UM

Browse/Search Results:  1-10 of 18 Help

Selected(0)Clear Items/Page:    Sort:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds Journal article
IEEE Transactions on Big Data, 2021,Volume: 7,Issue: 4,Page: 717-728
Authors:  Yushu Zhang;  Jiantao Zhou;  Yong Xiang;  Leo Yu Zhang;  Fei Chen;  Shaoning Pang;  Xiaofeng Liao
Adobe PDF | Favorite |  | TC[WOS]:5 TC[Scopus]:5 | Submit date:2019/04/16
Parallel Compressive Sensing  Sparse Robustness Decoding Service  Packet-loss  Cloud Computing  
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 6,Page: 2494-2508
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite |  | TC[WOS]:16 TC[Scopus]:12 | Submit date:2021/12/08
Bit-wise Xor  Chosen-ciphertext Attack  Image Encryption  Permutation Substitution  
Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table Journal article
Nonlinear Dynamics, 2020,Volume: 100,Issue: 4,Page: 3959-3978
Authors:  Chen, Lei;  Chen, Junxin;  Ma, Lisha;  Wang, Shihong
Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2021/12/06
Chaotic Cryptograph  Chaotic Dynamics  Chosen-plaintext Attack  Image Cryptanalysis  Latin Square  
Cryptanalysis of a DNA-based image encryption scheme Journal article
Information Sciences, 2020,Volume: 520,Page: 130-141
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite |  | TC[WOS]:51 TC[Scopus]:57 | Submit date:2021/12/06
Cryptanalysis  Image Encryption  Hénon-sine Map  Dna Coding  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:11 TC[Scopus]:12 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud Journal article
Information Sciences, 2019,Volume: 496,Page: 150-160
Authors:  Yushu Zhang;  Yong Xiang;  Leo Yu Zhang;  Lu-Xing Yang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:16 TC[Scopus]:17 | Submit date:2021/03/11
Asymmetric Verification  Cloud Computing  Compressed Sensing  Compressed Sensing Reconstruction Outsourcing  
Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF) Journal article
IEEE Transactions on Services Computing, 2019,Volume: 14,Issue: 6,Page: 1940-1953
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2022/07/07
Robust privacy-Preserving image sharing over online social networks (OSNs) Journal article
ACM Transactions on Multimedia Computing, Communications and Applications, 2018,Volume: 14,Issue: 1
Authors:  Weiwei Sun;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Adobe PDF | Favorite |  | TC[WOS]:9 TC[Scopus]:14 | Submit date:2021/03/11
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2017,Volume: 430,Page: 228-239
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang;  Guanrong Chen
Adobe PDF | Favorite |  | TC[WOS]:41 TC[Scopus]:46 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Leo Yu Zhang;  Kwok-Wo Wong;  Yushu Zhang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:64 TC[Scopus]:64 | Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)