Donghui HU
Donghui HU
College of Computer Science and Information Engineering, Hefei University of Technology, China
Verified email at
Cited by
Cited by
A novel image steganography method via deep convolutional generative adversarial networks
D Hu, L Wang, W Jiang, S Zheng, B Li
IEEE Access 6, 38303-38314, 2018
Using Randomized Response for Differential Privacy Preserving Data Collection.
Y Wang, X Wu, D Hu
EDBT/ICDT Workshops 1558, 0090-6778, 2016
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things
M Li, D Hu, C Lal, M Conti, Z Zhang
IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020
Coverless information hiding based on robust image hashing
S Zheng, L Wang, B Ling, D Hu
International conference on intelligent computing, 536-547, 2017
Anonymizing classification data using rough set theory
M Ye, X Wu, X Hu, D Hu
Knowledge-Based Systems 43, 82-94, 2013
A new robust approach for reversible database watermarking with distortion control
D Hu, D Zhao, S Zheng
IEEE Transactions on Knowledge and Data Engineering 31 (6), 1024-1037, 2018
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
M Li, C Lal, M Conti, D Hu
Future Generation Computer Systems 115, 406-420, 2021
Pedestrian detection based on fast R-CNN and batch normalization
ZQ Zhao, H Bian, D Hu, W Cheng, H Glotin
International Conference on Intelligent Computing, 735-746, 2017
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75 (21), 13765-13778, 2016
Lossless data hiding based on homomorphic cryptosystem
S Zheng, Y Wang, D Hu
IEEE Transactions on Dependable and Secure Computing 18 (2), 692-705, 2019
Knowledge reduction for decision tables with attribute value taxonomies
M Ye, X Wu, X Hu, D Hu
Knowledge-Based Systems 56, 68-78, 2014
Digital image steganalysis based on visual attention and deep reinforcement learning
D Hu, S Zhou, Q Shen, S Zheng, Z Zhao, Y Fan
IEEE Access 7, 25924-25935, 2019
A spatial image steganography method based on nonnegative matrix factorization
D Hu, H Xu, Z Ma, S Zheng, B Li
IEEE signal processing letters 25 (9), 1364-1368, 2018
A blockchain-based trading platform for big data
S Zheng, L Pan, D Hu, M Li, Y Fan
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
The concept drift problem in Android malware detection and its solution
D Hu, Z Ma, X Zhang, P Li, D Ye, B Ling
Security and Communication Networks 2017, 2017
Image authentication based on perceptual hash using Gabor filters
L Wang, X Jiang, S Lian, D Hu, D Ye
Soft Computing 15 (3), 493-504, 2011
Privacy-preserving navigation supporting similar queries in vehicular networks
M Li, Y Chen, S Zheng, D Hu, C Lal, M Conti
IEEE Transactions on Dependable and Secure Computing, 2020
Multi-level rough set reduction for decision rule mining
M Ye, X Wu, X Hu, D Hu
Applied intelligence 39 (3), 642-658, 2013
DS evidence theory based digital image trustworthiness evaluation model
D Hu, L Wang, Y Zhou, Y Zhou, X Jiang, L Ma
2009 International Conference on Multimedia Information Networking and …, 2009
How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control
X Hu, D Hu, S Zheng, W Li, F Chen, Z Shu, L Wang
Multimedia Tools and Applications 77 (14), 18163-18185, 2018
The system can't perform the operation now. Try again later.
Articles 1–20