Yushu Zhang

Orcid: 0000-0001-8183-8435

According to our database1, Yushu Zhang authored at least 231 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images.
ACM Trans. Multim. Comput. Commun. Appl., May, 2024

A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation.
IEEE Trans. Ind. Electron., May, 2024

Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J., May, 2024

A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation.
IEEE Trans. Circuits Syst. I Regul. Pap., April, 2024

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger.
IEEE Trans. Ind. Informatics, March, 2024

Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate.
IEEE Trans. Ind. Informatics, March, 2024

Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

A deep learning model based on transformer structure for radar tracking of maneuvering targets.
Inf. Fusion, March, 2024

3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system.
Expert Syst. Appl., March, 2024

Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., February, 2024

Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain.
IEEE Internet Things J., February, 2024

Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024

Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

A secure dynamic cross-chain decentralized data consistency verification model.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Imperceptible and multi-channel backdoor attack.
Appl. Intell., January, 2024

Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages.
IEEE Trans. Netw. Sci. Eng., 2024

Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics.
IEEE Trans. Multim., 2024

PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine.
IEEE Trans. Multim., 2024

TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images.
IEEE Trans. Multim., 2024

Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation.
IEEE Trans. Inf. Forensics Secur., 2024

PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark.
IEEE Trans. Inf. Forensics Secur., 2024

4DPM: Deepfake Detection With a Denoising Diffusion Probabilistic Mask.
IEEE Signal Process. Lett., 2024

TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion.
IEEE Signal Process. Lett., 2024

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales.
CoRR, 2024

TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images.
Appl. Intell., 2024

A 3D model encryption method supporting adaptive visual effects after decryption.
Adv. Eng. Informatics, 2024

Conditional Backdoor Attack via JPEG Compression.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

Recording Behaviors of Artificial Intelligence in Blockchains.
IEEE Trans. Artif. Intell., December, 2023

Blockchain-based reliable image copyright protection.
IET Blockchain, December, 2023

Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation.
Expert Syst. Appl., December, 2023

Anomaly detection of vectorized time series on aircraft battery data.
Expert Syst. Appl., October, 2023

FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023

Compression-resistant backdoor attack against deep neural networks.
Appl. Intell., September, 2023

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023

Localization of Inpainting Forgery With Feature Enhancement Network.
IEEE Trans. Big Data, June, 2023

A multi-level approach with visual information for encrypted H.265/HEVC videos.
Multim. Syst., June, 2023

A Principled Design of Image Representation: Towards Forensic Tasks.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023

Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
Multim. Syst., April, 2023

Face Database Protection via Beautification with Chaotic Systems.
Entropy, April, 2023

Joint information transmission design for intelligent reflecting surface aided system with discrete phase shifts.
Sci. China Inf. Sci., March, 2023

Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023

A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system.
J. King Saud Univ. Comput. Inf. Sci., February, 2023

Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT.
IEEE Internet Things J., February, 2023

Default Matters in Trust and Reciprocity.
Games, February, 2023

TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding.
Appl. Intell., February, 2023

BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT.
IEEE Trans. Serv. Comput., 2023

Fair Outsourcing Paid in Fiat Money Using Blockchain.
IEEE Trans. Serv. Comput., 2023

PRNU-based Image Forgery Localization with Deep Multi-scale Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Detection of Recolored Image by Texture Features in Chrominance Components.
ACM Trans. Multim. Comput. Commun. Appl., 2023

F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023

A Reversible Framework for Efficient and Secure Visual Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2023

RAPP: Reversible Privacy Preservation for Various Face Attributes.
IEEE Trans. Inf. Forensics Secur., 2023

Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023

Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour.
IEEE Trans. Cybern., 2023

BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023

An Efficient Oblivious Random Data Access Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN.
IEEE Signal Process. Lett., 2023

Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images.
IEEE Signal Process. Lett., 2023

Identifiable Face Privacy Protection via Virtual Identity Transformation.
IEEE Signal Process. Lett., 2023

TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023

Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission.
IEEE Internet Things J., 2023

ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023

A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation.
ACM Comput. Surv., 2023

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023

Security and Privacy on Generative Data in AIGC: A Survey.
CoRR, 2023

Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection.
CoRR, 2023

Towards an Accurate and Secure Detector against Adversarial Perturbations.
CoRR, 2023

Visual Content Privacy Protection: A Survey.
CoRR, 2023

Representing Noisy Image Without Denoising.
CoRR, 2023

DIVRS: Data integrity verification based on ring signature in cloud storage.
Comput. Secur., 2023

RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption.
Proceedings of the IEEE International Conference on Signal Processing, 2023

CDNet: Cluster Decision for Deepfake Detection Generalization.
Proceedings of the IEEE International Conference on Image Processing, 2023

Transformer-based tracking Network for Maneuvering Targets.
Proceedings of the IEEE International Conference on Acoustics, 2023

A New and Efficient Dormitory Management System.
Proceedings of the Applied Intelligence - First International Conference, 2023

Tourist Attraction Recommendation System Based on Django and Collaborative Filtering.
Proceedings of the Applied Intelligence - First International Conference, 2023

2022
How do enterprises determine which breakthrough invention should be commercialized? A multiple attribute group decision-making-based method.
Comput. Appl. Math., December, 2022

Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices.
IEEE Trans. Serv. Comput., 2022

Optimizing Task Location Privacy in Mobile Crowdsensing Systems.
IEEE Trans. Ind. Informatics, 2022

Low-Frequency Seismic Noise Reduction Based on Deep Complex Reaction-Diffusion Model.
IEEE Trans. Geosci. Remote. Sens., 2022

HF-TPE: High-Fidelity Thumbnail- Preserving Encryption.
IEEE Trans. Circuits Syst. Video Technol., 2022

Sliding Window Decoding for QC-SC-LDPC Codes Under the Constraint of Implementation Complexity.
IEEE Trans. Broadcast., 2022

Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022

TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key.
IEEE Signal Process. Lett., 2022

PRA-TPE: Perfectly Recoverable Approximate Thumbnail-Preserving Image Encryption.
J. Vis. Commun. Image Represent., 2022

High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2022

DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

Noise-free thumbnail-preserving image encryption based on MSB prediction.
Inf. Sci., 2022

Primitively visually meaningful image encryption: A new paradigm.
Inf. Sci., 2022

Multi-user image retrieval with suppression of search pattern leakage.
Inf. Sci., 2022

Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud.
Inf. Sci., 2022

Adversarial Data Hiding in Digital Images.
Entropy, 2022

Enhancing 5G MIMO Core Spectral Efficiency with Higher-Resolution Multi-User MIMO and Multi-Beam Operation.
IEEE Commun. Stand. Mag., 2022

InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022

Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
CoRR, 2022

Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing.
CoRR, 2022

Detecting Recolored Image by Spatial Correlation.
CoRR, 2022

Metaverse: Security and Privacy Concerns.
CoRR, 2022

Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks.
CoRR, 2022

Compression-Resistant Backdoor Attack against Deep Neural Networks.
CoRR, 2022

PTB: Robust physical backdoor attacks against deep neural networks in real world.
Comput. Secur., 2022

Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022

PRNU-based Image Forgery Localization With Convolutional Neural Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

2021
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction.
ACM Trans. Internet Techn., 2021

Defense Against Advanced Persistent Threat Through Data Backup and Recovery.
IEEE Trans. Netw. Sci. Eng., 2021

Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021

Visual Quality Assessment for Perceptually Encrypted Light Field Images.
IEEE Trans. Circuits Syst. Video Technol., 2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021

Gaussian Model for 3D Mesh Steganography.
IEEE Signal Process. Lett., 2021

TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption.
Signal Process., 2021

Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption.
Signal Process., 2021

Anomaly detection of aircraft lead-acid battery.
Qual. Reliab. Eng. Int., 2021

Reversible data hiding in encrypted color images using cross-channel correlations.
J. Vis. Commun. Image Represent., 2021

SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction.
J. Electronic Imaging, 2021

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing.
Inf. Sci., 2021

A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System.
IEEE Internet Things J., 2021

Protect the Intellectual Property of Dataset against Unauthorized Use.
CoRR, 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
CoRR, 2021

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021

2020
Secure Transmission of Compressed Sampling Data Using Edge Clouds.
IEEE Trans. Ind. Informatics, 2020

A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020

Secure and Efficient Outsourcing of PCA-Based Face Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

Seismic Signal Enhancement and Noise Suppression Using Structure-Adaptive Nonlinear Complex Diffusion.
IEEE Trans. Geosci. Remote. Sens., 2020

Quasi-Cyclic Spatially Coupled LDPC Code for Broadcasting.
IEEE Trans. Broadcast., 2020

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.
Signal Process., 2020

Color image compression and encryption scheme based on compressive sensing and double random encryption strategy.
Signal Process., 2020

An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL).
Neural Comput. Appl., 2020

An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata.
Neural Comput. Appl., 2020

Cloud-assisted privacy-conscious large-scale Markowitz portfolio.
Inf. Sci., 2020

Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm.
Neurocomputing, 2020

Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020

Machine Learning Security: Threats, Countermeasures, and Evaluations.
IEEE Access, 2020

2019
A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Performance Analysis of Practical QC-LDPC Codes: From DVB-S2 to ATSC 3.0.
IEEE Trans. Broadcast., 2019

Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019

Commutative fragile zero-watermarking and encryption for image integrity protection.
Multim. Tools Appl., 2019

Medical image encryption algorithm based on Latin square and memristive chaotic system.
Multim. Tools Appl., 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Parametrically computing efficient frontiers and reanalyzing efficiency-diversification discrepancies and naive diversification.
INFOR Inf. Syst. Oper. Res., 2019

Performance evaluation of low-density spreading multiple access.
IET Commun., 2019

Secure Wireless Communications Based on Compressive Sensing: A Survey.
IEEE Commun. Surv. Tutorials, 2019

A robust and secure image sharing scheme with personal identity information embedded.
Comput. Secur., 2019

Construction of Rate-Compatible Raptor-Like Quasi-Cyclic LDPC Code With Edge Classification for IDMA Based Random Access.
IEEE Access, 2019

A Patch Based Denoising Method Using Deep Convolutional Neural Network for Seismic Image.
IEEE Access, 2019

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution.
IEEE Access, 2019

Indoor Image Representation by High-Level Semantic Features.
IEEE Access, 2019

Fidelity Preserved Data Hiding in Encrypted Highly Autocorrelated Data Based on Homomorphism and Compressive Sensing.
IEEE Access, 2019

2018
On the Security of a Class of Diffusion Mechanisms for Image Encryption.
IEEE Trans. Cybern., 2018

Mixed Noise Removal via Robust Constrained Sparse Representation.
IEEE Trans. Circuits Syst. Video Technol., 2018

Progressive Matrix Growth Algorithm for Constructing Rate-Compatible Length-Scalable Raptor-Like Quasi-Cyclic LDPC Codes.
IEEE Trans. Broadcast., 2018

A compression-diffusion-permutation strategy for securing image.
Signal Process., 2018

Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
Signal Process., 2018

Exploiting the Security Aspects of Compressive Sampling.
Secur. Commun. Networks, 2018

Image salient regions encryption for generating visually meaningful ciphertext image.
Neural Comput. Appl., 2018

A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform.
Multim. Tools Appl., 2018

A hybrid scheme for self-adaptive double color-image encryption.
Multim. Tools Appl., 2018

Improved known-plaintext attack to permutation-only multimedia ciphers.
Inf. Sci., 2018

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018

Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System.
IEEE Multim., 2018

Performance Analysis and Code Optimization of IDMA With 5G New Radio LDPC Code.
IEEE Commun. Lett., 2018

Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications.
IEEE Access, 2018

Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata.
IEEE Access, 2018

Asymptotic Analysis for NOMA over Fading Channel without CSIT.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Comparative Study on the Capacity of SCMA and LDSMA.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Rate-Compatible LDPC Based IDMA Scheme Supporting Grant-Free Transmission in eMBB.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond.
Proceedings of the 10th IEEE International Symposium on Turbo Codes & Iterative Information Processing, 2018

Beam Selection for Beam Refinement Procedure in Multi-cell Millimeter-Wave Massive MIMO Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

A 5G New Radio LDPC Coded NOMA Scheme Supporting High User Load for Massive MTC.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Optimization of Finite-Length SC-LDPC for Uplink NOMA.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
A visually secure image encryption scheme based on compressive sensing.
Signal Process., 2017

Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral.
Neural Comput. Appl., 2017

A novel method for image segmentation using reaction-diffusion model.
Multidimens. Syst. Signal Process., 2017

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017

Harnessing the Hybrid Cloud for Secure Big Image Data Service.
IEEE Internet Things J., 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
Int. J. Bifurc. Chaos, 2017

On the Optimization Model for Multi-Hop Information Transmission and Energy Transfer in TDMA-Based Wireless Sensor Networks.
IEEE Commun. Lett., 2017

On Beam Aggregation in Millimeter-Wave System.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Channel coding for NOMA schemes with a JD or SIC receiver.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

SIC vs. JD: Uplink NOMA techniques for M2M random access.
Proceedings of the IEEE International Conference on Communications, 2017

A self-adaptive scheme for double color-image encryption.
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017

Enhanced IDMA with Rate-Compatible Raptor-Like Quasi-Cyclic LDPC Code for 5G.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

The adaptive complex shock diffusion for seismic random noise attenuation.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Spatially coupled QC-LDPC for the tradeoff between MIMO BICM and BICM-ID schemes.
Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2017

2016
Bi-level Protected Compressive Sampling.
IEEE Trans. Multim., 2016

Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
Signal Process. Image Commun., 2016

Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016

Robust image hashing with tampering recovery capability via low-rank and sparse representation.
Multim. Tools Appl., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016

Chaotic Image Encryption of Regions of Interest.
Int. J. Bifurc. Chaos, 2016

Multiuser Diversity Gain from Superposition of Infinite Users over Block-Fading MAC.
CoRR, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

A novel selective image encryption method based on saliency detection.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

2015
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources.
IEEE Trans. Wirel. Commun., 2015

Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Reversible data hiding in encrypted images using cross division and additive homomorphism.
Signal Process. Image Commun., 2015

Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Int. J. Web Serv. Res., 2015

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015

Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015

An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach.
Commun. Nonlinear Sci. Numer. Simul., 2015

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

A capacity-approaching multi-user BICM-ID scheme for multiple access channel.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Near capacity LDPC coded MU-BICM-ID for 5G.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
Signal Process., 2014

Cryptanalyzing a novel image cipher based on mixed transformed logistic maps.
Multim. Tools Appl., 2014

On the security of symmetric ciphers based on DNA coding.
Inf. Sci., 2014

Robust Coding of Encrypted Images via Structural Matrix.
CoRR, 2014

Embedding Cryptographic Features in Compressive Sensing.
CoRR, 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

Dynamic Optimization For Heterogeneous Powered Wireless Multimedia Sensor Networks With Correlated Sources and Network Coding.
CoRR, 2014

GLS coding based security solution to JPEG with the structure of aggregated compression and encryption.
Commun. Nonlinear Sci. Numer. Simul., 2014

An image encryption scheme based on rotation matrix bit-level permutation and block diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2014

A Heuristic Method of Attack Graph Analysis for Network Security Hardening.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Hybrid Multilevel Converter: Capacitor Voltage Balancing Limits and its Extension.
IEEE Trans. Ind. Informatics, 2013

A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations.
Signal Process. Image Commun., 2013

Research on Attack Graph Generation for Network Security Situation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2010
Study on Co-Existence of Macro WCDMA Cell and Micro HSUPA Cell.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010


  Loading...