Peiya Li

Orcid: 0000-0002-9356-0861

According to our database1, Peiya Li authored at least 22 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

A Color Image Encryption Algorithm Based on Compressive Sensing and Block-Based DNA Coding.
IEEE Access, 2024

JPEG Encryption with DC Prediction and Run-Based RS Pairs Permutation.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
GooseBt: A programmable malware detection framework based on process, file, registry, and COM monitoring.
Comput. Commun., April, 2023

DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks.
Appl. Soft Comput., January, 2023

Joint JPEG Compression and Encryption Scheme Based on Order-8-16 Block Transform.
IEEE Trans. Intell. Transp. Syst., 2023

A Privacy-Preserving Image Retrieval Scheme Based on 16×16 DCT and Deep Learning.
IEEE Trans. Cloud Comput., 2023

End-to-End Secure Image Retrieval via Self-Supervised Learning in Cloud Computing.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

2022
Secure reversible data hiding in encrypted images based on adaptive Huffman coding and pixel rearrangement.
J. Electronic Imaging, 2022

EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing.
CoRR, 2022

A Privacy-Preserving and End-to-End-Based Encrypted Image Retrieval Scheme.
Proceedings of the IEEE International Conference on Visual Communications and Image Processing, 2022

2021
Visible Watermark Removal Based on Dual-input Network.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

End-to-end Learning for Encrypted Image Retrieval.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Survey on JPEG compatible joint image compression and encryption algorithms.
IET Signal Process., 2020

The Impact of CFO on OFDM based Physical-layer Network Coding with QPSK Modulation.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

The Feasibility of NOMA in C-V2X.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Joint image encryption and compression schemes based on 16 × 16 DCT.
J. Vis. Commun. Image Represent., 2019

Encrypted JPEG image retrieval using histograms of transformed coefficients.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
A Content-Adaptive Joint Image Compression and Encryption Scheme.
IEEE Trans. Multim., 2018

2017
Joint image compression and encryption based on order-8 alternating transforms.
J. Vis. Commun. Image Represent., 2017

2015
Joint image compression and encryption based on alternating transforms with quality control.
Proceedings of the 2015 Visual Communications and Image Processing, 2015

2008
A multi-service Token Bucket Algorithm for MAC QoS system in HFC access network.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008


  Loading...