Kwok-Wo Wong
According to our database1,
Kwok-Wo Wong
authored at least 81 papers
between 1998 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
IEEE Trans. Cybern., 2018
2016
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
Multim. Tools Appl., 2016
2015
Signal Process. Image Commun., 2015
A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization.
Int. J. Bifurc. Chaos, 2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015
Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
2014
Theor. Comput. Sci., 2014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014
Commun. Nonlinear Sci. Numer. Simul., 2014
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014
2013
IEEE Trans. Inf. Theory, 2013
J. Vis. Commun. Image Represent., 2013
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps.
J. Syst. Softw., 2013
Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013
An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2013
A symmetric color image encryption algorithm using the intrinsic features of bit distributions.
Commun. Nonlinear Sci. Numer. Simul., 2013
Improving the error correction capability of arithmetic coding by forecasting forbidden symbols.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013
2012
IEEE Trans. Inf. Theory, 2012
Neural Comput. Appl., 2012
J. Syst. Softw., 2012
Int. J. Bifurc. Chaos, 2012
Chaos-based joint compression and encryption algorithm for generating variable length ciphertext.
Appl. Soft Comput., 2012
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
2011
IEEE Trans. Circuits Syst. II Express Briefs, 2011
J. Vis. Commun. Image Represent., 2011
J. Comput., 2011
Inf. Sci., 2011
Comput. Math. Appl., 2011
Appl. Soft Comput., 2011
2010
IEEE Trans. Circuits Syst. II Express Briefs, 2010
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$.
IEEE Trans. Computers, 2010
2009
Proceedings of the Intelligent Computing Based on Chaos, 2009
Inf. Sci., 2009
2008
IEEE Trans. Circuits Syst. II Express Briefs, 2008
J. Comput. Syst. Sci., 2008
2007
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007
Proceedings of the Neural Information Processing, 14th International Conference, 2007
2006
IEEE Trans. Neural Networks, 2006
IEEE Trans. Circuits Syst. II Express Briefs, 2006
New Asymptotic Stability Criteria for a Two-Neuron Network With Different Time Delays.
IEEE Trans. Circuits Syst. II Express Briefs, 2006
IEEE Trans. Circuits Syst. II Express Briefs, 2006
Delay-Dependent and Delay-Independent Stability Criteria for Cellular Neural Networks with Delays.
Int. J. Bifurc. Chaos, 2006
Appl. Math. Comput., 2006
2005
Int. J. Bifurc. Chaos, 2005
A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography.
Appl. Math. Comput., 2005
2004
Robust stability of interval bidirectional associative memory neural network with time delays.
IEEE Trans. Syst. Man Cybern. Part B, 2004
Neural Networks, 2004
Stability Analysis for Delayed Cellular Neural Networks Based on Linear Matrix inequality Approach.
Int. J. Bifurc. Chaos, 2004
Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances
CoRR, 2004
2003
IEEE Trans. Neural Networks, 2003
Stability of bifurcating periodic solutions for van der Pol equation with continuous distributed delay.
Appl. Math. Comput., 2003
2002
Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions.
Proceedings of the 16th International Conference on Pattern Recognition, 2002
2001
Int. J. Bifurc. Chaos, 2001
A Modified Chaotic Cryptographic Method.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
An Elliptic Curve Random Number Generator.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
Combining DEKF algorithm and trace rule for fast on-line invariance extraction and recognition.
Pattern Recognit. Lett., 2000
Neural Process. Lett., 2000
Int. J. Neural Syst., 2000
1999
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999
Handwritten digit recognition using trace neural network with EKF training algorithm.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999
1998
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998
Using recursive least square learning method for principal and minor components analysis.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998