Follow
Zhihua Xia
Zhihua Xia
Verified email at jnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Z Xia, X Wang, X Sun, Q Wang
Parallel and Distributed Systems, IEEE Transactions on 27 (2), 340-352, 2016
14082016
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (11), 2594-2608, 2016
7762016
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
4352016
Steganalysis of least significant bit matching using multi‐order differences
Z Xia, X Wang, X Sun, B Wang
Security and Communication Networks 7 (8), 1283-1291, 2014
3322014
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
Z Xia, NN Xiong, AV Vasilakos, X Sun
Information Sciences 387, 195-204, 2017
2412017
Towards privacy-preserving content-based image retrieval in cloud computing
Z Xia, Y Zhu, X Sun, Z Qin, K Ren
IEEE Transactions on Cloud Computing 6 (1), 276-286, 2018
2222018
A survey on deepfake video detection
P Yu, Z Xia, J Fei, Y Lu
Iet Biometrics 10 (6), 607-624, 2021
1772021
Coverless image steganography based on SIFT and BOF
C Yuan, Z Xia, X Sun
網際網路技術學刊 18 (2), 435-442, 2017
1702017
A copy-move forgery detection method based on CMFD-SIFT
B Yang, X Sun, H Guo, Z Xia, X Chen
Multimedia Tools and Applications 77, 837-855, 2018
1212018
A novel weber local binary descriptor for fingerprint liveness detection
Z Xia, C Yuan, R Lv, X Sun, NN Xiong, YQ Shi
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (4), 1526-1536, 2018
1122018
Fingerprint liveness detection using an improved CNN with image scale equalization
C Yuan, Z Xia, L Jiang, Y Cao, QMJ Wu, X Sun
IEEE Access 7, 26953-26966, 2019
932019
BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing
Z Xia, L Jiang, D Liu, L Lu, B Jeon
IEEE Transactions on Services Computing 15 (1), 202-214, 2019
902019
Avoid-df: Audio-visual joint learning for detecting deepfake
W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren
IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023
852023
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking
Z Xia, Y Zhu, X Sun, L Chen
Journal of Cloud Computing 3, 1-11, 2014
842014
Improving generalization by commonality learning in face forgery detection
P Yu, J Fei, Z Xia, Z Zhou, J Weng
IEEE Transactions on Information Forensics and Security 17, 547-558, 2022
812022
Secure image LBP feature extraction in cloud-based smart campus
Z Xia, X Ma, Z Shen, X Sun, NN Xiong, B Jeon
IEEE Access 6, 30392-30401, 2018
742018
Reversible data hiding with automatic contrast enhancement for medical images
G Gao, S Tong, Z Xia, B Wu, L Xu, Z Zhao
Signal Processing 178, 107817, 2021
702021
Fingerprint liveness detection using gradient-based texture features
Z Xia, R Lv, Y Zhu, P Ji, H Sun, YQ Shi
Signal, Image and Video Processing 11 (2), 381–388, 2017
692017
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
Z Xia, L Lu, T Qiu, HJ Shim, X Chen, B Jeon
Computers, Materials & Continua 58 (1), 2019
662019
Deep residual network with adaptive learning framework for fingerprint liveness detection
C Yuan, Z Xia, X Sun, QMJ Wu
IEEE Transactions on Cognitive and Developmental Systems 12 (3), 461-473, 2019
652019
The system can't perform the operation now. Try again later.
Articles 1–20