Efficient real-time integrity auditing with privacy-preserving arbitration for images in cloud storage system X Tang, Y Huang, CC Chang, L Zhou IEEE Access 7, 33009-33023, 2019 | 22 | 2019 |
On Whittaker modules over a class of algebras similar to U(sl 2) X Tang Frontiers of Mathematics in China 2, 127-142, 2007 | 16 | 2007 |
Automorphisms for some symmetric multiparameter quantized Weyl algebras and their localizations X Tang Algebra colloquium 24 (03), 419-438, 2017 | 14 | 2017 |
Reputation audit in multi-cloud storage through integrity verification and data dynamics X Tang, Y Qi, Y Huang 2016 IEEE 9th international conference on Cloud Computing (CLOUD), 624-631, 2016 | 12 | 2016 |
Ringel–Hall algebras and two-parameter quantized enveloping algebras X Tang Pacific journal of mathematics 247 (1), 213-240, 2010 | 12 | 2010 |
Cancellation problem for AS-regular algebras of dimension three X Tang, H Venegas, J Zhang Pacific J. Math 312 (1), 233-256, 2021 | 10 | 2021 |
Image authentication using QR code watermarking approach based on image segmentation X Liu, X Tang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 10 | 2020 |
Efficient cross-user deduplication of encrypted data through re-encryption X Tang, L Zhou, Y Huang, CC Chang 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 10 | 2018 |
Construct irreducible representations of quantum groups U q (ƒ m (K)) X Tang Frontiers of Mathematics in China 3, 371-397, 2008 | 10 | 2008 |
On representations of quantum groups Uq (fm (K, H)) X Tang, Y Xu Bulletin of the Australian Mathematical Society 78 (2), 261-284, 2008 | 9 | 2008 |
Aggregation-based tag deduplication for cloud storage with resistance against side channel attack X Tang, L Zhou, B Hu, H Wu Security and Communication Networks 2021, 1-15, 2021 | 8 | 2021 |
Border following–based reversible watermarking algorithm for images with resistance to histogram overflowing X Tang, L Zhou, D Liu, W Shan, Y Zhang International Journal of Distributed Sensor Networks 16 (5), 1550147720917014, 2020 | 8 | 2020 |
The automorphism groups for a family of generalized Weyl algebras X Tang Journal of Algebra and its Applications 17 (08), 1850142, 2018 | 8 | 2018 |
(Hopf) algebra automorphisms of the Hopf algebra X Tang Communications in Algebra 41 (8), 2996-3012, 2013 | 8 | 2013 |
Reversible data hiding based on improved rhombus predictor and prediction error expansion X Tang, L Zhou, D Liu, B Liu, X Lü 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 7 | 2020 |
Enabling Efficient Batch Updating Verification for Multi‐versioned Data in Cloud Storage Y Qi, X Tang, Y Huang Chinese Journal of Electronics 28 (2), 377-385, 2019 | 6 | 2019 |
Enabling efficient verification of dynamic data possession and batch updating in cloud storage Y Qi, X Tang, Y Huang KSII Transactions on Internet and Information Systems (TIIS) 12 (6), 2429-2449, 2018 | 6 | 2018 |
Derivations of the two-parameter quantized enveloping algebra X Tang Communications in Algebra 41 (12), 4602-4621, 2013 | 6 | 2013 |
Improved weighted average-based rhombus predictor in reversible data hiding using prediction error expansion L Chu, H Wu, Y Zeng, X Tang 2021 IEEE 6th International Conference on Computer and Communication Systems …, 2021 | 5 | 2021 |
Algebra endomorphisms and derivations of some localized down-up algebras X Tang Journal of Algebra and Its Applications 14 (03), 1550034, 2015 | 5 | 2015 |