Dezhi An

Orcid: 0000-0001-7963-6308

According to our database1, Dezhi An authored at least 18 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J., May, 2024

PatchesNet: PatchTST-based multi-scale network security situation prediction.
Knowl. Based Syst., 2024

A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation.
J. King Saud Univ. Comput. Inf. Sci., 2024

VTion-PatchTST: Elevated PatchTST model for network security situation prediction.
Comput. Electr. Eng., 2024

Research on Interpretability Charge Prediction Method based on Legal Provisions Incorporated.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024

2023
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation.
Expert Syst. Appl., December, 2023

A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system.
J. King Saud Univ. Comput. Inf. Sci., February, 2023

A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional GRU.
PeerJ Comput. Sci., 2023

Network Security Situation Prediction Model Based on VMD Decomposition and DWOA Optimized BiGRU-ATTN Neural Network.
IEEE Access, 2023

2022
Law Recommendation Based on Self - Attention Mechanism and Feature Fusion.
Proceedings of the ICSIM 2022: The 5th International Conference on Software Engineering and Information Management, Yokohama, Japan, January 21, 2022

2021
Adaptive evaluation model of web spam based on link relation.
Trans. Emerg. Telecommun. Technol., 2021

Blockchain-Watermarking for Compressive Sensed Images.
IEEE Access, 2021

2020
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT.
Wirel. Commun. Mob. Comput., 2020

A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing.
IEEE Signal Process. Lett., 2020

Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.
Secur. Commun. Networks, 2020

Public Key Encryption with Keyword Search in Cloud: A Survey.
Entropy, 2020

Cooperative malicious network behavior recognition algorithm in E-commerce.
Comput. Secur., 2020

Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server.
IEEE Access, 2020


  Loading...