Yushu Zhang
Orcid: 0000-0001-8183-8435
According to our database1,
Yushu Zhang
authored at least 231 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Multim. Comput. Commun. Appl., May, 2024
A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation.
IEEE Trans. Ind. Electron., May, 2024
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J., May, 2024
A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation.
IEEE Trans. Circuits Syst. I Regul. Pap., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate.
IEEE Trans. Ind. Informatics, March, 2024
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024
A deep learning model based on transformer structure for radar tracking of maneuvering targets.
Inf. Fusion, March, 2024
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system.
Expert Syst. Appl., March, 2024
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., February, 2024
Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain.
IEEE Internet Things J., February, 2024
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024
Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages.
IEEE Trans. Netw. Sci. Eng., 2024
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics.
IEEE Trans. Multim., 2024
PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine.
IEEE Trans. Multim., 2024
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images.
IEEE Trans. Multim., 2024
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
CoRR, 2024
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images.
Appl. Intell., 2024
Adv. Eng. Informatics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Comput. Soc. Syst., December, 2023
IEEE Trans. Artif. Intell., December, 2023
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation.
Expert Syst. Appl., December, 2023
Expert Syst. Appl., October, 2023
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023
Appl. Intell., September, 2023
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng., August, 2023
Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
Multim. Syst., June, 2023
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
Multim. Syst., April, 2023
Entropy, April, 2023
Joint information transmission design for intelligent reflecting surface aided system with discrete phase shifts.
Sci. China Inf. Sci., March, 2023
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system.
J. King Saud Univ. Comput. Inf. Sci., February, 2023
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT.
IEEE Internet Things J., February, 2023
TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding.
Appl. Intell., February, 2023
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023
Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour.
IEEE Trans. Cybern., 2023
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
IEEE Signal Process. Lett., 2023
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images.
IEEE Signal Process. Lett., 2023
IEEE Signal Process. Lett., 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission.
IEEE Internet Things J., 2023
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation.
ACM Comput. Surv., 2023
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Comput. Secur., 2023
RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption.
Proceedings of the IEEE International Conference on Signal Processing, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Applied Intelligence - First International Conference, 2023
Tourist Attraction Recommendation System Based on Django and Collaborative Filtering.
Proceedings of the Applied Intelligence - First International Conference, 2023
2022
How do enterprises determine which breakthrough invention should be commercialized? A multiple attribute group decision-making-based method.
Comput. Appl. Math., December, 2022
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Ind. Informatics, 2022
Low-Frequency Seismic Noise Reduction Based on Deep Complex Reaction-Diffusion Model.
IEEE Trans. Geosci. Remote. Sens., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Sliding Window Decoding for QC-SC-LDPC Codes Under the Constraint of Implementation Complexity.
IEEE Trans. Broadcast., 2022
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022
IEEE Signal Process. Lett., 2022
J. Vis. Commun. Image Represent., 2022
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Inf. Sci., 2022
Inf. Sci., 2022
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud.
Inf. Sci., 2022
Enhancing 5G MIMO Core Spectral Efficiency with Higher-Resolution Multi-User MIMO and Multi-Beam Operation.
IEEE Commun. Stand. Mag., 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022
2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption.
Signal Process., 2021
J. Vis. Commun. Image Represent., 2021
SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction.
J. Electronic Imaging, 2021
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing.
Inf. Sci., 2021
IEEE Internet Things J., 2021
CoRR, 2021
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021
2020
IEEE Trans. Ind. Informatics, 2020
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Seismic Signal Enhancement and Noise Suppression Using Structure-Adaptive Nonlinear Complex Diffusion.
IEEE Trans. Geosci. Remote. Sens., 2020
IEEE Trans. Broadcast., 2020
Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.
Signal Process., 2020
Color image compression and encryption scheme based on compressive sensing and double random encryption strategy.
Signal Process., 2020
An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL).
Neural Comput. Appl., 2020
An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata.
Neural Comput. Appl., 2020
Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm.
Neurocomputing, 2020
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020
IEEE Access, 2020
2019
A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2019
IEEE Trans. Ind. Informatics, 2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Broadcast., 2019
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019
Multim. Tools Appl., 2019
Medical image encryption algorithm based on Latin square and memristive chaotic system.
Multim. Tools Appl., 2019
Inf. Sci., 2019
Parametrically computing efficient frontiers and reanalyzing efficiency-diversification discrepancies and naive diversification.
INFOR Inf. Syst. Oper. Res., 2019
IEEE Commun. Surv. Tutorials, 2019
A robust and secure image sharing scheme with personal identity information embedded.
Comput. Secur., 2019
Construction of Rate-Compatible Raptor-Like Quasi-Cyclic LDPC Code With Edge Classification for IDMA Based Random Access.
IEEE Access, 2019
A Patch Based Denoising Method Using Deep Convolutional Neural Network for Seismic Image.
IEEE Access, 2019
IEEE Access, 2019
Fidelity Preserved Data Hiding in Encrypted Highly Autocorrelated Data Based on Homomorphism and Compressive Sensing.
IEEE Access, 2019
2018
IEEE Trans. Cybern., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Progressive Matrix Growth Algorithm for Constructing Rate-Compatible Length-Scalable Raptor-Like Quasi-Cyclic LDPC Codes.
IEEE Trans. Broadcast., 2018
Signal Process., 2018
Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
Signal Process., 2018
Secur. Commun. Networks, 2018
Image salient regions encryption for generating visually meaningful ciphertext image.
Neural Comput. Appl., 2018
A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Inf. Sci., 2018
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018
Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System.
IEEE Multim., 2018
IEEE Commun. Lett., 2018
IEEE Access, 2018
Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata.
IEEE Access, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond.
Proceedings of the 10th IEEE International Symposium on Turbo Codes & Iterative Information Processing, 2018
Beam Selection for Beam Refinement Procedure in Multi-cell Millimeter-Wave Massive MIMO Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
2017
Signal Process., 2017
Neural Comput. Appl., 2017
Multidimens. Syst. Signal Process., 2017
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017
IEEE Internet Things J., 2017
Int. J. Bifurc. Chaos, 2017
On the Optimization Model for Multi-Hop Information Transmission and Energy Transfer in TDMA-Based Wireless Sensor Networks.
IEEE Commun. Lett., 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017
Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2017
2016
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
Signal Process. Image Commun., 2016
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016
Robust image hashing with tampering recovery capability via low-rank and sparse representation.
Multim. Tools Appl., 2016
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016
CoRR, 2016
Proceedings of the 2016 Visual Communications and Image Processing, 2016
2015
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources.
IEEE Trans. Wirel. Commun., 2015
Signal Process. Image Commun., 2015
Reversible data hiding in encrypted images using cross division and additive homomorphism.
Signal Process. Image Commun., 2015
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015
Int. J. Web Serv. Res., 2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015
An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach.
Commun. Nonlinear Sci. Numer. Simul., 2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
2014
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
Signal Process., 2014
Multim. Tools Appl., 2014
Dynamic Optimization For Heterogeneous Powered Wireless Multimedia Sensor Networks With Correlated Sources and Network Coding.
CoRR, 2014
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption.
Commun. Nonlinear Sci. Numer. Simul., 2014
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
2013
IEEE Trans. Ind. Informatics, 2013
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations.
Signal Process. Image Commun., 2013
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013
2010
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010