Hui Tian (田 晖)
Hui Tian (田 晖)
Ph.D, Professor, College of Computer Science and Technology, National Huaqiao University
Verified email at - Homepage
Cited by
Cited by
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
H Tian, Y Chen, CC Chang, H Jiang, Y Huang, Y Chen, J Liu
IEEE Transactions on Services Computing 10 (5), 701 - 714, 2017
Data collection from WSNs to the cloud based on mobile Fog elements
T Wang, J Zeng, Y Lai, Y Cai, H Tian, Y Chen, B Wang
Future Generation Computer Systems 105, 864-872, 2020
Trajectory privacy preservation based on a fog structure for cloud location services
T Wang, J Zeng, MZA Bhuiyan, H Tian, Y Cai, Y Chen, B Zhong
IEEE Access 5, 7692-7701, 2017
An M-sequence based steganography model for voice over IP
H Tian, K Zhou, H Jiang, J Liu, Y Huang, D Feng
2009 IEEE International Conference on Communications, 1-5, 2009
Improving security of quantization-index-modulation steganography in low bit-rate speech streams
H Tian, J Liu, S Li
Multimedia systems 20 (2), 143-154, 2014
Least-significant-digit Steganography in Low Bitrate Speech
J Liu, K Zhou, H Tian
The 47th IEEE International Conference on Communications, 2012
A covert communication model based on least significant bits steganography in voice over IP
H Tian, K Zhou, Y Huang, D Feng, J Liu
2008 The 9th International Conference for Young Computer Scientists, 647-652, 2008
Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks
T Wang, Q Wu, S Wen, Y Cai, H Tian, Y Chen, B Wang
Sensors 17 (1), 139, 2017
An adaptive steganography scheme for voice over IP
H Tian, K Zhou, H Jiang, Y Huang, J Liu, D Feng
2009 IEEE International Symposium on Circuits and Systems, 2922-2925, 2009
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
H Tian, F Nan, CC Chang, Y Huang, J Lu, Y Du
Journal of Network and Computer Applications 127, 59-69, 2019
Adaptive partial-matching steganography for voice over IP using triple M sequences
H Tian, H Jiang, K Zhou, D Feng
Computer Communications 34 (18), 2236-2247, 2011
Optimal matrix embedding for Voice-over-IP steganography
H Tian, J Qin, Y Huang, Y Chen, T Wang, J Liu, Y Cai
Signal Processing 117, 33-43, 2015
Social learning differential evolution
Y Cai, J Liao, T Wang, Y Chen, H Tian
Information Sciences 433, 464-509, 2018
Public Auditing for Shared Cloud Data with Efficient and Secure Group Management
H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang
Information Sciences 472, 107-125, 2019
Cellular direction information based differential evolution for numerical optimization: an empirical study
J Liao, Y Cai, T Wang, H Tian, Y Chen
Soft Computing 20 (7), 2801-2827, 2016
Reliable wireless connections for fast-moving rail users based on a chained fog structure
T Wang, Z Peng, S Wen, Y Lai, W Jia, Y Cai, H Tian, Y Chen
Information Sciences 379, 160-176, 2017
Public audit for operation behavior logs with error locating in cloud storage
H Tian, Z Chen, CC Chang, Y Huang, T Wang, Z Huang, Y Cai, Y Chen
Soft Computing 23 (11), 3779-3792, 2019
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
H Tian, H Jiang, K Zhou, D Feng
The Computer Journal 55 (6), 702−716, 2012
Neighborhood-adaptive differential evolution for global numerical optimization
Y Cai, G Sun, T Wang, H Tian, Y Chen, J Wang
Applied Soft Computing 59, 659-706, 2017
Fog-based evaluation approach for trustworthy communication in sensor-cloud system
T Wang, Y Li, Y Chen, H Tian, Y Cai, W Jia, B Wang
IEEE Communications Letters 21 (11), 2532-2535, 2017
The system can't perform the operation now. Try again later.
Articles 1–20