


default search action
Xiaojing Ma 0002
Person information
- affiliation: Huazhong University of Science and Technology, Wuhan, China
Other persons with the same name
- Xiaojing Ma — disambiguation page
- Xiaojing Ma 0001 — Fudan University, State Key Laboratory of ASIC and Systems, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Chaoxiang He, Yimiao Zeng, Xiaojing Ma, Bin Benjamin Zhu, Zewei Li, Shixin Li, Hai Jin:
MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems. ICME 2024: 1-6 - [c13]Xiaofan Bai, Chaoxiang He, Xiaojing Ma, Bin Benjamin Zhu, Hai Jin:
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models. ICML 2024 - [c12]Chaoxiang He
, Xiaofan Bai
, Xiaojing Ma
, Bin B. Zhu
, Pingyi Hu
, Jiayun Fu
, Hai Jin
, Dongmei Zhang
:
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models. ACM Multimedia 2024: 9875-9884 - [c11]Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang:
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses. NDSS 2024 - 2023
- [c10]Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. NDSS 2023 - 2022
- [j10]Changming Liu
, Xiaojing Ma, Sixing Cao, Jiayun Fu, Bin B. Zhu:
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video. ACM Trans. Multim. Comput. Commun. Appl. 18(1): 23:1-23:27 (2022) - [c9]Jiayun Fu, Bin B. Zhu, Haidong Zhang, Yayi Zou, Song Ge, Weiwei Cui, Yun Wang, Dongmei Zhang, Xiaojing Ma, Hai Jin:
ChartStamp: Robust Chart Embedding for Real-World Applications. ACM Multimedia 2022: 2786-2795 - 2021
- [j9]Jiayun Fu, Bin Zhu, Weiwei Cui, Song Ge, Yun Wang, Haidong Zhang, He Huang, Yuanyuan Tang, Dongmei Zhang, Xiaojing Ma:
Chartem: Reviving Chart Images with Data Embedding. IEEE Trans. Vis. Comput. Graph. 27(2): 337-346 (2021) - [c8]Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. CCS 2021: 3159-3176
2010 – 2019
- 2019
- [c7]Deqing Zou, Ju Yang, Zhen Li, Hai Jin, Xiaojing Ma:
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process. GPC 2019: 238-253 - [c6]Yuanyuan Tang, Bin Zhu, Xiaojing Ma, P. Takis Mathiopoulos
, Xia Xie, Hong Huang:
Decoding Homomorphically Encrypted Flac Audio without Decryption. ICASSP 2019: 675-679 - [c5]Xia Xie, Jinpeng Li, Xiaoyang Hu, Hai Jin, Hanhua Chen, Xiaojing Ma, Hong Huang:
High Performance DDoS Attack Detection System Based on Distribution Statistics. NPC 2019: 132-142 - 2018
- [c4]Xiaojing Ma, Huan Peng, Hai Jin, Bin Zhu:
Privacy-Preserving Cloud-Based Video Surveillance with Adjustable Granularity of Privacy Protection. ICIP 2018: 4133-4137 - [c3]Xiaojing Ma, Bin Zhu, Tao Zhang, Sixing Cao, Hai Jin, Deqing Zou:
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance. INFOCOM Workshops 2018: 813-818 - [c2]Xiaojing Ma, Changming Liu
, Sixing Cao, Bin Zhu:
JPEG Decompression in the Homomorphic Encryption Domain. ACM Multimedia 2018: 905-913 - 2017
- [j8]Xiaojing Ma, Laurence T. Yang, Yang Xiang, Wenjun Kevin Zeng
, Deqing Zou, Hai Jin:
Fully Reversible Privacy Region Protection for Cloud Video Surveillance. IEEE Trans. Cloud Comput. 5(3): 510-522 (2017) - 2016
- [j7]Xiaojing Ma, Wenjun Kevin Zeng
, Laurence T. Yang, Deqing Zou, Hai Jin:
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos. IEEE Trans. Emerg. Top. Comput. 4(3): 349-362 (2016) - 2015
- [j6]Yunxia Liu, Leiming Ju, Mingsheng Hu, Xiaojing Ma, Hongguo Zhao:
A robust reversible data hiding scheme for H.264 without distortion drift. Neurocomputing 151: 1053-1062 (2015) - [j5]Yunxia Liu, Mingsheng Hu, Xiaojing Ma, Hongguo Zhao:
A new robust data hiding method for H.264/AVC without intra-frame distortion drift. Neurocomputing 151: 1076-1085 (2015) - 2014
- [j4]Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC. Multim. Tools Appl. 72(1): 613-636 (2014) - 2013
- [j3]Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust data hiding algorithm for H.264/AVC video streams. J. Syst. Softw. 86(8): 2174-2183 (2013) - 2012
- [j2]Yunxia Liu, Zhitang Li, Xiaojing Ma:
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift. J. Softw. 7(5): 1059-1065 (2012) - 2010
- [j1]Xiaojing Ma, Zhitang Li, Hao Tu, Bochao Zhang:
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift. IEEE Trans. Circuits Syst. Video Technol. 20(10): 1320-1330 (2010)
2000 – 2009
- 2007
- [c1]Xiaojing Ma, Zhitang Li, Yao Li, Jiping Zhang:
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. IEEE NAS 2007: 265-266
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint