Author of the publication

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses.

, , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network., , , , , and . IEEE Access, (2020)Guided filtering based color image reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)A hierarchical threshold secret image sharing., , and . Pattern Recognit. Lett., 33 (1): 83-91 (2012)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , and . IET Image Process., 14 (7): 1393-1401 (2020)Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement., , , and . IEEE Trans. Instrum. Meas., (2024)Unified Performance Evaluation Method for Perceptual Image Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Graph-based Robust Model Hashing., and . WIFS, page 1-6. IEEE, (2022)Large-Scale Talent Flow Embedding for Company Competitive Analysis., , , , , , and . WWW, page 2354-2364. ACM / IW3C2, (2020)Angle-of-Arrival Acquisition and Tracking via Virtual Subarrays in an Analog Array., , , and . VTC Fall, page 1-5. IEEE, (2019)Embedding Fairness into the AI-Based Talent Recruitment Systems:The Perspective of Environment Cycle and Knowledge Cycle., , , , and . PACIS, page 15. (2021)