Suivre
Donghui HU
Donghui HU
College of Computer Science and Information Engineering, Hefei University of Technology, China
Adresse e-mail validée de hfut.edu.cn
Titre
Citée par
Citée par
Année
A novel image steganography method via deep convolutional generative adversarial networks
D Hu, L Wang, W Jiang, S Zheng, B Li
IEEE access 6, 38303-38314, 2018
2782018
Using randomized response for differential privacy preserving data collection.
Y Wang, X Wu, D Hu
EDBT/ICDT Workshops 1558, 0090-6778, 2016
1682016
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things
M Li, D Hu, C Lal, M Conti, Z Zhang
IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020
1582020
Coverless information hiding based on robust image hashing
S Zheng, L Wang, B Ling, D Hu
Intelligent Computing Methodologies: 13th International Conference, ICIC …, 2017
1282017
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
M Li, C Lal, M Conti, D Hu
Future Generation Computer Systems 115, 406-420, 2021
1022021
A new robust approach for reversible database watermarking with distortion control
D Hu, D Zhao, S Zheng
IEEE Transactions on Knowledge and Data Engineering 31 (6), 1024-1037, 2018
642018
Anonymizing classification data using rough set theory
M Ye, X Wu, X Hu, D Hu
Knowledge-Based Systems 43, 82-94, 2013
582013
Pedestrian detection based on fast R-CNN and batch normalization
ZQ Zhao, H Bian, D Hu, W Cheng, H Glotin
Intelligent Computing Theories and Application: 13th International …, 2017
562017
A blockchain-based trading system for big data
D Hu, Y Li, L Pan, M Li, S Zheng
Computer Networks 191, 107994, 2021
452021
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75, 13765-13778, 2016
432016
A blockchain-based trading platform for big data
S Zheng, L Pan, D Hu, M Li, Y Fan
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
382020
Lossless data hiding based on homomorphic cryptosystem
S Zheng, Y Wang, D Hu
IEEE Transactions on Dependable and Secure Computing 18 (2), 692-705, 2019
382019
Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
M Li, Y Chen, C Lal, M Conti, M Alazab, D Hu
IEEE Transactions on Dependable and Secure Computing 20 (1), 225-241, 2021
372021
Privacy-preserving navigation supporting similar queries in vehicular networks
M Li, Y Chen, S Zheng, D Hu, C Lal, M Conti
IEEE Transactions on Dependable and Secure Computing 19 (2), 1133-1148, 2020
362020
Digital image steganalysis based on visual attention and deep reinforcement learning
D Hu, S Zhou, Q Shen, S Zheng, Z Zhao, Y Fan
IEEE Access 7, 25924-25935, 2019
332019
An improved steganography without embedding based on attention GAN
C Yu, D Hu, S Zheng, W Jiang, M Li, Z Zhao
Peer-to-Peer Networking and Applications 14 (3), 1446-1457, 2021
292021
Knowledge reduction for decision tables with attribute value taxonomies
M Ye, X Wu, X Hu, D Hu
Knowledge-Based Systems 56, 68-78, 2014
252014
A spatial image steganography method based on nonnegative matrix factorization
D Hu, H Xu, Z Ma, S Zheng, B Li
IEEE signal processing letters 25 (9), 1364-1368, 2018
232018
The concept drift problem in Android malware detection and its solution
D Hu, Z Ma, X Zhang, P Li, D Ye, B Ling
Security and Communication Networks 2017, 2017
202017
Adaptive steganalysis based on selection region and combined convolutional neural networks
D Hu, Q Shen, S Zhou, X Liu, Y Fan, L Wang
Security and Communication Networks 2017, 2017
192017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20