zhangjie Fu, Xinyue Cao:
An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking. ICCCS (1) 2016: 468-474 - [c13]Ching-Nung Yang, Zong-Xuan Yeh, Shen-Chieh Hsu, Zhangjie Fu:
Enhancing security for two-party comparison over encrypted data. ICSAI 2016: 439-443 - [c12]Zhangjie Fu, Xingming Sun, Sai Ji, Guowu Xie:
Towards efficient content-aware search over encrypted outsourced data in cloud. INFOCOM 2016: 1-9 - 2015
- [j8]Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu:
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing. J. Comput. Inf. Technol. 23(4): 341-355 (2015) - [j7]Zhangjie Fu, Xingming Sun, Qi Liu, Lu Zhou, Jiangang Shu:
Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans. Commun. 98-B(1): 190-200 (2015) - [j6]Zhangjie Fu, Xingming Sun, Jie Xi:
Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication. J. Commun. Networks 17(5): 525-533 (2015) - [c11]Qi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge:
VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment. CBD 2015: 69-72 - [c10]Qi Liu, Weidong Cai, Zhangjie Fu, Jian Shen, Nigel Linge:
An Optimized Strategy for Speculative Execution in a Heterogeneous Environment. FGCN 2015: 9-12 - [c9]Qi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge:
An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform. ICCCS 2015: 417-423 - 2014
- [j5]Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang, Zhangjie Fu:
A novel signature based on the combination of global and local signatures for image copy detection. Secur. Commun. Networks 7(11): 1702-1711 (2014) - [j4]Zhangjie Fu, Xingming Sun, Nigel Linge, Lu Zhou:
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans. Consumer Electron. 60(1): 164-172 (2014) - [j3]Zhangjie Fu, Jiangang Shu, Xingming Sun, Nigel Linge:
Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans. Consumer Electron. 60(4): 762-770 (2014) - [c8]Zhangjie Fu, Jiangang Shu, Xingming Sun, Daxing Zhang:
Semantic keyword search based on trie over encrypted cloud data. SCC@ASIACCS 2014: 59-62 - [c7]Zhangjie Fu, Xinyue Cao, Jin Wang, Xingming Sun:
Secure Storage of Data in Cloud Computing. IIH-MSP 2014: 783-786 - [c6]Zhangjie Fu, Jie Xi, Jin Wang, Xingming Sun:
Document Attribute-Based Keyword Search over Encrypted Data. IIH-MSP 2014: 787-790 - [c5]Zhangjie Fu, Jiangang Shu, Jin Wang, Xingming Sun:
A Similarity Search Method for Encrypted Cloud Document. IIH-MSP 2014: 791-794 - [c4]Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi:
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection. IWDW 2014: 60-71 - [c3]Zhangjie Fu, Jiangang Shu, Xingming Sun:
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability. SecureComm (1) 2014: 45-54 - 2013
- [c2]Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu:
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. IPCCC 2013: 1-8 - [c1]Zhangjie Fu, Xingming Sun, Lu Zhou, Jiangang Shu:
New Forensic Methods for OOXML Format Documents. IWDW 2013: 503-513 - 2012
- [j2]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Networks 5(9): 957-968 (2012) - 2011
- [j1]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Forensic investigation of OOXML format documents. Digit. Investig. 8(1): 48-55 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint