Shanyu Tang

Orcid: 0000-0002-2447-8135

According to our database1, Shanyu Tang authored at least 39 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication.
IEEE Trans. Ind. Electron., 2021

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography.
IEEE Trans. Dependable Secur. Comput., 2021

2018
Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement.
IEEE Trans. Ind. Electron., 2018

Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates.
Multim. Tools Appl., 2018

An efficient and secure VoIP communication system with chaotic mapping and message digest.
Multim. Syst., 2018

Secure and robust digital image watermarking scheme using logistic and RSA encryption.
Expert Syst. Appl., 2018

2017
Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol.
Wirel. Networks, 2017

Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.
IEEE J. Biomed. Health Informatics, 2017

Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.
Multim. Tools Appl., 2017

Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions.
Eng. Appl. Artif. Intell., 2017

Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Universal steganography model for low bit-rate speech codec.
Secur. Commun. Networks, 2016

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP.
Peer-to-Peer Netw. Appl., 2016

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks.
J. Netw. Comput. Appl., 2016

2015
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015

Negative Survey-Based Privacy Protection of Cloud Data.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

2014
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards.
Secur. Commun. Networks, 2014

A motion planning method for simulating a virtual crowd.
J. Simulation, 2014

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card.
Int. J. Commun. Syst., 2014

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications.
IET Commun., 2014

Audio steganography with AES for real-time covert voice over internet protocol communications.
Sci. China Inf. Sci., 2014

2013
A Hybrid Model for Simulating Crowd Evacuation.
New Gener. Comput., 2013

An Information- Theoretical Model for Streaming Media Based Stegosystems.
Comput. Informatics, 2013

ECC-Based Authenticated Key Agreement Protocol with Privacy Protection for VoIP Communications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Improving Performance of E-Government System from the User Perspective.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Establishment of Security Levels in Trusted Cloud Computing Platforms.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Research on a New Mathematic Description for Fingerprint Identification.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Steganography Integration Into a Low-Bit Rate Speech Codec.
IEEE Trans. Inf. Forensics Secur., 2012

Network service registration based on role-goal-process-service meta-model in a P2P network.
IET Commun., 2012

2011
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec.
IEEE Trans. Inf. Forensics Secur., 2011

Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Inf. Secur., 2011

Simulation of Web Data Traffic Patterns Using Fractal Statistical Modelling.
Proceedings of the Engineering Applications of Neural Networks, 2011

2009
Performance of Database Driven Network Applications from the User Perspective.
KSII Trans. Internet Inf. Syst., 2009

2008
An Approach to Information Hiding in Low Bit-Rate Speech Stream.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...