Chengqing Li

Orcid: 0000-0002-5385-7644

According to our database1, Chengqing Li authored at least 89 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.
Int. J. Bifurc. Chaos, September, 2024

Adjusting Dynamics of Hopfield Neural Network via Time-Variant Stimulus.
IEEE Trans. Circuits Syst. I Regul. Pap., July, 2024

Few-Shot Fine-Grained Image Classification via Multi-Frequency Neighborhood and Double-Cross Modulation.
IEEE Trans. Multim., 2024

Recovering sign bits of DCT coefficients in digital images as an optimization problem.
J. Vis. Commun. Image Represent., 2024

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map.
IEEE Multim., 2024

Efficient polar coordinates attack with adaptive activation strategy.
Expert Syst. Appl., 2024

Graph Structure of an Inversive Pseudorandom Number Generator over Ring Z<sub>p<sup>e</sup></sub>.
CoRR, 2024

Network Analysis of Baker's Map Implemented in a Fixed-Point Arithmetic Domain.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Periodicity Analysis of the Logistic Map Over Ring ℤ3n.
Int. J. Bifurc. Chaos, April, 2023

Recognition-Oriented Image Compressive Sensing With Deep Learning.
IEEE Trans. Multim., 2023

Recovering the Block-wise Relationship in an Encryption-Then-Compression System.
CoRR, 2023

Periodicity Analysis of the Logistic Map over Ring ℤ<sub>3<sup>n</sup></sub>.
CoRR, 2023

2022
A Driving Behavior Risk Classification Framework via the Unbalanced Time Series Samples.
IEEE Trans. Instrum. Meas., 2022

The Graph Structure of the Generalized Discrete Arnold's Cat Map.
IEEE Trans. Computers, 2022

Security measurement of a medical communication scheme based on chaos and DNA coding.
J. Vis. Commun. Image Represent., 2022

Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System.
IEEE Multim., 2022

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map.
CoRR, 2022

2021
Multi-Channel Deep Networks for Block-Based Image Compressive Sensing.
IEEE Trans. Multim., 2021

2020
Cryptanalysis of an image block encryption algorithm based on chaotic maps.
J. Inf. Secur. Appl., 2020

2019
Generating Multi-Scroll Chua's Attractors via Simplified Piecewise-Linear Chua's Diode.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

When an attacker meets a cipher-image in 2018: A year in review.
J. Inf. Secur. Appl., 2019

Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps.
CoRR, 2019

Multi-Channel Deep Networks for Block-Based Image Compressive Sensing.
CoRR, 2019

Cryptanalyzing a Medical Privacy Protection Scheme based on DNA Coding and Chaos.
CoRR, 2019

When an attacker meets a cipher-image in 2018: A Year in Review.
CoRR, 2019

Network Analysis of Chaotic Dynamics in Fixed-Precision Digital Domain.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

2018
Designing Hyperchaotic Cat Maps With Any Desired Number of Positive Lyapunov Exponents.
IEEE Trans. Cybern., 2018

Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography.
IEEE Multim., 2018

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy.
CoRR, 2018

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy.
IEEE Access, 2018

2017
On the cryptanalysis of Fridrich's chaotic image encryption scheme.
Signal Process., 2017

Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication.
Int. J. Circuit Theory Appl., 2017

On the Network Analysis of the State Space of Discrete Dynamical Systems.
Int. J. Bifurc. Chaos, 2017

Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits.
IEEE Multim., 2017

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography.
CoRR, 2017

Greedy Sparse Signal Reconstruction Using Matching Pursuit Based on Hope-tree.
CoRR, 2017

2016
Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems.
IEEE Trans. Circuits Syst. I Regul. Pap., 2016

Chaotic image encryption using pseudo-random masks and pixel mapping.
Signal Process., 2016

Cracking a hierarchical chaotic image encryption algorithm based on permutation.
Signal Process., 2016

Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission.
Int. J. Bifurc. Chaos, 2016

Cryptanalysis of an Image Scrambling Encryption Algorithm.
CoRR, 2016

2015
No-Reference Video Quality Assessment Based on Artifact Measurement and Statistical Analysis.
IEEE Trans. Circuits Syst. Video Technol., 2015

Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps.
Int. J. Bifurc. Chaos, 2015

An optical image encryption scheme based on depth-conversion integral imaging and chaotic maps.
CoRR, 2015

2014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

Deciphering a novel image cipher based on mixed transformed Logistic maps.
CoRR, 2014

Network analysis of the state space of chaotic map in digital domain.
CoRR, 2014

2013
Efficient arbitrated quantum signature and its proof of security.
Quantum Inf. Process., 2013

Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation.
Int. J. Bifurc. Chaos, 2013

Cryptanalyzing an image encryption scheme based on logistic map
CoRR, 2013

Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013

2012
On the impossibility of non-static quantum bit commitment between two parties.
Quantum Inf. Process., 2012

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure.
J. Syst. Softw., 2012

Breaking a novel image encryption scheme based on improved hyperchaotic sequences
CoRR, 2012

Breaking a novel colour image encryption algorithm based on chaos
CoRR, 2012

2011
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
Signal Process., 2011

Breaking an Image Encryption Algorithm Based on Chaos.
Int. J. Bifurc. Chaos, 2011

Breaking a chaotic image encryption algorithm based on perceptron model
CoRR, 2011

On the security of a secure Lempel-Ziv-Welch (LZW) algorithm.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system.
J. Syst. Softw., 2010

Breaking a Chaotic Cryptographic Scheme Based on Composition Maps.
Int. J. Bifurc. Chaos, 2010

Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

2009
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence.
Image Vis. Comput., 2009

On the security defects of an image encryption scheme.
Image Vis. Comput., 2009

Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
CoRR, 2009

Security analysis of a binary image permutation scheme based on Logistic map
CoRR, 2009

A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
CoRR, 2009

Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps
CoRR, 2009

2008
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion.
IEEE Trans. Circuits Syst. Video Technol., 2008

Cryptanalyzing an Encryption Scheme Based on Blind Source Separation.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.
Signal Process. Image Commun., 2008

Cryptanalysis of the RCES/RSES image encryption scheme.
J. Syst. Softw., 2008

2007
On the security of a class of image encryption schemes.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of an image encryption scheme based on the Hill cipher
CoRR, 2007

Cryptanalysis of a computer cryptography scheme based on a filter bank
CoRR, 2007

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
CoRR, 2007

2006
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].
J. Syst. Softw., 2006

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).
J. Syst. Softw., 2006

Cryptanalysis of an image encryption scheme.
J. Electronic Imaging, 2006

Cryptanalyses of Some Multimedia Encryption Schemes.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of a chaotic block cipher with external key and its improved version
CoRR, 2006

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
CoRR, 2006

2005
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Signal Process., 2005

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Cryptanalysis of a multistage encryption system.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
CoRR, 2004

Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004


  Loading...