Daoshun Wang
Orcid: 0000-0001-8610-6065
According to our database1,
Daoshun Wang
authored at least 58 papers
between 2005 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
DT CWT and Schur decomposition based robust watermarking algorithm to geometric attacks.
Multim. Tools Appl., 2022
2020
Deep Learning Approach Applied to Prediction of Bone Age Based on Computed Tomography Orthopedic Image Processing.
J. Medical Imaging Health Informatics, 2020
2019
Multim. Tools Appl., 2019
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes.
IEEE Access, 2019
2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison.
IEEE Access, 2018
2017
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017
J. Vis. Commun. Image Represent., 2017
Comput. Stand. Interfaces, 2017
2016
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle.
Theor. Comput. Sci., 2016
Int. J. High Perform. Comput. Netw., 2016
2014
IEEE Trans. Circuits Syst. Video Technol., 2014
J. Networks, 2014
A discussion on the relationship between probabilistic visual cryptography and random grid.
Inf. Sci., 2014
Inf. Sci., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
2012
Comput. J., 2012
Sci. China Inf. Sci., 2012
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
2011
Inf. Sci., 2011
2010
EURASIP J. Adv. Signal Process., 2010
Sci. China Inf. Sci., 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Pattern Recognit., 2009
Probability method for cryptanalysis of general multivariate modular linear equation.
Sci. China Ser. F Inf. Sci., 2009
Sci. China Ser. F Inf. Sci., 2009
Sci. China Ser. F Inf. Sci., 2009
Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Cryptanalysis of RSA with Constrained Low Public Exponent.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
J. Netw. Comput. Appl., 2008
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008
2007
CoRR, 2007
Proceedings of the Global Communications Conference, 2007
Colored Probabilistic Visual Cryptography Scheme with Reversing.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
CoRR, 2006
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006
2005
IACR Cryptol. ePrint Arch., 2005