Qiuyu Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
A novel large capacity coverless image steganography method based on hybrid framework of image generation-mapping.
Multim. Syst., December, 2024
Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism.
Signal Image Video Process., November, 2024
Digital image copyright protection method based on blockchain and zero trust mechanism.
Multim. Tools Appl., September, 2024
Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption.
Multim. Tools Appl., August, 2024
IEEE CAA J. Autom. Sinica, July, 2024
Remote. Sens., May, 2024
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain.
J. Supercomput., March, 2024
Multim. Tools Appl., March, 2024
A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches.
Multim. Syst., February, 2024
A high-performance speech BioHashing retrieval algorithm based on audio segmentation.
Comput. Speech Lang., January, 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
2023
The Frequency-Variable Rotor-Blade-Based Two-Degree-of-Freedom Actuation Principle for Linear and Rotary Motion.
Sensors, October, 2023
Enhanced Near-Infrared Ultra-Narrow Absorber Based on a Dielectric Nano-Resonant Ring for Refractive Index Sensing.
Sensors, October, 2023
OS-DS tracker: Orientation-variant Siamese 3D tracking with Detection based Sampling.
Pattern Recognit. Lett., October, 2023
Verifiable speech retrieval algorithm based on diversity security template and biohashing.
Multim. Tools Appl., October, 2023
Research on robust inversion model of soil moisture content based on GF-1 satellite remote sensing.
Comput. Electron. Agric., October, 2023
J. Inf. Secur. Appl., August, 2023
A Robust Chaotic Map and Its Application to Speech Encryption in Dual Frequency Domain.
Int. J. Bifurc. Chaos, June, 2023
Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion.
Multim. Tools Appl., May, 2023
Multim. Tools Appl., February, 2023
Telecommun. Syst., January, 2023
J. Supercomput., 2023
2022
Sensors, 2022
A location privacy protection method based on cipher-text retrieval in cloud environment.
Secur. Priv., 2022
Multim. Tools Appl., 2022
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing.
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
Multim. Tools Appl., 2022
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values.
Multim. Tools Appl., 2022
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum.
Multim. Tools Appl., 2022
Residual-Based a Posteriori Error Estimates for the Time-Dependent Ginzburg-Landau Equations of Superconductivity.
J. Sci. Comput., 2022
Artif. Intell. Rev., 2022
2021
Connectivity probability analysis for freeway vehicle scenarios in vehicular networks.
Wirel. Networks, 2021
Connectivity Probability Analysis for VANET Freeway Traffic Using a Cell Transmission Model.
IEEE Syst. J., 2021
Numer. Algorithms, 2021
An encrypted speech authentication and tampering recovery method based on perceptual hashing.
Multim. Tools Appl., 2021
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing.
Multim. Tools Appl., 2021
A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding.
Multim. Tools Appl., 2021
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion.
Multim. Tools Appl., 2021
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion.
Multim. Tools Appl., 2021
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination.
KSII Trans. Internet Inf. Syst., 2021
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding.
IET Image Process., 2021
2020
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction.
Multim. Tools Appl., 2020
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction.
Multim. Tools Appl., 2020
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing.
KSII Trans. Internet Inf. Syst., 2020
Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing.
Int. J. Netw. Secur., 2020
An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm.
Int. J. Netw. Secur., 2020
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network.
IET Inf. Secur., 2020
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing.
Turkish J. Electr. Eng. Comput. Sci., 2020
Completion of multiview missing data based on multi-manifold regularised non-negative matrix factorisation.
Artif. Intell. Rev., 2020
A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing.
IEEE Access, 2020
An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM.
IEEE Access, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Joint Clustering and Power Allocation for the Cross Roads Congestion Scenarios in Cooperative Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2019
A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing.
Multim. Tools Appl., 2019
J. Chem. Inf. Model., 2019
Int. J. Netw. Secur., 2019
A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics.
Int. J. Netw. Secur., 2019
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding.
IET Image Process., 2019
An efficient retrieval algorithm of encrypted speech based on inverse fast Fouriertransform and measurement matrix.
Turkish J. Electr. Eng. Comput. Sci., 2019
A Method to Automatic Measuring Riding Comfort of Autonomous Vehicles: Based on Passenger Subjective Rating and Vehicle Parameters.
Proceedings of the Design, User Experience, and Usability. Application Domains, 2019
2018
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix.
Multim. Tools Appl., 2018
An efficient perceptual hashing based on improved spectral entropy for speech authentication.
Multim. Tools Appl., 2018
J. Inf. Sci. Eng., 2018
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
High Capacity Reversible Data Hiding Algorithm for Color Image Based on Bicubic Interpolation Extension.
J. Inf. Hiding Multim. Signal Process., 2018
Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor.
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
Int. J. Netw. Secur., 2018
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string.
Int. J. Inf. Commun. Technol., 2018
2017
J. Inf. Hiding Multim. Signal Process., 2017
Robust Hashing for Color Image Authentication Using Non-Subsampled Contourlet Transform Features and Salient Features.
J. Inf. Hiding Multim. Signal Process., 2017
Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization.
J. Inf. Hiding Multim. Signal Process., 2017
J. Inf. Hiding Multim. Signal Process., 2017
Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio.
Int. J. Netw. Secur., 2017
The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set.
Int. J. Netw. Secur., 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
2016
An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System.
J. Inf. Hiding Multim. Signal Process., 2016
An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream.
J. Inf. Hiding Multim. Signal Process., 2016
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment.
Proceedings of the Intelligent Computing Theories and Application, 2016
2015
An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication.
J. Inf. Hiding Multim. Signal Process., 2015
An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition.
J. Inf. Hiding Multim. Signal Process., 2015
2014
Research on Hand Gesture Recognition Based on Inner-Distance Contour Point Distribution Features and Histogram Matching.
J. Comput., 2014
An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Hand Gesture Target Model Updating and Result Forecasting Algorithm based on Mean Shift.
J. Multim., 2013
Proceedings of the Information Computing and Applications - 4th International Conference, 2013
2012
Polar-Radius-Invariant-Moment Based on Key-Points for Hand Gesture Shape Recognition.
J. Softw., 2012
J. Comput., 2012
2010
A hybrid particle swarm optimisation algorithm and fuzzy logic for process planning and production scheduling integration in holonic manufacturing systems.
Int. J. Comput. Integr. Manuf., 2010
Proceedings of the Sixth International Conference on Natural Computation, 2010
2009
Fuzzy Clustering Algorithm based on Factor Analysis and its Application to Mail Filtering.
J. Softw., 2009
Hand Gesture Contour Tracking Based on Skin Color Probability and State Estimation Model.
J. Multim., 2009
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the Advances in Neural Networks, 2008
Proceedings of the Advances in Neural Networks, 2008
Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background.
Proceedings of the International Conference on Embedded Software and Systems, 2008
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
A consistency maintenance algorithm with cursor position maintenance in real-time cooperative editing systems based on GOT algorithm.
Proceedings of the 12th International Conference on CSCW in Design, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensor.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Grid and Cooperative Computing, 2007
Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Timed Petri-Net(TPN) Based Scheduling Holon and Its Solution with a Hybrid PSO-GA Based Evolutionary Algorithm(HPGA).
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006
A Novel Task Allocation Problem Solution with PSO Algorithm for Holonic Manufacturing System.
Proceedings of the 10th International Conference on CSCW in Design, 2006
A Scheduling Holon Modeling Method with Petri Net and its Optimization with a Novel PSO-GA Algorithm.
Proceedings of the 10th International Conference on CSCW in Design, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Research on Application of Development Method of Knowledge Base in the Integrated System for ICAD.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
A Hybrid Algorithm Based on PSO and Simulated Annealing and Its Applications for Partner Selection in Virtual Enterprise.
Proceedings of the Advances in Intelligent Computing, 2005
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005