夏志华

发布者:2023-11-15发布者:392

1.         Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Zhihua Xia, Gerald Schaefer, and Hui Fang, Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring, ACM Transactions on Intelligent Systems and Technology.

2.         Guangyong Gao, Hui Zhang, Zhihua Xia*, Xiangyang Luo, and Yun-Qing Shi, Reversible data hiding-based contrast enhancement with multi-group stretching for ROI of medical image, IEEE Transactions on Multimedia (2023).

3.         Xiang Liu, Xueli Zhao, Zhihua Xia*, Qian Feng, Peipeng Yu, and Jian Weng, Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction, IEEE Transactions on Image Processing, 32:  4635-4648, 2023.

4.         Chengsheng Yuan, Qiang Guo, Zhili Zhou, Zhangjie Fu, and Zhihua Xia, Deepfake fingerprint detection model Intellectual Property Protection via Ridge Texture Enhancement, IEEE Signal Processing Letters, 30: 843 – 847, 2023.

5.         Wenyuan Yang, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba, Zhihua Xia*, Xiaochun Cao, and Kui Ren, AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake, IEEE Transactions on Information Forensics and Security, 18: 2015-2029, 2023

6.         Peipeng Yu, Jian Tang, Zhihua Xia*, Zhetao Li, and Jian Weng, A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing, IEEE Transactions on Cloud Computing, 11(3): 2885 – 2896, 2023, 10.1109/TCC.2022.3233421

7.         Xueli Zhao and Zhihua Xia*, Secure Outsourced NB: Accurate and Efficient Privacy-preserving Naive Bayes Classification, Computers & Security, 124:103011, 2022, (CCF-B)

8.         Jianwei Fei, Zhihua Xia*, Benedetta Tondi, and Mauro Barni, Supervised GAN Watermarking for Intellectual Property Protection, IEEE WIFS, 2022

9.         Chengsheng Yuan, Peipeng Yu, Zhihua Xia*, Xingming Sun, Jonathan Wu, FLD-SRC: Fingerprint Liveness Detection for AFIS based on Spatial Ridges Continuity, IEEE Journal of Selected Topics in Signal Processing, 2022, 16(4): 817-827,

10.      Lizhi Xiong, Xiao Han, Ching-Nung Yang, and Zhihua Xia, RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers based on Secret Sharing, ACM Transactions on Multimedia Computing Communications and Applications, 2022, doi.org/10.1145/3512797

11.      Jianwei Fei, Yunshu Dai, Peipeng Yu, Zhihua Xia*, Tianrun Shen, and Jian Weng, Learning Second Order Local Anomaly for General Face Forgery Detection, CVPR, 2022

12.      Guangyong Gao, Shikun Tong, Zhihua Xia*, and Yun-Qing Shi, A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding, IEEE Transactions on Cloud Computing, 11(2): 1692-1706, 2022, 10.1109/TCC.2022.3155744

13.     Peipeng Yu, Jianwei Fei, Zhihua Xia*, Zhili Zhou, and Jian Weng, Improving Generalization by Commonality Learning in Face Forgery Detection, IEEE Transactions on Information Security and Forensics, 17: 547-58, DOI: 10.1109/TIFS.2022.3146781

14.      Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia*, Naixue Xiong,A novel coverless steganography method based on image selection and StarGAN, IEEE Transactions on Network Science and Engineering, 9(1): 219-230, 2022, 10.1109/TNSE.2020.3041529

15.      Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, and Byeungwoo Jeon, BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing, IEEE Transactions on Services Computing, 15(1): 202-214, 2022, DOI: 10.1109/TSC.2019.2927215 Zhihua Xia*, Qiuju Ji, Qi Gu, Chengsheng Yuan, Fengjun Xiao, A Format Compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-Words, ACM Transactions on Multimedia Computing Communications and Applications, 18(3): 85, 2022, 10.1145/3492705.

16.      Zhihua Xia*, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, and Neal N. Xiong. STR: Secure computation on additive shares using the share-transform-reveal strategy, IEEE Transactions on Computers, 2021, 10.1109/TC.2021.3073171

17.      Zhihua Xia, Lan Wang, Jian Tang, Naixue N. Xiong, Jian Weng. A privacy-preserving Image Retrieval Scheme using Secure Local Binary Pattern in Cloud Computing, IEEE Transactions on Network Science and Engineering, 2021, 8(1): 318-330, 10.1109/TNSE.2020.3038218

18.      Chengsheng Yuan, Zhihua Xia*, Xingming Sun, Q. M. Jonathan Wu, Deep Residual Network with Adaptive Learning Framework for Fingerprint Liveness Detection, IEEE Transactions on Cognitive and Developmental Systems, 12(3): 461-473, 2020, DOI: 10.1109/TCDS.2019.2920364

19.      Zhihua Xia, Leqi Jiang, Xiaohe Ma, Wenyuan Yang, Puzhao Ji, Naixue Xiong. A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 16(1): 629-638, 2020, 10.1109/TII.2019.2913217 (SCI)

20.      Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(4): 1526 – 1536, 2020, 10.1109/TSMC.2018.2874281

21.      Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, and Kui Ren, Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing. IEEE Transactions on Cloud Computing, 6(1): 276-286, 2018.

22.      Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren, A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2594-2608.

23.      Zhihua Xia, Xinhui Wang, Xingming Sun, and Qin Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352.