近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
近期论文
1、Cheng H., Wang H., Liu X., Fang Y., Wang M., Zhang X., Person Re-Identification over Encrypted Outsourced Surveillance Videos, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019.(JCR:Q1, CCF Rank A)(SCI)
2、Liang H., Zhang X., Cheng H., Huffman-code based retrieval for encrypted JPEG images, Journal of Visual Communication and Image Representation, 2019 Mar 26.(SCI)
3、Liang H., Zhang X., Cheng H., Wei Q., Secure and Efficient Image Retrieval over Encrypted Cloud Data, Security and Communication Networks, 2018.(SCI)
4、Zhang X., Tang Y., Wang H., Xu C., Miao Y., Cheng H., Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Information Sciences, 2019 Aug 1, 494:193-207.(JCR:Q1, CCF Rank B)(SCI)
5、Liang H., Zhang X., Wei Q., Cheng H., Secure image retrieval with multiple keys, Journal of Electronic Imaging, 27(2),, 2018.(SCI)
6、Cheng H., Wang J., Wang M., Zhong S., Toward privacy-preserving JPEG image retrieval, Journal of Electronic Imaging, 2017, 26(4): 043022. (SCI)
7、Cheng H., Zhang X., Yu J., Zhang Y, Encrypted JPEG image retrieval using block-wise feature comparison, Journal of Visual Communication and Image Representation, 2016, 40:111-117.(SCI)
8、Cheng H., Zhang X., Yu J., AC-coefficient histogram-based retrieval for encrypted JPEG images, Multimedia Tool and Application, 2016, 75: 13791-13803. (SCI)
9、Cheng H., Zhang X., Yu J., Li F., Markov Process Based Retrieval for Encrypted JPEG Images, EURASIP Journal on Information Security, 2016, 1:1-9. (EI)
10、Li F., Zhang X., Cheng H., Yu J., Digital image steganalysis based on local textural features and double dimensionality reduction, Security and Communication Networks, 2016, 9(8): 29-736.(SCI)
11、Yu J., Li F., Cheng H., Zhang X., Spatial Steganalysis Using Contrast of Residuals, IEEE Signal Processing Letters, 2016, 23(7):989-992.(SCI)
12、Zhang X., Long J., Wang Z., Cheng H., Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography, Circuits and Systems for Video Technology, IEEE Transactions on, 2015, 26(9):1622-1631.(JCR:Q1, CCF Rank B)(SCI)
13、Cheng H., Zhang X., Yu J., Li F., Markov Process Based Retrieval for Encrypted JPEG Images, Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, France, 2015.8.24-8.27.(EI)
14、Zhang X., Cheng H., Histogram-based retrieval for encrypted JPEG images, Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, Xi’an, China, 2014.7.9-7.13.(EI)
15、程航, 王子驰, 张新鹏, 基于图像块分组的加密域可逆信息隐藏, 北京工业大学学报, 2016, 42(5): 722-728.
16、童人婷, 程航, 张新鹏, 基于EVD变换的鲁棒音频水印算法, 上海大学学报, 2016, 22(4): 1 -12.
17、郑国华, 冯国瑞, 余江, 程航, 张新鹏, 基于LSB检测的JPEG隐写分析特征增强方法, 应用科 学学报, 2016, 34(6):671-676.
18、徐淼, 程航, 余江, 张新鹏, 基于新的失真代价函数的自适应JPEG隐写, 应用科学学报, 2015,33(3): 290-298.
19、程航, 栗风永, 余江, 张新鹏, 密文域信号处理研究进展, 第十一届全国信息隐藏暨多媒体信 息安全学术大会, 西安, 2013年10月, pp. 222-228.
20、余江, 栗风永, 程航, 张新鹏, 自适应多像素信息隐藏, 第十一届全国信息隐藏暨多媒体信息 安全学术大会, 西安, 2013年10月, pp. 52-57.