


default search action
Tao Xiang 0001
Person information
- affiliation: Chongqing University, College of Computer Science, Chongqing, China
Other persons with the same name
- Tao Xiang — disambiguation page
- Tao Xiang 0002
— University of Surrey, Computer Vision and Machine Learning at the Centre for Vision Speech and Signal Processing, Guildford, GB
- Tao Xiang 0003
— Technical University of Munich, Munich, Germany
- Tao Xiang 0004 — Queen Mary University of London, London, UK
- Tao Xiang 0005 — University of Surrey, Guildford, UK
- Tao Xiang 0006
— Southwest China Institute of Electronic Technology, CETC Key Laboratory of Avionics Information System Technology, Chengdu, China (and 1 more)
- Tao Xiang 0007 — Visva, Inc., VISVA Corporation, Cupertino, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j149]Lishuang Hu, Tao Xiang, Shangwei Guo, Xiaoguo Li, Yi Yang:
Perceptual visual security index: Analyzing image content leakage for vision language models. J. Inf. Secur. Appl. 89: 103988 (2025) - [j148]Jiajun Chen
, Chunqiang Hu
, Zewei Liu
, Tao Xiang
, Pengfei Hu
, Jiguo Yu
:
Secret Specification Based Personalized Privacy-Preserving Analysis in Big Data. IEEE Trans. Big Data 11(2): 774-787 (2025) - [j147]Yan Gan, Chengqian Wu, Deqiang Ouyang, Song Tang, Mao Ye, Tao Xiang:
LESEP: Boosting Adversarial Transferability via Latent Encoding and Semantic Embedding Perturbations. IEEE Trans. Circuits Syst. Video Technol. 35(4): 3368-3382 (2025) - [j146]Zewei Liu, Chunqiang Hu, Tao Xiang, Pengfei Hu, Xingwang Li, Jiguo Yu:
A Novel Sparrow Search Scheme Based on Enhanced Differential Evolution Operator. IEEE Trans. Emerg. Top. Comput. Intell. 9(2): 1253-1268 (2025) - [j145]Kuiyuan Zhang
, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. IEEE Trans. Inf. Forensics Secur. 20: 871-885 (2025) - [j144]Hangcheng Liu
, Yuan Zhou
, Ying Yang
, Qingchuan Zhao
, Tianwei Zhang
, Tao Xiang
:
Stealthiness Assessment of Adversarial Perturbation: From a Visual Perspective. IEEE Trans. Inf. Forensics Secur. 20: 898-913 (2025) - [j143]Jiajun Chen, Chunqiang Hu, Weihong Sheng, Tao Xiang, Pengfei Hu, Jiguo Yu:
Sensitivity-Aware Personalized Differential Privacy Guarantees for Online Social Networks. IEEE Trans. Inf. Forensics Secur. 20: 3116-3130 (2025) - [j142]Xu Zhang
, Tao Xiang
, Shangwei Guo
, Fei Yang
, Tianwei Zhang
:
Deep Face Leakage: Inverting High-Quality Faces From Gradients Using Residual Optimization. IEEE Trans. Image Process. 34: 1560-1572 (2025) - [j141]Zhouyong Tan
, Junqing Le
, Fan Yang
, Min Huang
, Tao Xiang
, Xiaofeng Liao
:
Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation. IEEE Trans. Sustain. Comput. 10(1): 132-145 (2025) - [j140]Gao Liu
, Hao Li
, Junqing Le
, Ning Wang
, Yining Liu
, Tao Xiang
:
LRCPA: Lattice-Based Robust and Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Veh. Technol. 74(3): 4698-4712 (2025) - [j139]Mimi Ma
, Biwen Chen
, Dianhua Tang
, Miaolei Deng, Tao Xiang
, Debiao He
:
Certificateless Searchable Public Key Encryption With Trapdoor Indistinguishability for IoV. IEEE Trans. Veh. Technol. 74(3): 5085-5096 (2025) - [c62]Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng:
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems. NDSS 2025 - [c61]Hao Yu, Chuan Ma, Xinhang Wan, Jun Wang, Tao Xiang, Meng Shen, Xinwang Liu:
DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning. NDSS 2025 - [c60]Hao Wang, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang, Tao Xiang:
Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability. WWW 2025: 840-851 - [c59]Wenwen Meng, Chuan Ma, Ming Ding, Chunpeng Ge, Yuwen Qian, Tao Xiang:
Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks. WWW 2025: 1068-1077 - [i27]Beibei Li, Tao Xiang, Beihong Jin, Yiyuan Zheng, Rui Zhao:
Semantic Gaussian Mixture Variational Autoencoder for Sequential Recommendation. CoRR abs/2502.16140 (2025) - [i26]Zhixiong Nan, Xianghong Li, Jifeng Dai, Tao Xiang:
MI-DETR: An Object Detection Model with Multi-time Inquiries Mechanism. CoRR abs/2503.01463 (2025) - 2024
- [j138]Fei Yang, Xu Zhang, Shangwei Guo, Daiyuan Chen, Yan Gan, Tao Xiang, Yang Liu
:
Robust and privacy-preserving collaborative training: a comprehensive survey. Artif. Intell. Rev. 57(7): 180 (2024) - [j137]Fei Chen, Jianquan Cai, Tao Xiang, Xiaofeng Liao:
Practical cloud storage auditing using serverless computing. Sci. China Inf. Sci. 67(3) (2024) - [j136]Zhirui Zeng, Jialing He, Tao Xiang, Ning Wang, Biwen Chen, Shangwei Guo:
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score. Cogn. Comput. 16(6): 3379-3390 (2024) - [j135]Tao Xiang
, Zhongming Wang
, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen:
StopGuess: A framework for public-key authenticated encryption with keyword search. Comput. Stand. Interfaces 88: 103805 (2024) - [j134]Zewei Liu
, Chunqiang Hu
, Conghao Ruan
, Linghao Zhang, Pengfei Hu
, Tao Xiang
:
A Privacy-Preserving Matching Service Scheme for Power Data Trading. IEEE Internet Things J. 11(19): 32296-32309 (2024) - [j133]Tao Xiang, Fei Ouyang
, Di Zhang, Chunlong Xie, Hao Wang
:
NLPSweep: A comprehensive defense scheme for mitigating NLP backdoor attacks. Inf. Sci. 661: 120176 (2024) - [j132]Fei Chen
, Fengming Meng, Zhipeng Li, Li Li, Tao Xiang:
Public cloud object storage auditing: Design, implementation, and analysis. J. Parallel Distributed Comput. 189: 104870 (2024) - [j131]Yan Gan, Tao Xiang, Deqiang Ouyang, Mingliang Zhou, Mao Ye:
SPGAN: Siamese projection Generative Adversarial Networks. Knowl. Based Syst. 285: 111353 (2024) - [j130]Senlin Shu, Haobo Wang, Zhuowei Wang, Bo Han, Tao Xiang, Bo An, Lei Feng
:
Online binary classification from similar and dissimilar data. Mach. Learn. 113(6): 3463-3484 (2024) - [j129]Hong Huang, Xinyu Lei, Tao Xiang:
Mitigating cross-client GANs-based attack in federated learning. Multim. Tools Appl. 83(4): 10925-10949 (2024) - [j128]Shuren Qi
, Yushu Zhang
, Chao Wang
, Tao Xiang
, Xiaochun Cao
, Yong Xiang
:
Representing Noisy Image Without Denoising. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6713-6730 (2024) - [j127]Wenhao Shen
, Mingliang Zhou
, Xuekai Wei
, Heqiang Wang
, Bin Fang
, Cheng Ji
, Xu Zhuang, Jason Wang, Jun Luo
, Huayan Pu
, Xiaoxu Huang, Shilong Wang, Huajun Cao
, Yong Feng
, Tao Xiang
, Zhaowei Shang:
A Blind Video Quality Assessment Method via Spatiotemporal Pyramid Attention. IEEE Trans. Broadcast. 70(1): 251-264 (2024) - [j126]Shuqi Han, Yueting Huang, Mingliang Zhou
, Xuekai Wei
, Fan Jia, Xu Zhuang, Fei Cheng
, Tao Xiang
, Yong Feng
, Huayan Pu
, Jun Luo
:
A Content-Aware Full-Reference Image Quality Assessment Method Using a Gram Matrix and Signal-to-Noise. IEEE Trans. Broadcast. 70(4): 1279-1291 (2024) - [j125]Biwen Chen
, Honghong Zeng
, Tao Xiang
, Shangwei Guo
, Tianwei Zhang
, Yang Liu
:
ESB-FL: Efficient and Secure Blockchain-Based Federated Learning With Fair Payment. IEEE Trans. Big Data 10(6): 761-774 (2024) - [j124]Chunqiang Hu
, Huijun Zhuang
, Jiajun Chen
, Pengfei Hu
, Tao Xiang
, Jiguo Yu
:
Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid. IEEE Trans. Cloud Comput. 12(2): 777-788 (2024) - [j123]Chunqiang Hu
, Feihong Yang, Xiaoshuang Xing
, Hang Liu
, Tao Xiang
, Hui Xia
:
Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform. IEEE Trans. Consumer Electron. 70(4): 6533-6546 (2024) - [j122]Ying Yang
, Tao Xiang
, Xiao Lv
, Shangwei Guo
, Tieyong Zeng
:
The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 34(5): 3998-4010 (2024) - [j121]Zhixiong Nan
, Tao Xiang
:
Third-Person View Attention Prediction in Natural Scenarios With Weak Information Dependency and Human-Scene Interaction Mechanism. IEEE Trans. Circuits Syst. Video Technol. 34(8): 6762-6773 (2024) - [j120]Di Zhang
, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao
:
Secure Redactable Blockchain With Dynamic Support. IEEE Trans. Dependable Secur. Comput. 21(2): 717-731 (2024) - [j119]Chunqiang Hu
, Zewei Liu
, Ruinian Li
, Pengfei Hu
, Tao Xiang
, Meng Han
:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(4): 2145-2161 (2024) - [j118]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 21(4): 3545-3561 (2024) - [j117]Dong Li
, Qingguo Lü
, Xiaofeng Liao
, Tao Xiang
, Jiahui Wu
, Junqing Le
:
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval. IEEE Trans. Dependable Secur. Comput. 21(5): 4637-4651 (2024) - [j116]Gao Liu
, Hao Li
, Ning Wang
, Tao Xiang
, Yi-Ning Liu
:
DeGKM: Decentralized Group Key Management for Content Push in Integrated Networks. IEEE Trans. Dependable Secur. Comput. 21(5): 4784-4800 (2024) - [j115]Xiaoguo Li
, Zixi Huang
, Bowen Zhao
, Guomin Yang
, Tao Xiang
, Robert H. Deng
:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. IEEE Trans. Inf. Forensics Secur. 19: 1440-1454 (2024) - [j114]Ning Wang
, Jixuan Duan, Biwen Chen
, Shangwei Guo
, Tao Xiang
, Kai Zeng
:
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm. IEEE Trans. Inf. Forensics Secur. 19: 4464-4479 (2024) - [j113]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing. IEEE Trans. Inf. Forensics Secur. 19: 4700-4715 (2024) - [j112]Zhirui Zeng, Tao Xiang
, Shangwei Guo
, Jialing He
, Qiao Zhang
, Guowen Xu
, Tianwei Zhang
:
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models. IEEE Trans. Inf. Forensics Secur. 19: 5166-5180 (2024) - [j111]Chen Chen, Haibo Hong
, Tao Xiang
, Mande Xie:
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way. IEEE Trans. Inf. Forensics Secur. 19: 7420-7434 (2024) - [j110]Fei Chen
, Haohui Zhang
, Tao Xiang
, Joseph K. Liu
:
A Two-Stage Approach for Fair Data Trading Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 9835-9849 (2024) - [j109]Shengjie Zhou
, Senlin Shu
, Haobo Wang
, Hongxin Wei
, Tao Xiang
, Beibei Li
:
Multiple-Instance Learning from Pairwise Comparison Bags. ACM Trans. Intell. Syst. Technol. 15(6): 127:1-127:22 (2024) - [j108]Jiayu Hu
, Senlin Shu
, Beibei Li
, Tao Xiang
, Zhongshi He
:
An Unbiased Risk Estimator for Partial Label Learning with Augmented Classes. ACM Trans. Intell. Syst. Technol. 15(6): 131:1-131:22 (2024) - [j107]Ying Yang
, Tao Xiang
, Xiao Lv
, Lihua Li
, Lok Ming Lui
, Tieyong Zeng
:
Double Transformer Super-Resolution for Breast Cancer ADC Images. IEEE J. Biomed. Health Informatics 28(2): 917-928 (2024) - [j106]Mingliang Zhou
, Xingtai Wu, Xuekai Wei
, Tao Xiang
, Bin Fang
, Sam Kwong
:
Low-Light Enhancement Method Based on a Retinex Model for Structure Preservation. IEEE Trans. Multim. 26: 650-662 (2024) - [j105]Weizhi Xian
, Mingliang Zhou
, Bin Fang
, Tao Xiang
, Weijia Jia
, Bin Chen
:
Perceptual Quality Analysis in Deep Domains Using Structure Separation and High-Order Moments. IEEE Trans. Multim. 26: 2219-2234 (2024) - [j104]Tao Xiang
, Hongyan Pan
, Zhixiong Nan
:
Video Violence Rating: A Large-Scale Public Database and A Multimodal Rating Model. IEEE Trans. Multim. 26: 8557-8568 (2024) - [j103]Junqing Le
, Di Zhang
, Fan Yang
, Tao Xiang
, Xiaofeng Liao
:
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction. IEEE Trans. Netw. Serv. Manag. 21(4): 4900-4911 (2024) - [j102]Mingliang Zhou
, Xinwen Zhao
, Futing Luo
, Jun Luo
, Huayan Pu
, Tao Xiang
:
Robust RGB-T Tracking via Adaptive Modality Weight Correlation Filters and Cross-modality Learning. ACM Trans. Multim. Comput. Commun. Appl. 20(4): 95:1-95:20 (2024) - [j101]Dong Li
, Jiahui Wu
, Junqing Le
, Qingguo Lü
, Xiaofeng Liao
, Tao Xiang
:
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud. IEEE Trans. Serv. Comput. 17(2): 406-419 (2024) - [j100]Jialing He
, Ning Wang
, Tao Xiang
, Yiqiao Wei
, Zijian Zhang
, Meng Li
, Liehuang Zhu
:
ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids. IEEE Trans. Serv. Comput. 17(5): 1938-1954 (2024) - [j99]Boyuan Tan
, Hongxing Qin
, Xiaoxi Zhang
, Yiqun Wang
, Tao Xiang
, Baoquan Chen
:
Using Multi-Level Consistency Learning for Partial-to-Partial Point Cloud Registration. IEEE Trans. Vis. Comput. Graph. 30(8): 4881-4894 (2024) - [j98]Yan Gan, Xinyao Xiao, Tao Xiang:
Attribute-guided face adversarial example generation. Vis. Comput. 40(10): 7427-7437 (2024) - [c58]Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu:
United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus. AAAI 2024: 16794-16802 - [c57]Junze Lu, Chunqiang Hu, Conghao Ruan, Bin Cai, Tao Xiang:
Group Signature with Time-Bound Keys for Secure E-health Record Sharing. BIBM 2024: 3571-3576 - [c56]Junze Lu, Chunqiang Hu, Tao Xiang, Wei Li, Jiguo Yu:
VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems. COCOON (2) 2024: 3-14 - [c55]Yiyuan Zheng, Beihong Jin, Beibei Li, Weijiang Lai, Tao Xiang:
Reducing Interaction Noise for Sequential Recommendation via Robust Interests. DASFAA (3) 2024: 51-66 - [c54]Shuchi Wu, Chuan Ma, Kang Wei, Xiaogang Xu, Ming Ding, Yuwen Qian, Di Xiao, Tao Xiang:
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction. ECCV (34) 2024: 186-203 - [c53]Shengjie Zhou, Lue Tao, Yuzhou Cao, Tao Xiang, Bo An, Lei Feng:
On the Vulnerability of Adversarially Trained Models Against Two-faced Attacks. ICLR 2024 - [c52]Beibei Li, Beihong Jin, Yisong Yu, Yiyuan Zheng, Jiageng Song, Wei Zhuo, Tao Xiang:
Orthogonal Hyper-category Guided Multi-interest Elicitation for Micro-video Matching. ICME 2024: 1-6 - [c51]Hao Wang
, Shangwei Guo
, Jialing He
, Kangjie Chen
, Shudong Zhang
, Tianwei Zhang
, Tao Xiang
:
EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second. ACM Multimedia 2024: 3657-3665 - [c50]Hangcheng Liu, Zhenhu Wu, Hao Wang, Xingshuo Han, Shangwei Guo, Tao Xiang, Tianwei Zhang:
Beware of Road Markings: A New Adversarial Patch Attack to Monocular Depth Estimation. NeurIPS 2024 - [c49]Zhixiong Nan, Yilong Chen, Tianfei Zhou, Tao Xiang:
On-Road Object Importance Estimation: A New Dataset and A Model with Multi-Fold Top-Down Guidance. NeurIPS 2024 - [c48]Zhixiong Nan, Xianghong Li, Tao Xiang, Jifeng Dai:
DI-MaskDINO: A Joint Object Detection and Instance Segmentation Model. NeurIPS 2024 - [c47]Yiyuan Zheng, Beibei Li, Beihong Jin, Rui Zhao, Weijiang Lai, Tao Xiang:
Multi-intent Driven Contrastive Sequential Recommendation. ECML/PKDD (9) 2024: 141-156 - [c46]Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang
, Robert H. Deng
:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. SP 2024: 3109-3127 - [c45]Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu:
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning. SP 2024: 4810-4827 - [i25]Hao Wang, Tao Xiang, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang:
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability. CoRR abs/2401.15883 (2024) - [i24]Yuwen Qian, Shuchi Wu, Kang Wei, Ming Ding, Di Xiao, Tao Xiang, Chuan Ma, Song Guo:
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection. CoRR abs/2405.13080 (2024) - [i23]Beibei Li, Beihong Jin, Yisong Yu, Yiyuan Zheng, Jiageng Song, Wei Zhuo, Tao Xiang:
Orthogonal Hyper-category Guided Multi-interest Elicitation for Micro-video Matching. CoRR abs/2407.14741 (2024) - [i22]Beibei Li, Yiyuan Zheng, Beihong Jin, Tao Xiang, Haobo Wang, Lei Feng:
AsyCo: An Asymmetric Dual-task Co-training Model for Partial-label Learning. CoRR abs/2407.15036 (2024) - [i21]Zhixiong Nan, Xianghong Li, Tao Xiang, Jifeng Dai:
DI-MaskDINO: A Joint Object Detection and Instance Segmentation Model. CoRR abs/2410.16707 (2024) - [i20]Kuiyuan Zhang, Zhongyun Hua, Yushu Zhang, Yifang Guo, Tao Xiang:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. CoRR abs/2411.09167 (2024) - [i19]Zhixiong Nan, Yilong Chen, Tianfei Zhou, Tao Xiang:
On-Road Object Importance Estimation: A New Dataset and A Model with Multi-Fold Top-Down Guidance. CoRR abs/2411.17152 (2024) - [i18]Weizhi Xian, Mingliang Zhou, Leong Hou U, Shujun Lang, Bin Fang, Tao Xiang, Zhaowei Shang:
Underwater Image Quality Assessment: A Perceptual Framework Guided by Physical Imaging. CoRR abs/2412.15527 (2024) - [i17]Jialing He, Jiacheng Wang, Ning Wang, Shangwei Guo, Liehuang Zhu, Dusit Niyato, Tao Xiang:
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters. CoRR abs/2412.16893 (2024) - [i16]Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng:
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems. IACR Cryptol. ePrint Arch. 2024: 2027 (2024) - 2023
- [j97]Yan Gan, Tao Xiang
, Hangcheng Liu
, Mao Ye:
Learning-aware feature denoising discriminator. Inf. Fusion 89: 143-154 (2023) - [j96]Wenjian He, Xueyong Xu, Yu Xia, Qin Mao, You Zhao, Tao Xiang
:
A Distributed Projection Neurodynamic Approach for Solving BP Denoising Problem in Sparse Recovery. J. Circuits Syst. Comput. 32(16): 2350280:1-2350280:29 (2023) - [j95]Yan Gan, Tao Xiang
, Hangcheng Liu, Mao Ye, Mingliang Zhou:
Generative adversarial networks with adaptive learning strategy for noise-to-image synthesis. Neural Comput. Appl. 35(8): 6197-6206 (2023) - [j94]Qiao Zhang
, Tao Xiang
, Yifei Cai, Zhichao Zhao, Ning Wang
, Hongyi Wu:
Privacy-Preserving Machine Learning as a Service: Challenges and Opportunities. IEEE Netw. 37(6): 214-223 (2023) - [j93]Wei Gao, Xu Zhang, Shangwei Guo, Tianwei Zhang, Tao Xiang
, Han Qiu
, Yonggang Wen
, Yang Liu
:
Automatic Transformation Search Against Deep Leakage From Gradients. IEEE Trans. Pattern Anal. Mach. Intell. 45(9): 10650-10668 (2023) - [j92]Weizhi Xian
, Mingliang Zhou
, Bin Fang
, Xingran Liao
, Cheng Ji
, Tao Xiang
, Weijia Jia
:
Spatiotemporal Feature Hierarchy-Based Blind Prediction of Natural Video Quality via Transfer Learning. IEEE Trans. Broadcast. 69(1): 130-143 (2023) - [j91]Mingliang Zhou
, Shujun Lang, Taiping Zhang
, Xingran Liao
, Zhaowei Shang, Tao Xiang
, Bin Fang
:
Attentional Feature Fusion for End-to-End Blind Image Quality Assessment. IEEE Trans. Broadcast. 69(1): 144-152 (2023) - [j90]Mingliang Zhou
, Xuting Lan, Xuekai Wei
, Xingran Liao
, Qin Mao, Yutong Li, Chao Wu, Tao Xiang
, Bin Fang
:
An End-to-End Blind Image Quality Assessment Method Using a Recurrent Network and Self-Attention. IEEE Trans. Broadcast. 69(2): 369-377 (2023) - [j89]Mingliang Zhou
, Lei Chen, Xuekai Wei
, Xingran Liao
, Qin Mao, Heqiang Wang, Huayan Pu
, Jun Luo
, Tao Xiang
, Bin Fang
:
Perception-Oriented U-Shaped Transformer Network for 360-Degree No-Reference Image Quality Assessment. IEEE Trans. Broadcast. 69(2): 396-405 (2023) - [j88]Xuting Lan, Mingliang Zhou
, Xueyong Xu, Xuekai Wei
, Xingran Liao
, Huayan Pu
, Jun Luo
, Tao Xiang
, Bin Fang
, Zhaowei Shang:
Multilevel Feature Fusion for End-to-End Blind Image Quality Assessment. IEEE Trans. Broadcast. 69(3): 801-811 (2023) - [j87]Dong Li
, Jiahui Wu
, Junqing Le
, Xiaofeng Liao
, Tao Xiang
:
A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud. IEEE Trans. Cloud Comput. 11(1): 457-469 (2023) - [j86]Xiaoguo Li
, Tao Xiang
, Yi Mu
, Fuchun Guo
, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. IEEE Trans. Cloud Comput. 11(2): 1911-1926 (2023) - [j85]Zewei Liu
, Chunqiang Hu
, Ruinian Li
, Tao Xiang
, Xingwang Li
, Jiguo Yu
, Hui Xia
:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Trans. Cloud Comput. 11(3): 2325-2336 (2023) - [j84]Ying Yang
, Tao Xiang
, Shangwei Guo
, Xiao Lv
, Hantao Liu
, Xiaofeng Liao
:
EHNQ: Subjective and Objective Quality Evaluation of Enhanced Night-Time Images. IEEE Trans. Circuits Syst. Video Technol. 33(9): 4645-4659 (2023) - [j83]Fei Chen
, Zixing Xiao
, Tao Xiang
, Junfeng Fan, Hong Linh Truong
:
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications. IEEE Trans. Dependable Secur. Comput. 20(3): 2221-2237 (2023) - [j82]Chenglu Jin
, Zheng Yang
, Tao Xiang
, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 1080-1094 (2023) - [j81]Biwen Chen, Tao Xiang
, Debiao He
, Hongwei Li
, Kim-Kwang Raymond Choo
:
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records. IEEE Trans. Inf. Forensics Secur. 18: 3171-3184 (2023) - [j80]Yushu Zhang
, Xi Ye
, Xiangli Xiao
, Tao Xiang
, Hongwei Li
, Xiaochun Cao
:
A Reversible Framework for Efficient and Secure Visual Privacy Protection. IEEE Trans. Inf. Forensics Secur. 18: 3334-3349 (2023) - [j79]Hangcheng Liu
, Tao Xiang
, Shangwei Guo
, Han Li
, Tianwei Zhang
, Xiaofeng Liao
:
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding. IEEE Trans. Inf. Forensics Secur. 18: 5229-5242 (2023) - [j78]Tao Xiang
, Hangcheng Liu
, Shangwei Guo
, Yan Gan
, Wenjian He
, Xiaofeng Liao
:
Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework. ACM Trans. Intell. Syst. Technol. 14(4): 58:1-58:25 (2023) - [j77]Lei Feng
, Senlin Shu, Yuzhou Cao
, Lue Tao, Hongxin Wei
, Tao Xiang
, Bo An
, Gang Niu
:
Multiple-Instance Learning From Unlabeled Bags With Pairwise Similarity. IEEE Trans. Knowl. Data Eng. 35(11): 11599-11609 (2023) - [j76]Pengfei Guo
, Hantao Liu
, Delu Zeng
, Tao Xiang
, Leida Li
, Ke Gu
:
An Underwater Image Quality Assessment Metric. IEEE Trans. Multim. 25: 5093-5106 (2023) - [j75]Xiao Lv
, Tao Xiang
, Ying Yang
, Hantao Liu
:
Blind Dehazed Image Quality Assessment: A Deep CNN-Based Approach. IEEE Trans. Multim. 25: 9410-9424 (2023) - [j74]Tao Xiang
, Honghong Zeng
, Biwen Chen
, Shangwei Guo
:
BMIF: Privacy-preserving Blockchain-based Medical Image Fusion. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 36:1-36:23 (2023) - [j73]Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing. IEEE Trans. Parallel Distributed Syst. 34(10): 2642-2656 (2023) - [j72]Biwen Chen, Tao Xiang
, Xiaoguo Li
, Mingwu Zhang
, Debiao He
:
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles. IEEE Trans. Veh. Technol. 72(6): 7844-7856 (2023) - [j71]Biwen Chen
, Zhongming Wang
, Tao Xiang, Jiyun Yang, Debiao He
, Kim-Kwang Raymond Choo
:
BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 41: 100602 (2023) - [c44]Chen Chen, Haibo Hong, Mande Xie, Jun Shao, Tao Xiang:
Bab: A novel algorithm for training clean model based on poisoned data. SafeAI@AAAI 2023 - [c43]Senlin Shu
, Shuo He, Haobo Wang, Hongxin Wei, Tao Xiang, Lei Feng:
A Generalized Unbiased Risk Estimator for Learning with Augmented Classes. AAAI 2023: 9829-9836 - [c42]Beibei Li
, Senlin Shu, Beihong Jin, Tao Xiang
, Yiyuan Zheng:
Gemini: A Dual-Task Co-training Model for Partial Label Learning. AI (1) 2023: 328-340 - [c41]Jianquan Cai, Fei Chen, Tao Xiang:
Cloud Storage Auditing: From One Cloud to Dual, and More. CBD 2023: 86-91 - [c40]Yilong Chen
, Zhixiong Nan, Tao Xiang:
FBLNet: FeedBack Loop Network for Driver Attention Prediction. ICCV 2023: 13325-13334 - [c39]Jialing He, Zhen Qin, Hangcheng Liu, Shangwei Guo, Biwen Chen, Ning Wang, Tao Xiang:
Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models. ICME 2023: 354-359 - [i15]Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang:
Representing Noisy Image Without Denoising. CoRR abs/2301.07409 (2023) - [i14]Han Li, Hangcheng Liu, Shangwei Guo, Mingliang Zhou, Ning Wang, Tao Xiang, Tianwei Zhang:
Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding. CoRR abs/2302.11918 (2023) - [i13]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng
, Robert H. Deng
:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - [i12]Senlin Shu, Shuo He, Haobo Wang, Hongxin Wei, Tao Xiang, Lei Feng:
A Generalized Unbiased Risk Estimator for Learning with Augmented Classes. CoRR abs/2306.06894 (2023) - [i11]Hong Huang, Xinyu Lei, Tao Xiang:
Mitigating Cross-client GANs-based Attack in Federated Learning. CoRR abs/2307.13314 (2023) - [i10]Hangcheng Liu, Tao Xiang, Shangwei Guo, Han Li, Tianwei Zhang, Xiaofeng Liao:
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding. CoRR abs/2308.01512 (2023) - [i9]Shuchi Wu, Chuan Ma, Kang Wei, Xiaogang Xu, Ming Ding, Yuwen Qian, Tao Xiang:
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction. CoRR abs/2312.00855 (2023) - 2022
- [j70]Bin Xie
, Tao Xiang
, Xiaofeng Liao:
Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds. Comput. Commun. 184: 12-23 (2022) - [j69]Fei Chen, Jiahao Wang, Jianqiang Li
, Yang Xu
, Cheng Zhang
, Tao Xiang
:
TrustBuilder: A non-repudiation scheme for IoT cloud applications. Comput. Secur. 116: 102664 (2022) - [j68]Fei Chen, Duming Luo, Tao Xiang
, Ping Chen, Junfeng Fan, Hong Linh Truong
:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. ACM Comput. Surv. 54(4): 75:1-75:36 (2022) - [j67]Peng Wang, Biwen Chen
, Tao Xiang
, Zhongming Wang
:
Lattice-based public key searchable encryption with fine-grained access control for edge computing. Future Gener. Comput. Syst. 127: 373-383 (2022) - [j66]Shangwei Guo
, Siyuan Geng
, Tao Xiang
, Hangcheng Liu
, Ruitao Hou
:
ELAA: An efficient local adversarial attack using model interpreters. Int. J. Intell. Syst. 37(12): 10598-10620 (2022) - [j65]Ning Wang
, Weiwei Li
, Long Jiao
, Amir Alipour-Fanid
, Tao Xiang
, Kai Zeng
:
Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11ad Devices. IEEE Internet Things J. 9(11): 9036-9048 (2022) - [j64]Biwen Chen
, Xue Li
, Tao Xiang
, Peng Wang:
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability. J. Inf. Secur. Appl. 65: 103082 (2022) - [j63]Weiwei Deng, Tao Xiang
, Xiaofeng Liao:
STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare. Multim. Tools Appl. 81(21): 30069-30092 (2022) - [j62]Mingliang Zhou
, Xuekai Wei
, Cheng Ji
, Tao Xiang
, Bin Fang
:
Optimum Quality Control Algorithm for Versatile Video Coding. IEEE Trans. Broadcast. 68(3): 582-593 (2022) - [j61]Wenhao Shen
, Mingliang Zhou
, Xing-ran Liao
, Weijia Jia, Tao Xiang
, Bin Fang
, Zhaowei Shang:
An End-to-End No-Reference Video Quality Assessment Method With Hierarchical Spatiotemporal Feature Representation. IEEE Trans. Broadcast. 68(3): 651-660 (2022) - [j60]Shangwei Guo
, Tianwei Zhang
, Guowen Xu
, Han Yu
, Tao Xiang
, Yang Liu
:
Topology-Aware Differential Privacy for Decentralized Image Classification. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4016-4027 (2022) - [j59]Shangwei Guo
, Tianwei Zhang
, Han Yu
, Xiaofei Xie
, Lei Ma, Tao Xiang
, Yang Liu
:
Byzantine-Resilient Decentralized Stochastic Gradient Descent. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4096-4106 (2022) - [j58]Bin Xie
, Tao Xiang
, Xiaofeng Liao
, Jiahui Wu
:
Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment. IEEE Trans. Dependable Secur. Comput. 19(6): 4113-4126 (2022) - [j57]Zewei Liu
, Chunqiang Hu
, Hui Xia
, Tao Xiang
, Baolin Wang
, Jiajun Chen
:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. IEEE Trans. Netw. Serv. Manag. 19(4): 5196-5207 (2022) - [j56]Tao Xiang
, Hangcheng Liu, Shangwei Guo, Yan Gan, Xiaofeng Liao:
EGM: An Efficient Generative Model for Unrestricted Adversarial Examples. ACM Trans. Sens. Networks 18(4): 51:1-51:25 (2022) - [j55]Fei Chen
, Zhipeng Li, Changkun Jiang
, Tao Xiang
, Yuanyuan Yang
:
Cloud Object Storage Synchronization: Design, Analysis, and Implementation. IEEE Trans. Parallel Distributed Syst. 33(10): 4295-4310 (2022) - [j54]Xiaoguo Li
, Tao Xiang
, Shangwei Guo
, Hongwei Li
, Yi Mu
:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. IEEE Trans. Serv. Comput. 15(5): 2954-2968 (2022) - [j53]Yiran Li
, Hongwei Li
, Guowen Xu
, Tao Xiang
, Rongxing Lu
:
Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing. IEEE Trans. Veh. Technol. 71(5): 4692-4705 (2022) - [c38]Fei Chen, Jiahao Wang, Changkun Jiang, Tao Xiang
, Yuanyuan Yang:
Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper. INFOCOM 2022: 1958-1967 - [c37]Biwen Chen
, Bo Tang, Shangwei Guo
, Jiyun Yang
, Tao Xiang
:
A Blockchain-Based Mutual Authentication Protocol for Smart Home. ISC 2022: 250-265 - [c36]Tao Xiang, Hangcheng Liu, Shangwei Guo, Hantao Liu, Tianwei Zhang:
Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks. ACM Multimedia 2022: 2777-2785 - [i8]Qiao Zhang, Tao Xiang
, Chunsheng Xin, Biwen Chen, Hongyi Wu:
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference. CoRR abs/2209.01637 (2022) - 2021
- [j52]Yan Gan, Mao Ye
, Dan Liu, Shangming Yang, Tao Xiang
:
A novel hybrid augmented loss discriminator for text-to-image synthesis. Int. J. Intell. Syst. 36(2): 1085-1107 (2021) - [j51]Di Zhang
, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao
:
Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey. Int. J. Intell. Syst. 36(9): 5051-5084 (2021) - [j50]Biwen Chen
, Tao Xiang
, Mimi Ma
, Debiao He
, Xiaofeng Liao
:
CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things. IEEE Internet Things J. 8(19): 15010-15023 (2021) - [j49]Peng Wang, Tao Xiang
, Xiaoguo Li, Hong Xiang:
Access control encryption without sanitizers for Internet of Energy. Inf. Sci. 546: 924-942 (2021) - [j48]Tao Xiang
, Hongfei Xiao, Xue Qin:
Quality-distinguishing and patch-comparing no-reference image quality assessment. Multim. Tools Appl. 80(13): 19601-19624 (2021) - [j47]Ying Yang
, Tao Xiang
, Hangcheng Liu, Xiaofeng Liao
:
Convolutional Neural Network for Visual Security Evaluation. IEEE Trans. Circuits Syst. Video Technol. 31(8): 3293-3307 (2021) - [j46]Qingguo Lü
, Xiaofeng Liao
, Tao Xiang
, Huaqing Li
, Tingwen Huang
:
Privacy Masking Stochastic Subgradient-Push Algorithm for Distributed Online Optimization. IEEE Trans. Cybern. 51(6): 3224-3237 (2021) - [c35]Biwen Chen, Zhongming Wang
, Tao Xiang
, Lei Yang, Hongyang Yan, Jin Li:
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing. DMBD (2) 2021: 430-444 - [c34]Xuekai Wei
, Mingliang Zhou, Sam Kwong
, Hui Yuan, Tao Xiang
:
Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming. ICASSP 2021: 4230-4234 - [c33]Yan Gan, Tao Xiang
, Hangcheng Liu, Mao Ye, Dan Liu:
Teacher-Supervised Generative Adversarial Networks. ICME 2021: 1-6 - [c32]Xuekai Wei
, Mingliang Zhou, Sam Kwong
, Hui Yuan, Tao Xiang
:
QOE-Based Neural Live Streaming Method with Continuous Dynamic Adaptive Video Quality Control. ICME 2021: 1-6 - [c31]Shangwei Guo
, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang
, Yang Liu:
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models. IJCAI 2021: 3635-3641 - [c30]Lei Feng
, Senlin Shu, Yuzhou Cao
, Lue Tao, Hongxin Wei, Tao Xiang
, Bo An, Gang Niu:
Multiple-Instance Learning from Similar and Dissimilar Bags. KDD 2021: 374-382 - [c29]Tao Xiang
, Ying Yang
, Shangwei Guo
, Hangcheng Liu, Hantao Liu:
PRNet: A Progressive Recovery Network for Revealing Perceptually Encrypted Images. ACM Multimedia 2021: 3537-3545 - [c28]Junyin Zhang, Yongxin Ge, Xinqian Gu, Boyu Hua, Tao Xiang
:
Self-Supervised Pre-training on the Target Domain for Cross-Domain Person Re-identification. ACM Multimedia 2021: 4268-4276 - [c27]Zhongming Wang
, Biwen Chen
, Tao Xiang
, Lu Zhou, Yan-Hong Liu, Jin Li:
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control. ProvSec 2021: 3-18 - [c26]Biwen Chen
, Lei Yang, Tao Xiang
, Xiaoguo Li:
Secure Data Transmission with Access Control for Smart Home Devices. TrustCom 2021: 258-265 - [i7]Tao Xiang, Hangcheng Liu, Shangwei Guo, Tianwei Zhang, Xiaofeng Liao:
Local Black-box Adversarial Attacks: A Query Efficient Approach. CoRR abs/2101.01032 (2021) - [i6]Tao Xiang, Hangcheng Liu, Shangwei Guo, Tianwei Zhang:
PEEL: A Provable Removal Attack on Deep Hiding. CoRR abs/2106.02779 (2021) - [i5]Tao Xiang, Chunlong Xie, Shangwei Guo, Jiwei Li, Tianwei Zhang:
Protecting Your NLG Models with Semantic and Robust Watermarks. CoRR abs/2112.05428 (2021) - [i4]Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu:
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey. CoRR abs/2112.10183 (2021) - 2020
- [j45]Dong Li, Xiaofeng Liao, Tao Xiang
, Jiahui Wu
, Junqing Le:
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. Comput. Secur. 90: 101701 (2020) - [j44]Chunqiang Hu
, Yuwen Pu, Feihong Yang, Ruifeng Zhao, Arwa Alrawais, Tao Xiang
:
Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 7(10): 9980-9994 (2020) - [j43]Yiran Li
, Hongwei Li
, Guowen Xu
, Tao Xiang
, Xiaoming Huang, Rongxing Lu
:
Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing. IEEE Internet Things J. 7(12): 11460-11472 (2020) - [j42]Yu Chen, Fang Luo, Tong Li
, Tao Xiang
, Zheli Liu, Jin Li
:
A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf. Sci. 522: 69-79 (2020) - [j41]Yuwen Pu, Tao Xiang
, Chunqiang Hu
, Arwa Alrawais, Hongyang Yan:
An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf. Sci. 540: 308-324 (2020) - [j40]Peng Wang, Tao Xiang
, Xiaoguo Li, Hong Xiang:
Public key encryption with conjunctive keyword search on lattice. J. Inf. Secur. Appl. 51: 102433 (2020) - [j39]Xiaoguo Li, Tao Xiang
, Peng Wang:
Achieving forward unforgeability in keyword-field-free conjunctive search. J. Netw. Comput. Appl. 166: 102755 (2020) - [j38]Lishuang Hu, Tao Xiang
, Shangwei Guo:
SensIR: Towards privacy-sensitive image retrieval in the cloud. Signal Process. Image Commun. 84: 115837 (2020) - [j37]Tao Xiang
, Ying Yang
, Hangcheng Liu
, Shangwei Guo
:
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4129-4142 (2020) - [j36]Shangwei Guo
, Tao Xiang
, Xiaoguo Li, Ying Yang
:
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation. IEEE Trans. Inf. Forensics Secur. 15: 1151-1163 (2020) - [j35]Tao Xiang
, Ying Yang
, Shangwei Guo
:
Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches. IEEE Trans. Multim. 22(5): 1259-1272 (2020) - [j34]Fei Chen
, Fengming Meng, Tao Xiang
, Hua Dai
, Jianqiang Li
, Jing Qin
:
Towards Usable Cloud Storage Auditing. IEEE Trans. Parallel Distributed Syst. 31(11): 2605-2617 (2020) - [c25]Yu Tang, Tao Xiang
, Ying Yang, Zhengge Shu:
JPEG-XR-GCP: Promoting JPEG-XR Compression by Gradient-Based Coefficient Prediction. ICACI 2020: 51-58 - [c24]Yan Gan, Tao Xiang
, Mao Ye
:
Squeeze Criterion GANs: Double Adversarial Learning Method. ML4CS (2) 2020: 479-493 - [i3]Shangwei Guo, Tianwei Zhang, Tao Xiang, Yang Liu:
Differentially Private Decentralized Learning. CoRR abs/2006.07817 (2020) - [i2]Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu:
The Hidden Vulnerability of Watermarking for Deep Neural Networks. CoRR abs/2009.08697 (2020)
2010 – 2019
- 2019
- [j33]Xing Chen, Junxin Lin
, Bing Lin, Tao Xiang
, Ying Zhang, Gang Huang:
Self-learning and self-adaptive resource allocation for cloud-based software services. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j32]Shangwei Guo
, Tao Xiang
, Xiaoguo Li:
Towards efficient privacy-preserving face recognition in the cloud. Signal Process. 164: 320-328 (2019) - [j31]Yuwen Pu, Jin Luo, Chunqiang Hu
, Jiguo Yu
, Ruifeng Zhao, Hongyu Huang, Tao Xiang
:
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wirel. Commun. Mob. Comput. 2019: 3985232:1-3985232:11 (2019) - [c23]Lei Zhou, Liang Feng, Kai Liu, Chao Chen, Shaojiang Deng, Tao Xiang
, Siwei Jiang:
Towards Effective Mutation for Knowledge Transfer in Multifactorial Differential Evolution. CEC 2019: 1541-1547 - [c22]Ruping Shen, Hong Xiang, Xin Zhang, Bin Cai, Tao Xiang
:
Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper). CollaborateCom 2019: 419-428 - [c21]Shangwei Guo
, Jianliang Xu
, Ce Zhang, Cheng Xu
, Tao Xiang
:
ImageProof: Enabling Authentication for Large-Scale Image Retrieval. ICDE 2019: 1070-1081 - [c20]Xue Qin, Tao Xiang
, Ying Yang, Xiaofeng Liao:
Pair-Comparing Based Convolutional Neural Network for Blind Image Quality Assessment. ISNN (2) 2019: 460-468 - 2018
- [j30]Xiaoguo Li, Tao Xiang
, Fei Chen, Shangwei Guo:
Efficient biometric identity-based encryption. Inf. Sci. 465: 248-264 (2018) - [j29]Tao Xiang
, Xiaoguo Li, Fei Chen, Yuanyuan Yang
, Shengyu Zhang:
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. J. Parallel Distributed Comput. 112: 97-107 (2018) - [j28]Tao Xiang, Weimin Zhang, Shigang Zhong, Jiyun Yang:
Verifiable outsourcing of constrained nonlinear programming by particle swarm optimization in cloud. Soft Comput. 22(10): 3343-3355 (2018) - [j27]Fei Chen
, Tao Xiang
, Xinwen Fu
, Wei Yu
:
User Differentiated Verifiable File Search on the Cloud. IEEE Trans. Serv. Comput. 11(6): 948-961 (2018) - [j26]Tao Xiang, Yang Li, Xiaoguo Li, Shigang Zhong, Shui Yu
:
Collaborative ensemble learning under differential privacy. Web Intell. 16(1): 73-87 (2018) - [c19]Zhanghui Liu, Tao Xiang
, Bing Lin, Xinshu Ye, Haijiang Wang
, Ying Zhang, Xing Chen:
A Data Placement Strategy for Scientific Workflow in Hybrid Cloud. IEEE CLOUD 2018: 556-563 - [c18]Xin Zhang, Hong Xiang, Tao Xiang
:
An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper). CollaborateCom 2018: 467-476 - [c17]Yueyue Zhou, Tao Xiang
, Xiaoguo Li:
Efficient and Privacy-Preserving Query on Outsourced Spherical Data. ICA3PP (4) 2018: 138-152 - [c16]Minchen Zhu, Xinshu Ye, Tao Xiang
, Yun Ma, Xing Chen:
Runtime Knowledge Graph Based Approach to Smart Home Application Development. ICIOT 2018: 110-117 - [c15]Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang
:
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT. WASA 2018: 164-176 - [i1]Xin Zhang, Hong Xiang, Tao Xiang, Li Fu, Jun Sang:
An efficient quantum circuits optimizing scheme compared with QISKit. CoRR abs/1807.01703 (2018) - 2017
- [j25]Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang:
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387: 132-145 (2017) - [j24]Guiqiang Hu, Di Xiao, Yong Wang
, Tao Xiang:
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J. Vis. Commun. Image Represent. 44: 116-127 (2017) - [j23]Di Xiao
, Ying Wang, Tao Xiang, Sen Bai:
High-payload completely reversible data hiding in encrypted images by an interpolation technique. Frontiers Inf. Technol. Electron. Eng. 18(11): 1732-1743 (2017) - [j22]Di Xiao, Yanting Chang, Tao Xiang, Sen Bai:
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multim. Tools Appl. 76(7): 9265-9296 (2017) - [j21]Shangwei Guo, Tao Xiang, Xiaoguo Li:
Image quality assessment based on multiscale fuzzy gradient similarity deviation. Soft Comput. 21(5): 1145-1155 (2017) - [c14]Zheyi Chen, Tao Xiang
, Xing Chen:
Model-Driven Approach to Hadoop Deployment in Cloud. MobileCloud 2017: 145-148 - 2016
- [j20]Di Xiao, Qingqing Fu, Tao Xiang, Yushu Zhang:
Chaotic Image Encryption of Regions of Interest. Int. J. Bifurc. Chaos 26(11): 1650193:1-1650193:15 (2016) - [j19]Tao Xiang
, Xiaoguo Li, Fei Chen, Shangwei Guo
, Yuanyuan Yang
:
Processing secure, verifiable and efficient SQL over outsourced database. Inf. Sci. 348: 163-178 (2016) - [j18]Tao Xiang, Jianglin Sun, Xinwen Fu
:
On the security of binary arithmetic coding based on interval shrinking. Multim. Tools Appl. 75(8): 4245-4258 (2016) - [j17]Fei Chen, Tao Xiang
, Yuanyuan Yang
, Sherman S. M. Chow
:
Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Computers 65(6): 1936-1948 (2016) - [j16]Tao Xiang
, Shangwei Guo
, Xiaoguo Li:
Perceptual Visual Security Index Based on Edge and Texture Similarities. IEEE Trans. Inf. Forensics Secur. 11(5): 951-963 (2016) - [j15]Chunqiang Hu, Hongjuan Li
, Yan Huo, Tao Xiang
, Xiaofeng Liao:
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks. IEEE Trans. Multi Scale Comput. Syst. 2(2): 94-107 (2016) - [c13]Fei Chen, Taoyi Zhang, Jianyong Chen, Tao Xiang:
Cloud Storage Integrity Checking: Going from Theory to Practice. SCC@AsiaCCS 2016: 24-28 - [c12]Tao Xiang
, Xiaoguo Li, Fei Chen, Yi Mu:
Bilateral-secure Signature by Key Evolving. AsiaCCS 2016: 523-533 - 2015
- [j14]Tao Xiang, Jia Hu, Jianglin Sun:
Outsourcing chaotic selective image encryption to the cloud with steganography. Digit. Signal Process. 43: 28-37 (2015) - [j13]Jiyun Yang, Tao Xiang, Di Xiao:
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks. Multim. Tools Appl. 74(23): 10873-10881 (2015) - [c11]Fei Chen, Tao Xiang, Jianyong Chen, Wei Yu
, Xinwen Fu
, Shengyu Zhang:
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. CBD 2015: 219-226 - [c10]Fei Chen, Tao Xiang
, Yuanyuan Yang
, Cong Wang
, Shengyu Zhang:
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure. INFOCOM 2015: 2389-2397 - 2014
- [j12]Tao Xiang, Jinyu Qu, Di Xiao:
Joint SPIHT compression and selective encryption. Appl. Soft Comput. 21: 159-170 (2014) - [j11]Fei Chen, Tao Xiang
, Yuanyuan Yang
:
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distributed Comput. 74(3): 2141-2151 (2014) - [j10]Tao Xiang, Chenyun Yu, Fei Chen:
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks. Signal Process. Image Commun. 29(9): 1015-1027 (2014) - [j9]Fei Chen, Tao Xiang
, Xinyu Lei, Jianyong Chen:
Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE Trans. Cloud Comput. 2(4): 499-508 (2014) - [j8]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang
:
Period distribution of generalized discrete Arnold cat map. Theor. Comput. Sci. 552: 13-25 (2014) - [c9]Tao Xiang
, Weimin Zhang, Fei Chen:
A verifiable PSO algorithm in cloud computing. IEEE Congress on Evolutionary Computation 2014: 190-193 - [c8]Fei Chen, Tao Xiang
, Xinwen Fu
, Wei Yu
:
Towards verifiable file search on the cloud. CNS 2014: 346-354 - [c7]Fei Chen, Tao Xiang
, Yuanyuan Yang
, Sherman S. M. Chow
:
Secure cloud storage meets with secure network coding. INFOCOM 2014: 673-681 - [c6]Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li
, Xiao Xiao, Guilin Huang:
A Practically Optimized Implementation of Attribute Based Cryptosystems. TrustCom 2014: 197-204 - 2013
- [j7]Yan-Hong Zhang, Wei Hao, Tao Xiang:
Independent spanning trees in crossed cubes. Inf. Process. Lett. 113(18): 653-658 (2013) - [j6]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang
:
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$. IEEE Trans. Inf. Theory 59(5): 3249-3255 (2013) - [c5]Tao Xiang, Chenyun Yu, Fei Chen:
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks. WASA 2013: 196-205 - 2012
- [j5]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang
:
Period Distribution of Generalized Discrete Arnold Cat Map for N=pe. IEEE Trans. Inf. Theory 58(1): 445-452 (2012) - [c4]Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu
:
When Digital Forensic Research Meets Laws. ICDCS Workshops 2012: 542-551 - 2011
- [j4]Fei Chen, Xiaofeng Liao, Tao Xiang, Hongying Zheng:
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN. Inf. Sci. 181(22): 5110-5118 (2011)
2000 – 2009
- 2008
- [j3]Tao Xiang, Kwok-Wo Wong, Xiaofeng Liao:
Cryptanalysis of a password authentication scheme over insecure networks. J. Comput. Syst. Sci. 74(5): 657-661 (2008) - 2007
- [j2]Tao Xiang, Kwok-Wo Wong, Xiaofeng Liao:
A novel particle swarm optimizer with time-delay. Appl. Math. Comput. 186(1): 789-793 (2007) - [j1]Tao Xiang, Xiaofeng Liao, Kwok-Wo Wong:
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Appl. Math. Comput. 190(2): 1637-1645 (2007) - [c3]Tao Xiang, Jun Wang
, Xiaofeng Liao:
An improved particle swarm optimizer with momentum. IEEE Congress on Evolutionary Computation 2007: 3341-3345 - 2005
- [c2]Tao Xiang, Xiaofeng Liao, Jian Huang:
Global Attractivity of Cohen-Grossberg Model with Delays. ISNN (1) 2005: 229-234 - 2004
- [c1]Xueming Li, Xiaofeng Liao, Tao Xiang:
Further Results for an Estimation of Upperbound of Delays for Delayed Neural Networks. ISNN (1) 2004: 132-137
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 17:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint