Follow
Hui Tian (田 晖)
Hui Tian (田 晖)
Ph.D, Professor, College of Computer Science and Technology, National Huaqiao University
Verified email at hqu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
H Tian, Y Chen, CC Chang, H Jiang, Y Huang, Y Chen, J Liu
IEEE Transactions on Services Computing 10 (5), 701 - 714, 2017
2672017
Data collection from WSNs to the cloud based on mobile Fog elements
T Wang, J Zeng, Y Lai, Y Cai, H Tian, Y Chen, B Wang
Future Generation Computer Systems 105, 864-872, 2020
1652020
Trajectory privacy preservation based on a fog structure for cloud location services
T Wang, J Zeng, MZA Bhuiyan, H Tian, Y Cai, Y Chen, B Zhong
IEEE Access 5, 7692-7701, 2017
1102017
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
H Tian, F Nan, CC Chang, Y Huang, J Lu, Y Du
Journal of Network and Computer Applications 127, 59-69, 2019
1022019
Public Auditing for Shared Cloud Data with Efficient and Secure Group Management
H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang
Information Sciences 472, 107-125, 2019
712019
Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks
T Wang, Q Wu, S Wen, Y Cai, H Tian, Y Chen, B Wang
Sensors 17 (1), 139, 2017
702017
Improving security of quantization-index-modulation steganography in low bit-rate speech streams
H Tian, J Liu, S Li
Multimedia systems 20, 143-154, 2014
692014
An M-sequence based steganography model for voice over IP
H Tian, K Zhou, H Jiang, J Liu, Y Huang, D Feng
2009 IEEE International Conference on Communications, 1-5, 2009
632009
Least-significant-digit Steganography in Low Bitrate Speech
J Liu, K Zhou, H Tian
The 47th IEEE International Conference on Communications, 2012
542012
A covert communication model based on least significant bits steganography in voice over IP
H Tian, K Zhou, Y Huang, D Feng, J Liu
2008 The 9th International Conference for Young Computer Scientists, 647-652, 2008
502008
An adaptive steganography scheme for voice over IP
H Tian, K Zhou, H Jiang, Y Huang, J Liu, D Feng
2009 IEEE International Symposium on Circuits and Systems, 2922-2925, 2009
482009
Adaptive partial-matching steganography for voice over IP using triple M sequences
H Tian, H Jiang, K Zhou, D Feng
Computer Communications 34 (18), 2236-2247, 2011
422011
Social learning differential evolution
Y Cai, J Liao, T Wang, Y Chen, H Tian
Information Sciences 433, 464-509, 2018
402018
Neighborhood-adaptive differential evolution for global numerical optimization
Y Cai, G Sun, T Wang, H Tian, Y Chen, J Wang
Applied Soft Computing 59, 659-706, 2017
362017
Cellular direction information based differential evolution for numerical optimization: an empirical study
J Liao, Y Cai, T Wang, H Tian, Y Chen
Soft Computing 20, 2801-2827, 2016
352016
Public audit for operation behavior logs with error locating in cloud storage
H Tian, Z Chen, CC Chang, Y Huang, T Wang, Z Huang, Y Cai, Y Chen
Soft Computing 23, 3779-3792, 2019
332019
Fog-based evaluation approach for trustworthy communication in sensor-cloud system
T Wang, Y Li, Y Chen, H Tian, Y Cai, W Jia, B Wang
IEEE Communications Letters 21 (11), 2532-2535, 2017
322017
Optimal matrix embedding for Voice-over-IP steganography
H Tian, J Qin, Y Huang, Y Chen, T Wang, J Liu, Y Cai
Signal Processing 117, 33-43, 2015
322015
Public auditing of log integrity for cloud storage systems via blockchain
J Wang, F Peng, H Tian, W Chen, J Lu
Security and Privacy in New Computing Environments: Second EAI International …, 2019
312019
Differential evolution with individual-dependent topology adaptation
G Sun, Y Cai, T Wang, H Tian, C Wang, Y Chen
Information Sciences 450, 1-38, 2018
302018
The system can't perform the operation now. Try again later.
Articles 1–20