Yushu Zhang
Orcid: 0000-0001-8183-8435Affiliations:
- Nanjing University of Aeronautics and Astronautics, Nanjing, China
According to our database1,
Yushu Zhang
authored at least 213 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.
Cybersecur., December, 2024
TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images.
IEEE Internet Things J., November, 2024
SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection.
ACM Trans. Multim. Comput. Commun. Appl., October, 2024
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting.
IEEE Trans. Neural Networks Learn. Syst., October, 2024
IEEE Trans. Comput. Soc. Syst., October, 2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
Combining Semi-Tensor Product Compressed Sensing and Session Keys for Low-Cost Encryption of Batch Information in WBANs.
IEEE Internet Things J., October, 2024
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024
IEEE Trans. Vis. Comput. Graph., August, 2024
Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation.
IEEE Trans. Ind. Informatics, August, 2024
Exploiting Four-Dimensional Chaotic Systems With Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks.
ACM Trans. Sens. Networks, July, 2024
Empowering Semantic Segmentation With Selective Frequency Enhancement and Attention Mechanism for Tampering Detection.
IEEE Trans. Artif. Intell., June, 2024
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things.
IEEE Internet Things J., June, 2024
ACM Trans. Multim. Comput. Commun. Appl., May, 2024
A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation.
IEEE Trans. Ind. Electron., May, 2024
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J., May, 2024
A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation.
IEEE Trans. Circuits Syst. I Regul. Pap., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate.
IEEE Trans. Ind. Informatics, March, 2024
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., March, 2024
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system.
Expert Syst. Appl., March, 2024
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., February, 2024
Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain.
IEEE Internet Things J., February, 2024
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024
Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
J. King Saud Univ. Comput. Inf. Sci., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages.
IEEE Trans. Netw. Sci. Eng., 2024
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics.
IEEE Trans. Multim., 2024
PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine.
IEEE Trans. Multim., 2024
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images.
IEEE Trans. Multim., 2024
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
Neural Networks, 2024
Expert Syst. Appl., 2024
Reservoir computing based encryption-then-compression scheme of image achieving lossless compression.
Expert Syst. Appl., 2024
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption.
Expert Syst. Appl., 2024
AIGC-Chain: A Blockchain-Enabled Full Lifecycle Recording System for AIGC Product Copyright Management.
CoRR, 2024
CoRR, 2024
SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things.
Biomed. Signal Process. Control., 2024
High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC.
Biomed. Signal Process. Control., 2024
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images.
Appl. Intell., 2024
DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Comput. Soc. Syst., December, 2023
IEEE Trans. Artif. Intell., December, 2023
Expert Syst. Appl., October, 2023
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain.
IEEE Trans. Netw. Serv. Manag., September, 2023
Appl. Intell., September, 2023
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng., August, 2023
Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
Multim. Syst., June, 2023
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
Multim. Syst., April, 2023
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT.
IEEE Internet Things J., February, 2023
TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding.
Appl. Intell., February, 2023
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023
Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour.
IEEE Trans. Cybern., 2023
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
IEEE Signal Process. Lett., 2023
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images.
IEEE Signal Process. Lett., 2023
IEEE Signal Process. Lett., 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission.
IEEE Internet Things J., 2023
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation.
ACM Comput. Surv., 2023
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Comput. Secur., 2023
RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption.
Proceedings of the IEEE International Conference on Signal Processing, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
2022
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022
IEEE Signal Process. Lett., 2022
J. Vis. Commun. Image Represent., 2022
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Inf. Sci., 2022
Inf. Sci., 2022
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud.
Inf. Sci., 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022
2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption.
Signal Process., 2021
J. Vis. Commun. Image Represent., 2021
SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction.
J. Electronic Imaging, 2021
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing.
Inf. Sci., 2021
IEEE Internet Things J., 2021
CoRR, 2021
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021
2020
IEEE Trans. Ind. Informatics, 2020
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy.
Signal Process., 2020
Color image compression and encryption scheme based on compressive sensing and double random encryption strategy.
Signal Process., 2020
An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL).
Neural Comput. Appl., 2020
An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata.
Neural Comput. Appl., 2020
Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm.
Neurocomputing, 2020
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020
IEEE Access, 2020
2019
A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2019
IEEE Trans. Ind. Informatics, 2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence.
IEEE Netw., 2019
Multim. Tools Appl., 2019
Medical image encryption algorithm based on Latin square and memristive chaotic system.
Multim. Tools Appl., 2019
Inf. Sci., 2019
IEEE Commun. Surv. Tutorials, 2019
A robust and secure image sharing scheme with personal identity information embedded.
Comput. Secur., 2019
IEEE Access, 2019
Fidelity Preserved Data Hiding in Encrypted Highly Autocorrelated Data Based on Homomorphism and Compressive Sensing.
IEEE Access, 2019
2018
IEEE Trans. Cybern., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Signal Process., 2018
Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
Signal Process., 2018
Secur. Commun. Networks, 2018
Image salient regions encryption for generating visually meaningful ciphertext image.
Neural Comput. Appl., 2018
A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Inf. Sci., 2018
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018
Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System.
IEEE Multim., 2018
IEEE Access, 2018
Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata.
IEEE Access, 2018
2017
Signal Process., 2017
Neural Comput. Appl., 2017
Multidimens. Syst. Signal Process., 2017
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
Inf. Sci., 2017
IEEE Internet Things J., 2017
Int. J. Bifurc. Chaos, 2017
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017
2016
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
Signal Process. Image Commun., 2016
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016
Robust image hashing with tampering recovery capability via low-rank and sparse representation.
Multim. Tools Appl., 2016
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016
Proceedings of the 2016 Visual Communications and Image Processing, 2016
2015
Signal Process. Image Commun., 2015
Reversible data hiding in encrypted images using cross division and additive homomorphism.
Signal Process. Image Commun., 2015
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015
An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach.
Commun. Nonlinear Sci. Numer. Simul., 2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
2014
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images.
Signal Process., 2014
Multim. Tools Appl., 2014
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption.
Commun. Nonlinear Sci. Numer. Simul., 2014
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2014
2013
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations.
Signal Process. Image Commun., 2013