A novel image steganography method via deep convolutional generative adversarial networks D Hu, L Wang, W Jiang, S Zheng, B Li IEEE Access 6, 38303-38314, 2018 | 157 | 2018 |
Using Randomized Response for Differential Privacy Preserving Data Collection. Y Wang, X Wu, D Hu EDBT/ICDT Workshops 1558, 0090-6778, 2016 | 104 | 2016 |
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things M Li, D Hu, C Lal, M Conti, Z Zhang IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020 | 90 | 2020 |
Coverless information hiding based on robust image hashing S Zheng, L Wang, B Ling, D Hu International conference on intelligent computing, 536-547, 2017 | 83 | 2017 |
Anonymizing classification data using rough set theory M Ye, X Wu, X Hu, D Hu Knowledge-Based Systems 43, 82-94, 2013 | 53 | 2013 |
A new robust approach for reversible database watermarking with distortion control D Hu, D Zhao, S Zheng IEEE Transactions on Knowledge and Data Engineering 31 (6), 1024-1037, 2018 | 43 | 2018 |
LEChain: A blockchain-based lawful evidence management scheme for digital forensics M Li, C Lal, M Conti, D Hu Future Generation Computer Systems 115, 406-420, 2021 | 39 | 2021 |
Pedestrian detection based on fast R-CNN and batch normalization ZQ Zhao, H Bian, D Hu, W Cheng, H Glotin International Conference on Intelligent Computing, 735-746, 2017 | 38 | 2017 |
Lossless data hiding algorithm for encrypted images with high capacity S Zheng, D Li, D Hu, D Ye, L Wang, J Wang Multimedia Tools and Applications 75 (21), 13765-13778, 2016 | 37 | 2016 |
Lossless data hiding based on homomorphic cryptosystem S Zheng, Y Wang, D Hu IEEE Transactions on Dependable and Secure Computing 18 (2), 692-705, 2019 | 23 | 2019 |
Knowledge reduction for decision tables with attribute value taxonomies M Ye, X Wu, X Hu, D Hu Knowledge-Based Systems 56, 68-78, 2014 | 23 | 2014 |
Digital image steganalysis based on visual attention and deep reinforcement learning D Hu, S Zhou, Q Shen, S Zheng, Z Zhao, Y Fan IEEE Access 7, 25924-25935, 2019 | 22 | 2019 |
A spatial image steganography method based on nonnegative matrix factorization D Hu, H Xu, Z Ma, S Zheng, B Li IEEE signal processing letters 25 (9), 1364-1368, 2018 | 18 | 2018 |
A blockchain-based trading platform for big data S Zheng, L Pan, D Hu, M Li, Y Fan IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 14 | 2020 |
The concept drift problem in Android malware detection and its solution D Hu, Z Ma, X Zhang, P Li, D Ye, B Ling Security and Communication Networks 2017, 2017 | 14 | 2017 |
Image authentication based on perceptual hash using Gabor filters L Wang, X Jiang, S Lian, D Hu, D Ye Soft Computing 15 (3), 493-504, 2011 | 14 | 2011 |
Privacy-preserving navigation supporting similar queries in vehicular networks M Li, Y Chen, S Zheng, D Hu, C Lal, M Conti IEEE Transactions on Dependable and Secure Computing, 2020 | 13 | 2020 |
Multi-level rough set reduction for decision rule mining M Ye, X Wu, X Hu, D Hu Applied intelligence 39 (3), 642-658, 2013 | 13 | 2013 |
DS evidence theory based digital image trustworthiness evaluation model D Hu, L Wang, Y Zhou, Y Zhou, X Jiang, L Ma 2009 International Conference on Multimedia Information Networking and …, 2009 | 13 | 2009 |
How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control X Hu, D Hu, S Zheng, W Li, F Chen, Z Shu, L Wang Multimedia Tools and Applications 77 (14), 18163-18185, 2018 | 12 | 2018 |