Selective encryption on ECG data in body sensor network based on supervised machine learning H Qiu, M Qiu, Z Lu Information Fusion 55, 59-67, 2020 | 105 | 2020 |
A user-centric data protection method for cloud storage based on invertible DWT H Qiu, H Noura, M Qiu, Z Ming, G Memmi IEEE Transactions on Cloud Computing 9 (4), 1293 - 1304, 2021 | 103 | 2021 |
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0 H Qiu, M Qiu, M Liu, G Memmi IEEE journal of biomedical and health informatics 24 (9), 2499-2505, 2020 | 90 | 2020 |
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction H Qiu, Q Zheng, M Msahli, G Memmi, M Qiu, J Lu IEEE Transactions on Intelligent Transportation Systems, 2020 | 81 | 2020 |
Adversarial Attacks against Network Intrusion Detection in IoT Systems H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu IEEE Internet of Things Journal 8 (13), 10327-10335, 2020 | 72 | 2020 |
An Efficient Key Distribution System for Data Fusion in V2X Heterogeneous Networks H Qiu, M Qiu, L Zhihui, G Memmi Information Fusion 50, 212-220, 2019 | 51 | 2019 |
Deep residual learning-based enhanced JPEG compression in the Internet of Things H Qiu, Q Zheng, G Memmi, J Lu, M Qiu, B Thuraisingham IEEE Transactions on Industrial Informatics 17 (3), 2124-2133, 2020 | 46 | 2020 |
All-Or-Nothing data protection for ubiquitous communication: challenges and perspectives H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi Information Sciences 502, 434-445, 2019 | 44 | 2019 |
Secure V2X Communication Network based on Intelligent PKI and Edge Computing H Qiu, M Qiu, L Ruqian IEEE Network 34 (2), 172-178, 2020 | 37 | 2020 |
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham The 16th ACM ASIA Conference on Computer and Communications Security (ACM …, 2021 | 35 | 2021 |
A data augmentation-based defense method against adversarial attacks in neural networks Y Zeng, H Qiu, G Memmi, M Qiu International Conference on Algorithms and Architectures for Parallel …, 2020 | 27 | 2020 |
Towards Secure and Efficient Deep Learning Inference in Dependable IoT Systems H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu IEEE Internet of Things Journal 8 (5), 3180-3188, 2020 | 23 | 2020 |
Lightweight Selective Encryption for Social Data Protection based on EBCOT Coding H Qiu, M Qiu, M Liu, Z Ming IEEE Transactions on Computational Social Systems 7 (1), 205-214, 2020 | 21 | 2020 |
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu International Joint Conference on Artificial Intelligence (IJCAI), 2021, 2021 | 19* | 2021 |
HAPE: A programmable big knowledge graph platform R Lu, C Fei, C Wang, S Gao, H Qiu, S Zhang, C Cao Information Sciences 509, 87-103, 2020 | 19 | 2020 |
Fast selective encryption method for bitmaps based on GPU acceleration H Qiu, G Memmi 2014 IEEE International Symposium on Multimedia, 155-158, 2014 | 18 | 2014 |
NFV Platforms: Taxonomy, Design Choices, and Future Challenges T Zhang, H Qiu, L Linguaglossa, W Cerroni, P Giaccone IEEE Transactions on Network and Service Management 18 (1), 30-48, 2021 | 17 | 2021 |
Data protection: Combining fragmentation, encryption, and dispersion G Memmi, K Kapusta, H Qiu 2015 International Conference on Cyber Security of Smart Cities, Industrial …, 2015 | 17 | 2015 |
Review on image processing based adversarial example defenses in computer vision M Qiu, H Qiu 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 16 | 2020 |
An efficient secure storage scheme based on information fragmentation H Qiu, G Memmi, H Noura 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 16 | 2017 |